diff --git a/CVE-2022/CVE-2022-253xx/CVE-2022-25377.json b/CVE-2022/CVE-2022-253xx/CVE-2022-25377.json index 295c51c61d0..b7b20137500 100644 --- a/CVE-2022/CVE-2022-253xx/CVE-2022-25377.json +++ b/CVE-2022/CVE-2022-253xx/CVE-2022-25377.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25377", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T22:15:47.170", - "lastModified": "2024-02-23T02:42:54.547", + "lastModified": "2024-08-21T18:35:00.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El endpoint del desaf\u00edo ACME en Appwrite v0.5.0 hasta v0.12.x anterior a v0.12.2 permite a atacantes remotos leer archivos locales de su elecci\u00f3n a trav\u00e9s del directory traversal ../. Para ser vulnerable, APP_STORAGE_CERTIFICATES/.well-known/acme-challenge debe existir en el disco. (Este nombre de ruta se crea autom\u00e1ticamente si el usuario elige instalar los certificados Let's Encrypt a trav\u00e9s de Appwrite)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/", diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47940.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47940.json index 3a551d73ff2..10268f9f1ea 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47940.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47940.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47940", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-23T16:15:12.533", - "lastModified": "2022-12-30T15:52:55.570", + "lastModified": "2024-08-21T18:19:29.143", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -62,8 +62,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", - "versionEndExcluding": "5.18.8", - "matchCriteriaId": "53F8C813-FEB9-463B-B5EC-2B5FF680552B" + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.18", + "matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11" } ] } diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48779.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48779.json index 432237e10c2..032a14cafb5 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48779.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48779.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48779", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T12:15:03.077", - "lastModified": "2024-07-16T13:43:58.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:00:53.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,77 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net: mscc: ocelot: fix use-after-free en ocelot_vlan_del() ocelot_vlan_member_del() liberar\u00e1 la estructura ocelot_bridge_vlan, por lo que si es la misma que la pvid_vlan del puerto al que accedemos despu\u00e9s, a lo que accedemos es a la memoria liberada. Corrija el error determinando si se debe borrar ocelot_port->pvid_vlan antes de llamar a ocelot_vlan_member_del()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.11", + "matchCriteriaId": "0D327234-5D4A-43DC-A6DF-BCA0CEBEC039" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/c98bed60cdd7f22237ae256cc9c1c3087206b8a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef57640575406f57f5b3393cf57f457b0ace837e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48781.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48781.json index c25527c8b50..aabf74ac530 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48781.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48781.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48781", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T12:15:03.217", - "lastModified": "2024-07-16T13:43:58.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:01:51.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,77 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: af_alg - deshacerse de alg_memory_allocated alg_memory_allocated no parece usarse realmente. alg_proto tiene un campo .memory_allocated, pero ning\u00fan .sysctl_mem correspondiente. Esto significa que sk_has_account() devuelve verdadero, pero todos los usuarios de sk_prot_mem_limits() activar\u00e1n una desreferencia NULL [1]. Esto no fue un problema hasta la adici\u00f3n de SO_RESERVE_MEM. falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref en rango [0x0000000000000008-0x0000000000000000f] CPU: 1 PID: 3591 Comm: No contaminado 5.17.0 -rc3-syzkaller-00316-gb81b1829e7e3 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:sk_prot_mem_limits include/net/sock.h:1523 [en l\u00ednea] RIP: 0010: sock_reserve_memory+0x1d7/0x330 net/core/sock.c:1000 C\u00f3digo: 08 00 74 08 48 89 ef e8 27 20 bb f9 4c 03 7c 24 10 48 8b 6d 00 48 83 c5 08 48 89 e8 48 c1 e8 48b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 ef e8 fb 1f bb f9 48 8b 6d 00 4c 89 ff 48 RSP: 0018:ffffc90001f1fb68 EFLAGS: 00010202 RAX: 0000000000000001 RBX: ffff88814aabc000 RCX: dffffc0000000000 RDX : 0000000000000001 RSI: 0000000000000008 RDI: ffffffff90e18120 RBP: 0000000000000008 R08: dffffc0000000000 R09: ffffbfff21c3025 R10: ffffbfff21c3 025 R11: 0000000000000000 R12: ffffffff8d109840 R13: 0000000000001002 R14: 0000000000000001 R15: 0000000000000001 FS: 0000555556e08300 (0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007FC74416F130 DR6: 0000000000FFFE0FF0 DR7: 0000000000000400 TRACE DE LLAMADA: Sock_SetSockOpt+0x14a9/0x3a30 net/core/sock.c:1446 __sys_setsockopt+0x5af/0x980 net/socket.c:2176 __do_sys_setsockopt net/socket.c:2191 [en l\u00ednea] __se_sys_setsockopt net/socket.c:2188 [en l\u00ednea] 0xc0 neto/ socket.c:2188 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fc7440fddc9 C\u00f3digo: 00 00 00 75 05 48 83 c4 28 c3 e8 51 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe98f07968 EFLAGS: 00000246 ORIG_RAX: 00000000000000036 RAX: ffffffffffffffda RBX: 003 RCX: 00007fc7440fddc9 RDX: 0000000000000049 RSI: 0000000000000001 RDI: 0000000000000004 RBP: 0000000000000000 R08: 00000000000000004 R09 : 00007ffe98f07990 R10: 0000000020000000 R11: 0000000000000246 R12: 00007ffe98f0798c R13: 00007ffe98f079a0 R14: 00007ffe98f079e0 R15: 0000000000000 M\u00f3dulos vinculados en: ---[ end trace 0000000000000000 ]--- RIP: 0010:sk_prot_mem_limits include/net/sock. h:1523 [en l\u00ednea] RIP: 0010:sock_reserve_memory+0x1d7/0x330 net/core/sock.c:1000 C\u00f3digo: 08 00 74 08 48 89 ef e8 27 20 bb f9 4c 03 7c 24 10 48 8b 6d 00 48 83 c5 08 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 ef e8 fb 1f bb f9 48 8b 6d 00 4c 89 ff 48 RSP 0018:ffffc900 01f1fb68EFLAGS: 00010202 RAX: 0000000000000001 RBX: ffff88814aabc000 RCX: dffffc0000000000 RDX: 0000000000000001 RSI: 00000000000000008 RDI: ffffffff90e18120 RBP: 000000008 R08: dffffc0000000000 R09: ffffbfff21c3025 R10: ffffbfff21c3025 R11: 00000000000000000 R12: ffffffff8d109840 R13: 0000000000000001002 0000000000000001 R15: 0000000000000001 FS: 0000555556e08300(0000 ) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc74416f130 CR3: 0000000073d9e 000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.11", + "matchCriteriaId": "0D327234-5D4A-43DC-A6DF-BCA0CEBEC039" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/25206111512de994dfc914f5b2972a22aa904ef3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d06f489b9e901580159e21fdc29f73df7ed08dc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48782.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48782.json index 1b73e645878..a34df044d17 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48782.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48782.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48782", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T12:15:03.290", - "lastModified": "2024-07-16T13:43:58.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:02:33.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,77 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mctp: corregir el use after free El an\u00e1lisis est\u00e1tico de Clang informa este problema route.c:425:4: advertencia: uso de la memoria despu\u00e9s de liberarla trace_mctp_key_acquire(key); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Cuando mctp_key_add() falla, la clave se libera pero luego se usa en trace_mctp_key_acquire(). Agregue una declaraci\u00f3n else para usar la clave solo cuando mctp_key_add() sea exitoso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.11", + "matchCriteriaId": "0D327234-5D4A-43DC-A6DF-BCA0CEBEC039" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1dd3ecbec5f606b2a526c47925c8634b1a6bb81e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e5b6a5c8c44310784c88c1c198dde79f6402f7b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48783.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48783.json index d880d0d3983..7ac0b45c697 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48783.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48783.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48783", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T12:15:03.350", - "lastModified": "2024-07-16T13:43:58.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:03:24.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,101 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: lantiq_gswip: corregir el use after free en gswip_remove() of_node_put(priv->ds->slave_mii_bus->dev.of_node) debe realizarse antes de mdiobus_free(priv-> ds->slave_mii_bus)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.10.101:*:*:*:*:*:*:*", + "matchCriteriaId": "C53907FB-F0F7-4949-8B96-536B39F07CC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.15.24:*:*:*:*:*:*:*", + "matchCriteriaId": "5E4726FE-A5BB-4D3A-A739-7DB1FD812A5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16.10:*:*:*:*:*:*:*", + "matchCriteriaId": "8B57A4A1-27BC-4A60-8682-700F865C578A" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8c6ae46150a453f8ae9a6cd49b45f354f478587d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c61f599b8d33adfa256126a6695c734c0de331cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df2495f329b08ac0d0d3e6334a01955ae839005e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f48bd34137718042872d06f2c7332b3267a29165", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48800.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48800.json index 8a88185493d..39f4e61a8e2 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48800.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48800.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48800", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T12:15:04.563", - "lastModified": "2024-07-16T13:43:58.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:04:42.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,77 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: vmscan: elimina el punto muerto debido a que la aceleraci\u00f3n no logra avanzar. Se inform\u00f3 un error de bloqueo suave en kcompactd en un bugzilla privado con lo siguiente visible en dmesg; perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU n.\u00b0 33 bloqueada durante 26 segundos! [kcompactd0:479] perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#33 bloqueada durante 52 segundos! [kcompactd0:479] perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#33 bloqueada durante 78 segundos! [kcompactd0:479] perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#33 bloqueada durante 104! [kcompactd0:479] La m\u00e1quina ten\u00eda 256 GB de RAM sin intercambio y una asignaci\u00f3n fallida anterior indic\u00f3 que el nodo 0 donde se ejecutaba kcompactd era potencialmente no recuperable; Nodo 0 active_anon:29355112kB inactive_anon:2913528kB active_file:0kB inactive_file:0kB inevitable:64kB aislado(anon):0kB aislado(archivo):0kB mapeado:8kB sucio:0kB escritura regresiva:0kB shmem:26780kB shmem_thp: 0kB shmem_pmdmapped : 0kB anon_thp: 23480320kB writeback_tmp:0kB kernel_stack:2272kB tablas de p\u00e1ginas:24500kB \u00bftodo_unreclamable? s\u00ed, Vlastimil Babka investig\u00f3 un volcado de memoria y descubri\u00f3 que una tarea que migraba p\u00e1ginas intentaba drenar las listas de PCP; PID: 52922 TAREA: ffff969f820e5000 CPU: 19 COMANDO: \"kworker/u128:3\" Seguimiento de llamadas: __schedule Schedule Schedule_timeout wait_for_completion __flush_work __drain_all_pages __alloc_pages_slowpath.constprop.114 __alloc_pages alloc_migration_target migrar_pages to_node do_migrate_pages cpuset_migrate_mm_workfn process_one_work trabajador_thread kthread ret_from_fork Este error es espec\u00edfico de CONFIG_PREEMPT=n construye. La ra\u00edz del problema es que kcompact0 no se reprograma en una CPU mientras una tarea que ha aislado una gran cantidad de p\u00e1ginas de la LRU est\u00e1 esperando que kcompact0 se reprograme para que las p\u00e1ginas puedan liberarse. Mientras que Shrink_inactive_list() solo realiza un bucle alrededor de too_many_isolated, la recuperaci\u00f3n puede continuar sin reprogramar si sc->skipped_deactivate == 1, lo que podr\u00eda suceder si no hubiera ning\u00fan archivo LRU y la lista de an\u00f3nimos inactivos no fuera baja." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.10", + "matchCriteriaId": "679523BA-1392-404B-AB85-F5A5408B1ECC" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3980cff6349687f73d5109f156f23cb261c24164", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b485c6f1f9f54b81443efda5f3d8a5036ba2cd91", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1194.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1194.json index 4569513c282..47aabd543a6 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1194.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1194.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1194", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-03T08:15:07.490", - "lastModified": "2023-12-21T22:15:08.460", - "vulnStatus": "Modified", + "lastModified": "2024-08-21T18:20:30.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -91,8 +91,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.4", - "matchCriteriaId": "18D12E25-2947-44E7-989D-24450E013A1F" + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.34", + "matchCriteriaId": "827DE634-7B30-489B-8DA2-F753BE881D9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.3.8", + "matchCriteriaId": "7F3A71BC-4CD9-4F21-A84B-E615C990B4ED" }, { "vulnerable": true, @@ -157,7 +172,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231221-0006/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.spinics.net/lists/stable-commits/msg303065.html", diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29929.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29929.json new file mode 100644 index 00000000000..7e78512441c --- /dev/null +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29929.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-29929", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:09.173", + "lastModified": "2024-08-21T18:15:09.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability found in Kemptechnologies Loadmaster before v.7.2.60.0 allows a remote attacker to casue a denial of service via the libkemplink.so, isreverse library." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://kemptechnologies.com", + "source": "cve@mitre.org" + }, + { + "url": "http://loadmaster.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32250.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32250.json index 6b4743c3a65..d0f7342dcd8 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32250.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32250.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32250", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-10T16:15:52.413", - "lastModified": "2023-12-12T14:39:13.577", + "lastModified": "2024-08-21T18:17:13.937", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -88,8 +88,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.29", - "matchCriteriaId": "7E233AD0-DABB-4668-93A7-DD0909B16CB9" + "matchCriteriaId": "D48F00B5-5471-4D1B-BE47-1DAB8122F35A" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32254.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32254.json index 49b45b9e14a..46df74878d4 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32254.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32254.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32254", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-10T16:15:52.470", - "lastModified": "2023-12-12T14:38:38.447", + "lastModified": "2024-08-21T18:21:55.587", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -88,8 +88,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.28", - "matchCriteriaId": "E4EA6A2F-51DD-4871-977C-F88693D8830F" + "matchCriteriaId": "08F855F4-7188-4EE1-BD79-D4B6C7E2EF54" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39191.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39191.json index 6f9bb7bcedf..c6d7e790d9b 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39191.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39191.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39191", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-04T19:15:10.210", - "lastModified": "2024-01-25T20:15:35.643", - "vulnStatus": "Modified", + "lastModified": "2024-08-21T18:16:34.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -91,8 +91,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", "versionEndExcluding": "6.3", - "matchCriteriaId": "3769AA63-B0A8-4EF1-96F9-6A6A6B305A02" + "matchCriteriaId": "DFB3D220-DA18-4A33-B29B-E95AB137005D" } ] } @@ -132,19 +133,31 @@ "references": [ { "url": "https://access.redhat.com/errata/RHSA-2023:6583", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0381", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0439", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0448", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-39191", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20083.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20083.json index 302667cf52a..343d720a6d0 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20083.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20083.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20083", "sourceIdentifier": "security@mediatek.com", "published": "2024-08-14T03:15:04.280", - "lastModified": "2024-08-14T13:00:48.243", + "lastModified": "2024-08-21T18:35:02.057", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En caso contrario, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda llevar a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08810810 / ALPS08805789; ID del problema: MSV-1502." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20488.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20488.json new file mode 100644 index 00000000000..b1562a343f4 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20488.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20488", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-21T19:15:13.163", + "lastModified": "2024-08-21T19:15:13.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-9zmfHyZ", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24213.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24213.json index a7efc31cb59..c2ab89cbd88 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24213.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24213", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T18:15:08.237", - "lastModified": "2024-08-19T20:35:05.230", - "vulnStatus": "Modified", + "lastModified": "2024-08-21T18:06:24.633", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -97,8 +97,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:15.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B3B2D1C6-F9D3-46F9-988C-4E4BEDF498F5" + "criteria": "cpe:2.3:a:supabase:postgres:15.1:*:*:*:*:*:*:*", + "matchCriteriaId": "97FF52D4-4293-47D3-A491-DAF771B9A2C5" } ] } @@ -136,7 +136,10 @@ }, { "url": "https://supabase.com/docs/guides/database/overview#the-sql-editor", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28740.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28740.json index 9006e19a692..d47e79bbc82 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28740.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28740", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T19:15:56.380", - "lastModified": "2024-08-12T18:19:33.337", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-21T18:35:02.877", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34474.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34474.json index 6cb7fc78450..686a36e74bb 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34474.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34474.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34474", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T15:15:49.167", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-08-21T18:35:04.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Clario hasta el 11 de abril de 2024 para escritorio tiene permisos d\u00e9biles para %PROGRAMDATA%\\Clario e intenta cargar archivos DLL desde all\u00ed como SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://clario.co/download/", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35432.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35432.json index 9e091ef36e6..b23810e2ee3 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35432.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35432.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35432", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T16:15:10.980", - "lastModified": "2024-05-30T18:19:11.743", + "lastModified": "2024-08-21T18:35:04.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ZKTeco ZKBio CVSecurity 6.1.1 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de un archivo de audio. Un usuario autenticado puede inyectar c\u00f3digo JavaScript malicioso para activar un Cross Site Scripting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35432.md", diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36131.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36131.json index a4700c77b5f..f83577b2752 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36131.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36131", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-07T04:17:18.207", - "lastModified": "2024-08-12T18:53:18.077", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-21T18:35:05.670", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39013.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39013.json index 3fd41fe64e4..0b401d86c43 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39013.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39013.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39013", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.650", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-08-21T18:35:06.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que 2o3t-utility v0.1.2 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n extender. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/a2be744675af5ece3240c19fd04fc5e1", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39014.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39014.json index 24743db6700..9af3e05c315 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39014.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39014.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39014", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.703", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-08-21T18:35:07.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que ahilfoley cahil/utils v2.3.2 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s del conjunto de funciones. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/0501db31c1a6864a169e47097f26ac57", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39036.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39036.json index 91275982e03..a8e24b63249 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39036.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39036.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39036", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.460", - "lastModified": "2024-08-12T18:35:39.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:57:12.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/seacms-net/CMS/issues/18", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40129.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40129.json index 800146de01d..f9bee121a8b 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40129.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40129.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40129", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.600", - "lastModified": "2024-08-01T13:56:53.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:59:09.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open5gs:open5gs:2.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "67C9257A-E21A-4D91-8B2C-745841387FC9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/commit/2fbc445d32aa7749166396a9c055a199f90a1b01", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/open5gs/open5gs/issues/2585", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40130.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40130.json index e88dc1cb7a1..f962092fbd5 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40130.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40130.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40130", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.683", - "lastModified": "2024-08-01T13:56:59.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T19:00:56.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open5gs:open5gs:2.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "67C9257A-E21A-4D91-8B2C-745841387FC9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/commit/2f8ae91b0b9467f94f128090c88cae91bd73e008", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/open5gs/open5gs/issues/2577", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json index f82959b2daf..f04d0ba46e1 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40393", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.873", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:13:42.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "Se descubri\u00f3 que Online Clinic Management System In PHP With Free Source code v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de usuario en login.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:online_clinic_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F83E07A-EC1A-47DB-ACEE-279F60BD4F0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/47", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40892.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40892.json index e0071bc5991..e97c5b6f9fb 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40892.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40892.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40892", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-08-12T19:15:16.403", - "lastModified": "2024-08-13T12:58:25.437", + "lastModified": "2024-08-21T18:15:09.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://vulncheck.com/advisories/firewalla-bt-weak-credentials", "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.labs.greynoise.io/grimoire/2024-08-20-bluuid-firewalla/", + "source": "disclosure@vulncheck.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40893.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40893.json index 5303a2d2ee8..119352f42f3 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40893.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40893.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40893", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-08-12T19:15:16.643", - "lastModified": "2024-08-13T12:58:25.437", + "lastModified": "2024-08-21T18:15:09.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://vulncheck.com/advisories/firewalla-bt-command-injection", "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.labs.greynoise.io/grimoire/2024-08-20-bluuid-firewalla/", + "source": "disclosure@vulncheck.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41052.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41052.json index 59942dde60e..36987c69811 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41052.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41052", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:13.407", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T19:27:26.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/pci: inicia la variable de conteo al recopilar dispositivos de reinicio en caliente. La variable de conteo se usa sin inicializaci\u00f3n, genera errores en el conteo de dispositivos y bloquea el espacio de usuario si se calienta. Se activa el restablecimiento de la ruta de informaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.36", + "versionEndExcluding": "6.6.41", + "matchCriteriaId": "81866204-A72D-4E1B-9AB9-B9BB883833FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9.7", + "versionEndExcluding": "6.9.10", + "matchCriteriaId": "A17E0978-04F7-4FC3-81D8-E7D507334B98" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a88a3f67e37e39f933b38ebb4985ba5822e9eca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f44136b9652291ac1fc39ca67c053ac624d0d11b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f476dffc52ea70745dcabf63288e770e50ac9ab3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41053.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41053.json index 90f66101b69..4d1fd387b9a 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41053.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41053", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:13.473", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T19:21:41.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: ufs: core: solucione el problema de ejecuci\u00f3n de ufshcd_abort_one Cuando ufshcd_abort_one se ejecuta con el ISR de finalizaci\u00f3n, ISR establecer\u00e1 la etiqueta completada del puntero mq_hctx de la solicitud en NULL. Devuelve el \u00e9xito cuando ISR completa la solicitud porque ufshcd_abort_one no necesita hacer nada. El flujo de ejecucuones es: Hilo A ufshcd_err_handler paso 1 ... ufshcd_abort_one ufshcd_try_to_abort_task ufshcd_cmd_inflight(true) paso 3 ufshcd_mcq_req_to_hwq blk_mq_unique_tag rq->mq_hctx->queue_num paso 5 Hilo B (cq completar ISR) paso 2 scsi_done... __blk_mq_free_request rq-> mq_hctx = NULO; paso 4 A continuaci\u00f3n se muestra el seguimiento de KE. ufshcd_try_to_abort_task: cmd en la etiqueta 41 no est\u00e1 pendiente en el dispositivo. ufshcd_try_to_abort_task: cmd en la etiqueta = 41 se borra. Anulaci\u00f3n de la etiqueta 41 / CDB 0x28 exitosa No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000194 pc: [0xffffffddd7a79bf8] blk_mq_unique_tag+0x8/0x14 lr: [0xffffffddd6155b84] x1c/0x40 [ufs_mediatek_mod_ise] do_mem_abort+0x58/0x118 el1_abort+0x3c/ 0x5c el1h_64_sync_handler+0x54/0x90 el1h_64_sync+0x68/0x6c blk_mq_unique_tag+0x8/0x14 ufshcd_err_handler+0xae4/0xfa8 [ufs_mediatek_mod_ise] Process_one_work+0x208/0x4fc trabajador_thread+0x228/0 x438 kthread+0x104/0x1d4 ret_from_fork+0x10/0x20" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.5", + "versionEndExcluding": "6.6.41", + "matchCriteriaId": "D801CC48-8332-42BC-BE0D-DA5A5C2D8FF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.10", + "matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/74736103fb4123c71bf11fb7a6abe7c884c5269e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5a6ac887256762758bfe7f2918cb0233aa544f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3111b3cf3889bfa7b73ebff83d7397db9b7e5e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41058.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41058.json index 96748f606cf..a681f2de4dc 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41058.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41058", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:13.847", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T19:35:22.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() Obtuvimos el siguiente problema en nuestra prueba de estr\u00e9s de inyecci\u00f3n defallos: ============ ==================================================== ==== ERROR: KASAN: slab-use-after-free en fscache_withdraw_volume+0x2e1/0x370 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff88810680be08 por tarea ondemand-04-dae/5798 CPU: 0 PID: 5798 Comm: ondemand-04-dae No contaminado 6.8.0-dirty #565 Seguimiento de llamadas: kasan_check_range+0xf6/0x1b0 fscache_withdraw_volume+0x2e1/0x370 cachefiles_withdraw_volume+0x31/0x50 cachefiles_withdraw_cache+0x3ad/0x900 cachefiles_put_unbind_pincount+0x1f6/0x25 0 cachefiles_daemon_release+0x13b/0x290 __fput+0x204/0xa00 task_work_run+0x139 /0x230 Asignado por la tarea 5820: __kmalloc+0x1df/0x4b0 fscache_alloc_volume+0x70/0x600 __fscache_acquire_volume+0x1c/0x610 erofs_fscache_register_volume+0x96/0x1a0 erofs_fscache_register_fs+0x49a/0 x690 erofs_fc_fill_super+0x6c0/0xcc0 vfs_get_super+0xa9/0x140 vfs_get_tree+0x8e/0x300 do_new_mount+0x28c /0x580 [...] Liberado por la tarea 5820: kfree+0xf1/0x2c0 fscache_put_volume.part.0+0x5cb/0x9e0 erofs_fscache_unregister_fs+0x157/0x1b0 erofs_kill_sb+0xd9/0x1c0 deactivate_locked_super+0xa3/0x100 _super+0x105/0x140 vfs_get_tree+0x8e/ 0x300 do_new_mount+0x28c/0x580 [...] ======================================== =========================== El siguiente es el proceso que desencadena el problema: montaje fallido | salida del daemon ------------------------------------------------ ------------ deactivate_locked_super cachefiles_daemon_release erofs_kill_sb erofs_fscache_unregister_fs fscache_relinquish_volume __fscache_relinquish_volume fscache_put_volume(fscache_volume, fscache_volume_put_relinquish) zero = __refcount_dec_and_test(&fscache_volume->ref, &ref); cachefiles_put_unbind_pincount cachefiles_daemon_unbind cachefiles_withdraw_cache cachefiles_withdraw_volumes list_del_init(&volume->cache_link) fscache_free_volume(fscache_volume) cache->ops->free_volume cachefiles_free_volume list_del_init(&cachefiles_volume->cache_link); kfree(fscache_volume) cachefiles_withdraw_volume fscache_withdraw_volume fscache_volume->n_accesses // fscache_volume UAF !!! El fscache_volume en cache->volumes no debe haberse liberado todav\u00eda, pero su recuento de referencias puede ser 0. Por lo tanto, utilice la nueva funci\u00f3n auxiliar fscache_try_get_volume() para intentar obtener su recuento de referencias. Si el recuento de referencia de fscache_volume es 0, fscache_put_volume() lo est\u00e1 liberando, as\u00ed que espere a que se elimine de cach\u00e9->vol\u00famenes. Si su recuento de referencias no es 0, llame a cachefiles_withdraw_volume() con protecci\u00f3n de recuento de referencias para evitar el problema anterior." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "6.1.101", + "matchCriteriaId": "DB356B3F-4040-49B4-8BB9-E2643A2E9B13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.42", + "matchCriteriaId": "972274A2-D688-4C37-BE42-689B58B4C225" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.11", + "matchCriteriaId": "01E300B3-8B39-4A2D-8B03-4631433D3915" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/38b88d544216f806d93a273a62ff8ebe82254003", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/522018a0de6b6fcce60c04f86dfc5f0e4b6a1b36", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/90f17e47f1e209c6a3c92a1d038a0a80c95c460e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9dd7f5663899ea13a6a73216106d9c13c37453e3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41061.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41061.json index 89020f32911..dd684cbaadb 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41061.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41061", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:14.103", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T19:34:12.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: Correcci\u00f3n de \u00edndice de matriz fuera de los l\u00edmites en dml2/FCLKChangeSupport [Por qu\u00e9] Posible acceso fuera de los l\u00edmites en dml2_calculate_rq_and_dlg_params() porque se us\u00f3 el valor de out_lowest_state_idx como \u00edndice para la matriz FCLKChangeSupport puede ser mayor que 1. [C\u00f3mo] Actualmente, el n\u00facleo dml2 especifica valores id\u00e9nticos para todos los elementos FCLKChangeSupport. Utilice siempre el \u00edndice 0 en la condici\u00f3n para evitar el acceso fuera de los l\u00edmites." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.11", + "matchCriteriaId": "E5165B93-C9B7-47E9-8137-35D791A1B1D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ad4b4a2f6357c45fbe444ead1a929a0b4017d03", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/94166fe12543fbef122ca2d093e794ea41073a85", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json index a249cbbf517..5f0d8a70a44 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41332", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:30.150", - "lastModified": "2024-08-13T01:14:31.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:53:15.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/179890/Computer-Laboratory-Management-System-1.0-Privilege-Escalation.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.linkedin.com/in/sampath-kumar-kadajari-4b18891a7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json new file mode 100644 index 00000000000..babfa2ce42f --- /dev/null +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41572", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T19:15:13.380", + "lastModified": "2024-08-21T19:15:13.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Learning with Texts (LWT) 2.0.3 is vulnerable to Cross Site Scripting (XSS). The application has a specific function that does not filter special characters in URL parameters. Remote attackers can inject JavaScript code without authorization." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/drive/folders/12NAfZ2VrMvJug1JVSzfz9PwCuttnlwzP", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/%40ChadSecurity/cve-2024-41572-68397fae354b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json index 71c19c80989..edfe41720d8 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42579", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.687", - "lastModified": "2024-08-21T13:39:19.630", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-21T18:35:08.200", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42608.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42608.json index 928d1667306..31ecc01e80e 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42608.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42608.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42608", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T14:15:09.697", - "lastModified": "2024-08-21T15:54:44.310", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-21T18:35:08.967", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42777.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42777.json new file mode 100644 index 00000000000..c7c17222763 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42777.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42777", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:09.930", + "lastModified": "2024-08-21T18:15:09.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Unrestricted file upload vulnerability was found in \"/music/ajax.php?action=signup\" of Kashipara Music Management System v1.0, which allows attackers to execute arbitrary code via uploading a crafted PHP file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20SignUp.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42778.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42778.json new file mode 100644 index 00000000000..279903e82e8 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42778.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42778", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.003", + "lastModified": "2024-08-21T18:15:10.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Unrestricted file upload vulnerability was found in \"/music/ajax.php?action=save_playlist\" in Kashipara Music Management System v1.0. This allows attackers to execute arbitrary code via uploading a crafted PHP file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Playlist.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json new file mode 100644 index 00000000000..d287dc01304 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42779", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.073", + "lastModified": "2024-08-21T18:15:10.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Unrestricted file upload vulnerability was found in \"/music/ajax.php?action=save_music\" in Kashipara Music Management System v1.0. This allows attackers to execute arbitrary code via uploading a crafted PHP file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Music%20List.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42780.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42780.json new file mode 100644 index 00000000000..d71855e3ab0 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42780.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42780", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.150", + "lastModified": "2024-08-21T18:15:10.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Unrestricted file upload vulnerability was found in \"/music/ajax.php?action=save_genre\" in Kashipara Music Management System v1.0. This allows attackers to execute arbitrary code via uploading a crafted PHP file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Genre.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json new file mode 100644 index 00000000000..153dcc0f2f2 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42781", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.227", + "lastModified": "2024-08-21T18:15:10.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in \"/music/ajax.php?action=login\" of Kashipara Music Management System v1.0 allows remote attackers to execute arbitrary SQL commands and bypass Login via the email parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Login.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json new file mode 100644 index 00000000000..9eca4811a8b --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42782", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.303", + "lastModified": "2024-08-21T18:15:10.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in \"/music/ajax.php?action=find_music\" in Kashipara Music Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"search\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Find%20Music.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42783.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42783.json new file mode 100644 index 00000000000..44f0000f313 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42783.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42783", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.453", + "lastModified": "2024-08-21T18:15:10.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kashipara Music Management System v1.0 is vulnerable to SQL Injection via /music/manage_playlist_items.php. An attacker can execute arbitrary SQL commands via the \"pid\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Manage%20Playlist.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42784.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42784.json new file mode 100644 index 00000000000..705f10b97ed --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42784.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42784", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.630", + "lastModified": "2024-08-21T18:15:10.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in \"/music/controller.php?page=view_music\" in Kashipara Music Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"id\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Music%20List.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42785.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42785.json new file mode 100644 index 00000000000..c07f7173c11 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42785.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42785", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.707", + "lastModified": "2024-08-21T18:15:10.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in /music/index.php?page=view_playlist in Kashipara Music Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"id\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Playlist.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42786.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42786.json new file mode 100644 index 00000000000..4422bde8720 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42786.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42786", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-21T18:15:10.783", + "lastModified": "2024-08-21T18:15:10.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in \"/music/view_user.php\" in Kashipara Music Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"id\" parameter of View User Profile Page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Profile.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43022.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43022.json index 841fa8f50c6..61bebc637b0 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43022.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43022.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43022", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T17:15:08.303", - "lastModified": "2024-08-21T17:24:59.627", + "lastModified": "2024-08-21T18:35:09.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in the downloader.php component of TOSEI online store management system v4.02, v4.03, and v4.04 allows attackers to execute a directory traversal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/b0rgch3n/6ba0b04da7e48ead20f10b15088fd244", diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6728.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6728.json index 73d2a7b8860..cbfa18bec39 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6728.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6728", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-14T01:15:01.940", - "lastModified": "2024-07-15T13:00:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T18:08:50.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jeery0/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.271401", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.271401", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.372856", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6729.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6729.json index 76e9540f65c..e020ffda2dc 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6729.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6729", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-14T02:15:02.117", - "lastModified": "2024-08-06T12:15:52.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T18:07:04.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.271402", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.271402", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.373488", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6736.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6736.json index c5553e6d9cf..15c855d08c0 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6736.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6736", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-15T01:15:02.003", - "lastModified": "2024-07-15T13:00:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T18:14:15.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ljllll123/cve/blob/main/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.271457", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.271457", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.374485", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7613.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7613.json index 26dab8e316a..7b1b8b784d0 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7613.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7613.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7613", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:44.270", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:47:11.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\):*:*:*:*:*:*:*", + "matchCriteriaId": "066BD21A-2694-474D-B885-6E9A2A1DBCFF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/GstDhcpSetSer_bof%26injection", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.273983", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273983", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383691", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7614.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7614.json index 15cd001be16..d1881ac895d 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7614.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7614.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7614", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:44.563", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:48:47.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\):*:*:*:*:*:*:*", + "matchCriteriaId": "066BD21A-2694-474D-B885-6E9A2A1DBCFF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/qossetting_bof", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.273984", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273984", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383692", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7615.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7615.json index 3b248b55bb3..787b6c83d1d 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7615.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7615.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7615", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-12T13:38:44.840", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T18:48:19.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\):*:*:*:*:*:*:*", + "matchCriteriaId": "066BD21A-2694-474D-B885-6E9A2A1DBCFF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/Safe_Client_or_Url_or_Mac_Filter_bof", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.273985", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273985", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.383693", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7740.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7740.json index dc4b22c31c9..6ea0f33fced 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7740.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7740", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T20:15:08.840", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T19:06:30.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ltcms:ltcms:1.0.20:*:*:*:*:*:*:*", + "matchCriteriaId": "78CEEA24-E86D-4BF9-9325-38611B5DE120" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE14-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274360", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.274360", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.386432", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7741.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7741.json index fdc3ed29d5a..a0e2608158f 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7741.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7741", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T20:15:09.127", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T19:07:40.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ltcms:ltcms:1.0.20:*:*:*:*:*:*:*", + "matchCriteriaId": "78CEEA24-E86D-4BF9-9325-38611B5DE120" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE14-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274361", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.274361", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.386433", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7742.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7742.json index c0ba95cf827..672252987ce 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7742.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7742", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T21:15:16.627", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T19:08:47.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ltcms:ltcms:1.0.20:*:*:*:*:*:*:*", + "matchCriteriaId": "78CEEA24-E86D-4BF9-9325-38611B5DE120" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE14-3.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274362", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.274362", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.386434", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7743.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7743.json index 14a33904d14..828e8a64b7b 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7743.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7743", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-13T21:15:17.197", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T19:15:54.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ltcms:ltcms:1.0.20:*:*:*:*:*:*:*", + "matchCriteriaId": "78CEEA24-E86D-4BF9-9325-38611B5DE120" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE14-4.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274363", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.274363", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.386435", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7909.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7909.json index f06215086e5..dff9a55ebc1 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7909.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7909.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7909", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-18T18:15:04.290", - "lastModified": "2024-08-19T18:51:07.600", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-21T19:15:13.487", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -212,6 +212,10 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json index 4288ed34773..65043381aaa 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7949", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.817", - "lastModified": "2024-08-21T13:51:13.580", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-21T19:15:13.600", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -190,6 +190,10 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 46b14a6ec10..cef12c0c8dd 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-21T18:00:17.988484+00:00 +2024-08-21T20:00:17.982029+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-21T17:59:05.793000+00:00 +2024-08-21T19:35:22.120000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260823 +260836 ``` ### CVEs added in the last Commit -Recently added CVEs: `36` +Recently added CVEs: `13` -- [CVE-2024-43027](CVE-2024/CVE-2024-430xx/CVE-2024-43027.json) (`2024-08-21T16:15:08.297`) -- [CVE-2024-43410](CVE-2024/CVE-2024-434xx/CVE-2024-43410.json) (`2024-08-21T16:15:08.373`) -- [CVE-2024-43411](CVE-2024/CVE-2024-434xx/CVE-2024-43411.json) (`2024-08-21T16:15:08.570`) -- [CVE-2024-5723](CVE-2024/CVE-2024-57xx/CVE-2024-5723.json) (`2024-08-21T17:15:08.413`) -- [CVE-2024-5725](CVE-2024/CVE-2024-57xx/CVE-2024-5725.json) (`2024-08-21T17:15:08.607`) -- [CVE-2024-5762](CVE-2024/CVE-2024-57xx/CVE-2024-5762.json) (`2024-08-21T17:15:08.810`) -- [CVE-2024-5928](CVE-2024/CVE-2024-59xx/CVE-2024-5928.json) (`2024-08-21T17:15:09.003`) -- [CVE-2024-5929](CVE-2024/CVE-2024-59xx/CVE-2024-5929.json) (`2024-08-21T17:15:09.237`) -- [CVE-2024-5930](CVE-2024/CVE-2024-59xx/CVE-2024-5930.json) (`2024-08-21T17:15:09.443`) -- [CVE-2024-6141](CVE-2024/CVE-2024-61xx/CVE-2024-6141.json) (`2024-08-21T17:15:09.660`) -- [CVE-2024-6811](CVE-2024/CVE-2024-68xx/CVE-2024-6811.json) (`2024-08-21T16:15:08.783`) -- [CVE-2024-6812](CVE-2024/CVE-2024-68xx/CVE-2024-6812.json) (`2024-08-21T16:15:08.970`) -- [CVE-2024-6813](CVE-2024/CVE-2024-68xx/CVE-2024-6813.json) (`2024-08-21T16:15:09.163`) -- [CVE-2024-6814](CVE-2024/CVE-2024-68xx/CVE-2024-6814.json) (`2024-08-21T16:15:09.357`) -- [CVE-2024-7448](CVE-2024/CVE-2024-74xx/CVE-2024-7448.json) (`2024-08-21T17:15:09.860`) -- [CVE-2024-7600](CVE-2024/CVE-2024-76xx/CVE-2024-7600.json) (`2024-08-21T16:15:09.570`) -- [CVE-2024-7601](CVE-2024/CVE-2024-76xx/CVE-2024-7601.json) (`2024-08-21T16:15:09.757`) -- [CVE-2024-7602](CVE-2024/CVE-2024-76xx/CVE-2024-7602.json) (`2024-08-21T16:15:09.940`) -- [CVE-2024-7603](CVE-2024/CVE-2024-76xx/CVE-2024-7603.json) (`2024-08-21T16:15:10.123`) -- [CVE-2024-7604](CVE-2024/CVE-2024-76xx/CVE-2024-7604.json) (`2024-08-21T16:15:10.330`) -- [CVE-2024-7722](CVE-2024/CVE-2024-77xx/CVE-2024-7722.json) (`2024-08-21T16:15:10.580`) -- [CVE-2024-7723](CVE-2024/CVE-2024-77xx/CVE-2024-7723.json) (`2024-08-21T16:15:10.760`) -- [CVE-2024-7724](CVE-2024/CVE-2024-77xx/CVE-2024-7724.json) (`2024-08-21T16:15:10.933`) -- [CVE-2024-7725](CVE-2024/CVE-2024-77xx/CVE-2024-7725.json) (`2024-08-21T16:15:11.120`) -- [CVE-2024-7795](CVE-2024/CVE-2024-77xx/CVE-2024-7795.json) (`2024-08-21T16:15:11.380`) +- [CVE-2023-29929](CVE-2023/CVE-2023-299xx/CVE-2023-29929.json) (`2024-08-21T18:15:09.173`) +- [CVE-2024-20488](CVE-2024/CVE-2024-204xx/CVE-2024-20488.json) (`2024-08-21T19:15:13.163`) +- [CVE-2024-41572](CVE-2024/CVE-2024-415xx/CVE-2024-41572.json) (`2024-08-21T19:15:13.380`) +- [CVE-2024-42777](CVE-2024/CVE-2024-427xx/CVE-2024-42777.json) (`2024-08-21T18:15:09.930`) +- [CVE-2024-42778](CVE-2024/CVE-2024-427xx/CVE-2024-42778.json) (`2024-08-21T18:15:10.003`) +- [CVE-2024-42779](CVE-2024/CVE-2024-427xx/CVE-2024-42779.json) (`2024-08-21T18:15:10.073`) +- [CVE-2024-42780](CVE-2024/CVE-2024-427xx/CVE-2024-42780.json) (`2024-08-21T18:15:10.150`) +- [CVE-2024-42781](CVE-2024/CVE-2024-427xx/CVE-2024-42781.json) (`2024-08-21T18:15:10.227`) +- [CVE-2024-42782](CVE-2024/CVE-2024-427xx/CVE-2024-42782.json) (`2024-08-21T18:15:10.303`) +- [CVE-2024-42783](CVE-2024/CVE-2024-427xx/CVE-2024-42783.json) (`2024-08-21T18:15:10.453`) +- [CVE-2024-42784](CVE-2024/CVE-2024-427xx/CVE-2024-42784.json) (`2024-08-21T18:15:10.630`) +- [CVE-2024-42785](CVE-2024/CVE-2024-427xx/CVE-2024-42785.json) (`2024-08-21T18:15:10.707`) +- [CVE-2024-42786](CVE-2024/CVE-2024-427xx/CVE-2024-42786.json) (`2024-08-21T18:15:10.783`) ### CVEs modified in the last Commit -Recently modified CVEs: `67` +Recently modified CVEs: `45` -- [CVE-2024-41002](CVE-2024/CVE-2024-410xx/CVE-2024-41002.json) (`2024-08-21T16:18:10.740`) -- [CVE-2024-41006](CVE-2024/CVE-2024-410xx/CVE-2024-41006.json) (`2024-08-21T17:20:57.467`) -- [CVE-2024-41674](CVE-2024/CVE-2024-416xx/CVE-2024-41674.json) (`2024-08-21T16:06:23.153`) -- [CVE-2024-41675](CVE-2024/CVE-2024-416xx/CVE-2024-41675.json) (`2024-08-21T16:06:23.153`) -- [CVE-2024-42369](CVE-2024/CVE-2024-423xx/CVE-2024-42369.json) (`2024-08-21T16:01:03.147`) -- [CVE-2024-42556](CVE-2024/CVE-2024-425xx/CVE-2024-42556.json) (`2024-08-21T16:35:08.730`) -- [CVE-2024-42563](CVE-2024/CVE-2024-425xx/CVE-2024-42563.json) (`2024-08-21T16:35:09.490`) -- [CVE-2024-42572](CVE-2024/CVE-2024-425xx/CVE-2024-42572.json) (`2024-08-21T16:35:10.263`) -- [CVE-2024-42950](CVE-2024/CVE-2024-429xx/CVE-2024-42950.json) (`2024-08-21T17:35:04.793`) -- [CVE-2024-43371](CVE-2024/CVE-2024-433xx/CVE-2024-43371.json) (`2024-08-21T16:06:23.153`) -- [CVE-2024-43407](CVE-2024/CVE-2024-434xx/CVE-2024-43407.json) (`2024-08-21T16:06:23.153`) -- [CVE-2024-5018](CVE-2024/CVE-2024-50xx/CVE-2024-5018.json) (`2024-08-21T16:00:23.410`) -- [CVE-2024-6733](CVE-2024/CVE-2024-67xx/CVE-2024-6733.json) (`2024-08-21T17:00:32.243`) -- [CVE-2024-6734](CVE-2024/CVE-2024-67xx/CVE-2024-6734.json) (`2024-08-21T17:00:52.007`) -- [CVE-2024-6735](CVE-2024/CVE-2024-67xx/CVE-2024-6735.json) (`2024-08-21T17:01:02.657`) -- [CVE-2024-6899](CVE-2024/CVE-2024-68xx/CVE-2024-6899.json) (`2024-08-21T17:30:03.590`) -- [CVE-2024-6952](CVE-2024/CVE-2024-69xx/CVE-2024-6952.json) (`2024-08-21T17:41:15.617`) -- [CVE-2024-6953](CVE-2024/CVE-2024-69xx/CVE-2024-6953.json) (`2024-08-21T17:40:06.063`) -- [CVE-2024-6954](CVE-2024/CVE-2024-69xx/CVE-2024-6954.json) (`2024-08-21T17:38:34.087`) -- [CVE-2024-6955](CVE-2024/CVE-2024-69xx/CVE-2024-6955.json) (`2024-08-21T17:37:00.700`) -- [CVE-2024-6956](CVE-2024/CVE-2024-69xx/CVE-2024-6956.json) (`2024-08-21T17:35:59.550`) -- [CVE-2024-6957](CVE-2024/CVE-2024-69xx/CVE-2024-6957.json) (`2024-08-21T17:33:42.753`) -- [CVE-2024-6958](CVE-2024/CVE-2024-69xx/CVE-2024-6958.json) (`2024-08-21T17:42:29.697`) -- [CVE-2024-7885](CVE-2024/CVE-2024-78xx/CVE-2024-7885.json) (`2024-08-21T16:06:23.153`) -- [CVE-2024-8007](CVE-2024/CVE-2024-80xx/CVE-2024-8007.json) (`2024-08-21T16:06:23.153`) +- [CVE-2024-40129](CVE-2024/CVE-2024-401xx/CVE-2024-40129.json) (`2024-08-21T18:59:09.703`) +- [CVE-2024-40130](CVE-2024/CVE-2024-401xx/CVE-2024-40130.json) (`2024-08-21T19:00:56.183`) +- [CVE-2024-40393](CVE-2024/CVE-2024-403xx/CVE-2024-40393.json) (`2024-08-21T18:13:42.670`) +- [CVE-2024-40892](CVE-2024/CVE-2024-408xx/CVE-2024-40892.json) (`2024-08-21T18:15:09.710`) +- [CVE-2024-40893](CVE-2024/CVE-2024-408xx/CVE-2024-40893.json) (`2024-08-21T18:15:09.803`) +- [CVE-2024-41052](CVE-2024/CVE-2024-410xx/CVE-2024-41052.json) (`2024-08-21T19:27:26.227`) +- [CVE-2024-41053](CVE-2024/CVE-2024-410xx/CVE-2024-41053.json) (`2024-08-21T19:21:41.530`) +- [CVE-2024-41058](CVE-2024/CVE-2024-410xx/CVE-2024-41058.json) (`2024-08-21T19:35:22.120`) +- [CVE-2024-41061](CVE-2024/CVE-2024-410xx/CVE-2024-41061.json) (`2024-08-21T19:34:12.550`) +- [CVE-2024-41332](CVE-2024/CVE-2024-413xx/CVE-2024-41332.json) (`2024-08-21T18:53:15.927`) +- [CVE-2024-42579](CVE-2024/CVE-2024-425xx/CVE-2024-42579.json) (`2024-08-21T18:35:08.200`) +- [CVE-2024-42608](CVE-2024/CVE-2024-426xx/CVE-2024-42608.json) (`2024-08-21T18:35:08.967`) +- [CVE-2024-43022](CVE-2024/CVE-2024-430xx/CVE-2024-43022.json) (`2024-08-21T18:35:09.733`) +- [CVE-2024-6728](CVE-2024/CVE-2024-67xx/CVE-2024-6728.json) (`2024-08-21T18:08:50.630`) +- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-08-21T18:07:04.263`) +- [CVE-2024-6736](CVE-2024/CVE-2024-67xx/CVE-2024-6736.json) (`2024-08-21T18:14:15.270`) +- [CVE-2024-7613](CVE-2024/CVE-2024-76xx/CVE-2024-7613.json) (`2024-08-21T18:47:11.523`) +- [CVE-2024-7614](CVE-2024/CVE-2024-76xx/CVE-2024-7614.json) (`2024-08-21T18:48:47.273`) +- [CVE-2024-7615](CVE-2024/CVE-2024-76xx/CVE-2024-7615.json) (`2024-08-21T18:48:19.590`) +- [CVE-2024-7740](CVE-2024/CVE-2024-77xx/CVE-2024-7740.json) (`2024-08-21T19:06:30.707`) +- [CVE-2024-7741](CVE-2024/CVE-2024-77xx/CVE-2024-7741.json) (`2024-08-21T19:07:40.757`) +- [CVE-2024-7742](CVE-2024/CVE-2024-77xx/CVE-2024-7742.json) (`2024-08-21T19:08:47.707`) +- [CVE-2024-7743](CVE-2024/CVE-2024-77xx/CVE-2024-7743.json) (`2024-08-21T19:15:54.553`) +- [CVE-2024-7909](CVE-2024/CVE-2024-79xx/CVE-2024-7909.json) (`2024-08-21T19:15:13.487`) +- [CVE-2024-7949](CVE-2024/CVE-2024-79xx/CVE-2024-7949.json) (`2024-08-21T19:15:13.600`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b29e4d4dc2c..0015befd83a 100644 --- a/_state.csv +++ b/_state.csv @@ -134006,7 +134006,7 @@ CVE-2019-16217,0,0,064b0f121eb67bb3b2ff4a1bfd319b38c8f3c1b46d29c4c1d72b24a1744e0 CVE-2019-16218,0,0,d9804d9359219f84d5524c4a9bedb163b151ce747216bfc634953e4fb83dea3d,2023-01-31T19:34:50.097000 CVE-2019-16219,0,0,df6f58e2145bd205e45c77c1cb062d96fa6c53e47301d48477169f3a37b75d1c,2023-01-31T19:34:42.450000 CVE-2019-1622,0,0,fc36d0775b40c5b0e8702c0f2750cb116cfb70d55c1db4bfebb1257e979dd040,2020-10-06T19:47:45.983000 -CVE-2019-16220,0,1,97b33819f9233c8fcd04a31c3138b3d5397a4228eaa0a90d56363060be4f0b6d,2024-08-21T16:15:06.657000 +CVE-2019-16220,0,0,97b33819f9233c8fcd04a31c3138b3d5397a4228eaa0a90d56363060be4f0b6d,2024-08-21T16:15:06.657000 CVE-2019-16221,0,0,80b21155eef2cea796e87582860f5f7dea9f7ee1495abe0164244dfec79f371a,2023-01-31T19:34:08.497000 CVE-2019-16222,0,0,94990655f5989849130af88807edc0a4f4cd2d7bc36ebfae1c17de82a3c2ccfd,2023-01-31T19:34:26.617000 CVE-2019-16223,0,0,811340089413300a95a9ee5e869f6677ea3ac7590fa4277b49f2087f5ef7d593,2022-10-07T01:50:00.770000 @@ -146819,12 +146819,12 @@ CVE-2020-11842,0,0,0341f82bc92298980c2fecdf676cf93a6aa4aea6aadcf0c0ab02ee9516b35 CVE-2020-11843,0,0,b19c69b984c81046691cb13cdbe821d32efdcff1216ced249b5cca02d385b8e1,2024-06-11T13:54:12.057000 CVE-2020-11844,0,0,30484315e297bc9fc671ccde41b4cddacde42e3ca4029c7078a2d75feb874221,2023-11-07T03:15:10.640000 CVE-2020-11845,0,0,7e08b7d4c78c56795d5b38717a7a0c67d123b244dfcc98521773ca6a4bf5f2ad,2023-11-07T03:15:10.940000 -CVE-2020-11846,0,1,dbd105608b278005dce235f9afcae972419aa71ee29f31e97b165f4404c659e5,2024-08-21T16:06:23.153000 -CVE-2020-11847,0,1,af1c03a40751a9ee7eb44b7bfb6ba1826029428dfa156c62c34bd99d228dd3af,2024-08-21T16:06:23.153000 +CVE-2020-11846,0,0,dbd105608b278005dce235f9afcae972419aa71ee29f31e97b165f4404c659e5,2024-08-21T16:06:23.153000 +CVE-2020-11847,0,0,af1c03a40751a9ee7eb44b7bfb6ba1826029428dfa156c62c34bd99d228dd3af,2024-08-21T16:06:23.153000 CVE-2020-11848,0,0,8b23a9eceff9959ab288670219d1f6006701c7021ce0c312a1ae7c487d5ba6ee,2023-11-07T03:15:11.227000 CVE-2020-11849,0,0,09295df17fa5dd8adaff1580dbfce546c6c9c519a1569b4961ddc2c9383ed8fb,2023-11-07T03:15:11.503000 CVE-2020-1185,0,0,3316dc17683cc6cc502a5a61a4139663716df73cc9e5aeb1b7b86cd4d9551321,2021-07-21T11:39:23.747000 -CVE-2020-11850,0,1,a880962fc5cb09914969f43c2029ff38c4de972bf755cf56f89f5ef4f32ebcac,2024-08-21T16:06:23.153000 +CVE-2020-11850,0,0,a880962fc5cb09914969f43c2029ff38c4de972bf755cf56f89f5ef4f32ebcac,2024-08-21T16:06:23.153000 CVE-2020-11851,0,0,4ee7500b04ed49333edaab0460360ee6e3c1c64822d3fd6fa5fe961906315d49,2023-11-07T03:15:11.767000 CVE-2020-11852,0,0,112bc0d3fcb0af2373f487930f6d85a8825e32e1638612dc8b7461f6b5afad16,2023-11-07T03:15:12.037000 CVE-2020-11853,0,0,32b8f066baea30ce3a5502342cf34ba35e924476d7f149d54fcc4651ef73cd28,2023-11-07T03:15:12.290000 @@ -187470,9 +187470,9 @@ CVE-2021-47618,0,0,2a314532463f641de5a1abcd70cc0a94c3a5563bdb37f6cd3ebfada5f8416 CVE-2021-47619,0,0,3423ea9cbab93af03ecb9855e0285f5e2851c0e4b6812bafeb4e82921247592c,2024-06-20T12:43:25.663000 CVE-2021-47620,0,0,fb48237cc161b8d736f32b3c4687ae5c6d236eb8a2b8089bbf75bcca0c16df9e,2024-06-20T12:43:25.663000 CVE-2021-47621,0,0,e2a12dc01cb26b616b467be0797cdc4becade42dc6473a1cfae1a845981be942,2024-08-19T17:35:03.327000 -CVE-2021-47622,0,1,1d63636624695cdf93325419218fd644932a974f7e674106d3329295d563b92a,2024-08-21T17:31:30.087000 +CVE-2021-47622,0,0,1d63636624695cdf93325419218fd644932a974f7e674106d3329295d563b92a,2024-08-21T17:31:30.087000 CVE-2021-47623,0,0,51281b2f0091c3f4d7a64df3b524258b3de520fa994b2caf678cd311e53f80eb,2024-07-16T13:43:58.773000 -CVE-2021-47624,0,1,77027762eeac62404a5f01e1332f031001f54107024312a5e6ca732f487bd823,2024-08-21T17:43:52.917000 +CVE-2021-47624,0,0,77027762eeac62404a5f01e1332f031001f54107024312a5e6ca732f487bd823,2024-08-21T17:43:52.917000 CVE-2022-0001,0,0,c7771fc2d861960e86f1fd6d32008510ecf97da9ca69c795218a9bb34cd032b1,2024-04-09T15:15:26.797000 CVE-2022-0002,0,0,383f70837be6118e87e9457e616e4d09f60a1ff845d543b16ebbc8f1078dc94f,2022-08-19T12:28:50.667000 CVE-2022-0004,0,0,e3e425e8f15bba73e3ddeac7007a097fd53c30dc0f781f80718d8d9da4feab39,2022-06-10T20:52:37.810000 @@ -194326,7 +194326,7 @@ CVE-2022-25372,0,0,3afa1032089f61dab3ed154ec03c4c15430a85ef0fc2ac9ae598d4da295d4 CVE-2022-25373,0,0,f3e06aa4cff9c34576c6046792debbf2f880be30c925fe1331c49304d5fd986a,2022-10-07T14:32:48.513000 CVE-2022-25374,0,0,6361adb85d05647b7d10fddecc8e6abc57890f3c4e6fc867653c899551a3768c,2022-08-11T00:25:29.163000 CVE-2022-25375,0,0,f752fdbcccd8ef08cc85b01b5b98d61bc041d81886db14771b5b5984b1a22193,2023-08-08T14:22:24.967000 -CVE-2022-25377,0,0,a03b2324e66f7c1006ce374172e4e4ba20ea613eba31dc10a821a3ca2edc0b2a,2024-02-23T02:42:54.547000 +CVE-2022-25377,0,1,5a781ee5ee6569da0f6eb99b1ffe7b1c3b435e485786b08464508b20b3ae3679,2024-08-21T18:35:00.673000 CVE-2022-2538,0,0,0c12e0f7f9e555340f2f1680d793cf15cc2ee18610a68b91e429f7afca6d5cc6,2022-09-01T06:46:34.243000 CVE-2022-25389,0,0,d42a88a505fd5a7f62a0db54409eb4f5239b80d1324b54d52ca5d77173b51b75,2022-03-26T03:53:33.087000 CVE-2022-2539,0,0,b629d5a5a8c182ad3c6108ecb09d08a47ec4b1ba159188994bd9b96ee182df9c,2023-08-08T14:22:24.967000 @@ -194394,9 +194394,9 @@ CVE-2022-25464,0,0,fa4446c0b87ccc8489496fa2f9dcccfb6f1f7e87309e1719761a02c32bdef CVE-2022-25465,0,0,7cbe3853c67634a1c63754575fe4ed932bd1f0187da78b5a63369dcaa7c4cae1,2022-03-11T15:55:36.710000 CVE-2022-2547,0,0,dbeba4a8b3d68d6d3de10cc461419e2c751bf3e1f6f2ec4f183c6a17312177c5,2022-08-19T01:43:28.157000 CVE-2022-25471,0,0,d59a2094cef30b0a74747ab7cc9d6328094a89833946591fcbe214da809a6cc7,2022-03-09T19:47:15.070000 -CVE-2022-25477,0,1,cb58d5fbadc3ce2e8130355a1d0c1ba5962d29d6450bb3073da88cd563f0e252,2024-08-21T16:11:13.223000 -CVE-2022-25478,0,1,95f7d46191c4f20a5abae2e5ff8c454e2d71584401f0d5df01bd4e5139542f65,2024-08-21T16:09:11.237000 -CVE-2022-25479,0,1,c1f38243d43dfe578688881e64fdb77f8cba1853c2bc4fd3f7cf839089868196,2024-08-21T16:09:09.517000 +CVE-2022-25477,0,0,cb58d5fbadc3ce2e8130355a1d0c1ba5962d29d6450bb3073da88cd563f0e252,2024-08-21T16:11:13.223000 +CVE-2022-25478,0,0,95f7d46191c4f20a5abae2e5ff8c454e2d71584401f0d5df01bd4e5139542f65,2024-08-21T16:09:11.237000 +CVE-2022-25479,0,0,c1f38243d43dfe578688881e64fdb77f8cba1853c2bc4fd3f7cf839089868196,2024-08-21T16:09:09.517000 CVE-2022-25480,0,0,3014168fd7e8c7f2c9484a5386ee047300ee64cc29756299275ad4142894afdb,2024-08-21T15:57:59.397000 CVE-2022-25481,0,0,39cf9a73c463f25981da336ece7b787bc04e88649ca7479c7b1f74ad7e94bf81,2024-08-03T05:16:04.587000 CVE-2022-25484,0,0,07f0b9f1320784b0105d435f5fd3b8eefe70e3aca276722e91dffdd88cfe785c,2022-03-28T20:53:05.180000 @@ -195063,8 +195063,8 @@ CVE-2022-26319,0,0,df89539e33ae729765bbf5708419e9238cd5395f00f3879c2a7d76f26e1eb CVE-2022-26320,0,0,0821ab29948bcb8ff6394127add06f2455ef2463ce545b333685d1b7d5e7ee9b,2022-03-23T15:02:20.840000 CVE-2022-26325,0,0,71c58e61480c4b27374f3a990d8a54d98de2bdee3e9fb84b64281d4b075b3b7a,2023-11-07T03:44:56.980000 CVE-2022-26326,0,0,9ad27885fa0c540266ca1167975a0cab125c731a5ab45882b07301ce6001b68d,2023-11-07T03:44:57.197000 -CVE-2022-26327,1,1,2843eb99ab3a7cb35c3e4a9e16078fdbec9d2d4d6cb6df8ef3bd5b25a9b25970,2024-08-21T17:25:08.560000 -CVE-2022-26328,1,1,ed9be012739926be741dce043bfac02490c3fd33310d2ba7416cb37304c8684c,2024-08-21T17:25:08.560000 +CVE-2022-26327,0,0,2843eb99ab3a7cb35c3e4a9e16078fdbec9d2d4d6cb6df8ef3bd5b25a9b25970,2024-08-21T17:25:08.560000 +CVE-2022-26328,0,0,ed9be012739926be741dce043bfac02490c3fd33310d2ba7416cb37304c8684c,2024-08-21T17:25:08.560000 CVE-2022-26329,0,0,f95c63549f7d43fdb6838bfa7b2ca1a1e49fecbabc0c9b9abd69c3fc81419a15,2023-11-07T03:44:57.537000 CVE-2022-2633,0,0,bae15211c154fcc3bb9979ba7a9032f4e12b8bb98d327ad89cae53791fc1316e,2024-01-11T09:15:45.340000 CVE-2022-26330,0,0,1b013699f20f421af058c55f3843eb6fbb17098dd8fff2d571aec7b53d543c5b,2023-11-07T03:44:57.757000 @@ -211638,7 +211638,7 @@ CVE-2022-47937,0,0,636176527665617f3facff8634e8954d2158730f82a85997de2b9511eefce CVE-2022-47938,0,0,442c25e602433938a9921e75f8e951b83ddd7027b36d46a901abb14bb5ea6d5b,2023-01-23T18:55:50.117000 CVE-2022-47939,0,0,9ba60aa5756ff0c30fab8973f90a56883f8c984d8e5f8b0a23e7965824254a07,2023-05-16T11:03:04.080000 CVE-2022-4794,0,0,a3ec06697be5e9ca32fca3c53d1678a7b25f03dbc9d92c6511a0fa363fa8a372,2023-11-07T03:58:57.833000 -CVE-2022-47940,0,0,e1a8db732f97240d136cb3c3034fc3d0039ccc06574c00026d0fa5b51939c513,2022-12-30T15:52:55.570000 +CVE-2022-47940,0,1,229b78739a766eecb17608ddcb4dc360032312abbc5dc36114ca260a76aba0fd,2024-08-21T18:19:29.143000 CVE-2022-47941,0,0,a960c5c6b7478a38352797f8671155edce8fe893cef852bd8ab843d248171789,2023-05-16T11:03:07.537000 CVE-2022-47942,0,0,29eecf09da3516358fd7280399596a1d1954d9a61b850522c2552abd8ebaaa2c,2023-05-16T11:03:10.667000 CVE-2022-47943,0,0,4e1e7ead652d3a42100c80f087bde274ea4b62e5ad6d277d6672d96ed7d8563e,2023-05-16T11:03:14.360000 @@ -212269,18 +212269,18 @@ CVE-2022-4877,0,0,7be088f764e81f3d159b624bbe89e382d534c3a5b5b12bd3cddcbca9b76598 CVE-2022-48770,0,0,c1d7d83fd1642cff8a855525ca26bcc6079d73fb16b8d7f896bc8d7f51eac629,2024-06-20T12:43:25.663000 CVE-2022-48771,0,0,a8deacbe046a73aa8a794ce68776d42685618f7346517abbe96cfaf42a525dde,2024-06-20T12:43:25.663000 CVE-2022-48772,0,0,825ad0b7596b25819d7b86965164bb12e2585ef24c7e39d20b3372592bbe9a0d,2024-06-25T18:50:42.040000 -CVE-2022-48773,0,1,dc19342bce35f737a0d55bbca86132f56db1115e6627671efed3de2bb7534729,2024-08-21T17:45:26.867000 +CVE-2022-48773,0,0,dc19342bce35f737a0d55bbca86132f56db1115e6627671efed3de2bb7534729,2024-08-21T17:45:26.867000 CVE-2022-48774,0,0,da71c85f24cdf9bc921c3d339b713f4ee60d227e6dab069d48721a29377e0e3f,2024-07-16T13:43:58.773000 -CVE-2022-48775,0,1,2acb46b961b5a6a98400ee899a0271b90d0006fde257656a51a219503be9ebd4,2024-08-21T17:47:10.263000 +CVE-2022-48775,0,0,2acb46b961b5a6a98400ee899a0271b90d0006fde257656a51a219503be9ebd4,2024-08-21T17:47:10.263000 CVE-2022-48776,0,0,893198e6ce5b87d6fcbfe9bc4c8bb366e00f9c75f1eab9b7f2694e999d3ee514,2024-07-16T13:43:58.773000 -CVE-2022-48777,0,1,830cdb53c9b73e969d2dc50a8fae272c4cde81d156eacd00732a3b9bd6316f81,2024-08-21T17:52:44.367000 -CVE-2022-48778,0,1,cf80129bac53c697067af006cd31eeb61d796e99bba997a50ccafd500fb3fa60,2024-08-21T17:59:05.793000 -CVE-2022-48779,0,0,97d9d0eb3827fa1226e1fba33985b873f2171577e05e18972d57ccca28c3a039,2024-07-16T13:43:58.773000 +CVE-2022-48777,0,0,830cdb53c9b73e969d2dc50a8fae272c4cde81d156eacd00732a3b9bd6316f81,2024-08-21T17:52:44.367000 +CVE-2022-48778,0,0,cf80129bac53c697067af006cd31eeb61d796e99bba997a50ccafd500fb3fa60,2024-08-21T17:59:05.793000 +CVE-2022-48779,0,1,12c7c14756703808df47072b1211231bfd942ce7126ba4f8493f4852c1585db9,2024-08-21T18:00:53.417000 CVE-2022-4878,0,0,fb05127321f1dbc90cfbd12f64590320f5f815bf94532155a8a99445e7198622,2024-05-17T02:17:00.683000 CVE-2022-48780,0,0,b117f40454daee066e1fc26a32af7cc957d4703e741175087709e91e884ce0cf,2024-07-16T13:43:58.773000 -CVE-2022-48781,0,0,6408c15ad3bd12f7ea86f2e508b6092d1f4c6f15d3a88198b0f4350507fcc1aa,2024-07-16T13:43:58.773000 -CVE-2022-48782,0,0,da1832c30827cf4c6c99fc472b1385e96bc8af5a34c80363290b8a961feaee04,2024-07-16T13:43:58.773000 -CVE-2022-48783,0,0,999d4d2fa331d55c46b0060f393da2d815064eb4d63c8d1adc15b12ebfcd92dc,2024-07-16T13:43:58.773000 +CVE-2022-48781,0,1,73b1a0e4e12eaa999501e6fe9340fcf850bd0f95f1f33b67bb67fb3428e49c9b,2024-08-21T18:01:51.267000 +CVE-2022-48782,0,1,83e23cc6024fc3aa2a6c1e6bc030287e0e4a269359df30c12b90d0e0f29d0b01,2024-08-21T18:02:33.843000 +CVE-2022-48783,0,1,98b96c894064ae5b14616312ff7bad26f9c609e777ddd1d154850db58db33bbd,2024-08-21T18:03:24.540000 CVE-2022-48784,0,0,5258aaafda307edeed3c9a3b307ec01e840379f7f29969631856afc65e4f5dbc,2024-07-16T13:43:58.773000 CVE-2022-48785,0,0,0adcbd4fa3a41d134b7ab19221818594e5ed82b16ebc039c296bffa582d73508,2024-07-16T13:43:58.773000 CVE-2022-48786,0,0,7d7c573b97f8855425dfbc3317804fd84cd7695d623ea48985f5896e1607970b,2024-07-16T13:43:58.773000 @@ -212299,7 +212299,7 @@ CVE-2022-48797,0,0,fcc023da4e4ebc8d61e2d441a12dbd9491041100b065e9fa0f2767a71d864 CVE-2022-48798,0,0,d1152ada4c21c5b163c0d3e9731d5a9f61bf5130232a6f0fb85b6a8d67afc41b,2024-07-16T13:43:58.773000 CVE-2022-48799,0,0,ca82b2a4ed9342b37b95b87fe963d9358abb6b9b25c6c909bb1a6783d9900299,2024-07-16T13:43:58.773000 CVE-2022-4880,0,0,4ba00f45fa60e84e17646df0b31022c326d2de77554d7c7bed348aaf66eba2e8,2024-05-17T02:17:00.927000 -CVE-2022-48800,0,0,bcf9dbb0e52a4369a5e8f9bccfac0658d06ffbe7059f656780b27fbadc47dba9,2024-07-16T13:43:58.773000 +CVE-2022-48800,0,1,5bffec658ed745e51d5459e4aea9ac8807866d47f5990e78bf7633d4d1764443,2024-08-21T18:04:42.103000 CVE-2022-48801,0,0,6653f1f5cf0e260b8c6a7c11277b02305adc16a1936040a89c4ab1b97527a852,2024-07-16T13:43:58.773000 CVE-2022-48802,0,0,9a5cfaff9acf94bf883296dd5ba65bc3c4b5cb5bacd82a666569b25935f67533,2024-07-16T13:43:58.773000 CVE-2022-48803,0,0,b4abff8be2e0f42801670ccff819cb36f420c74818031cf95a4f7137a7cf8225,2024-07-16T13:43:58.773000 @@ -213625,7 +213625,7 @@ CVE-2023-1190,0,0,e31de81f7acd3a9a3daf93bd4e7617fb352f13f737cbfe3f936e1529f250e8 CVE-2023-1191,0,0,63ef8c869750311a99b3704a8c3cdcb68365330502998f1f566afcf1e31d7b4d,2024-05-17T02:17:53.347000 CVE-2023-1192,0,0,dc0548ad6de408a7d5be2fffbdbcf4aebb63044fe81a7e86f3034a7170d73ac2,2024-03-07T17:15:09.620000 CVE-2023-1193,0,0,7bd37bcdebf587c410b4cda3afd616c7e6d50171d9d012d1f3bffb9b8827db09,2023-11-09T15:13:51.737000 -CVE-2023-1194,0,0,7646caa1e8b6c1386601e977eb7d254c99f89a1486c5e66d952148884695f67f,2023-12-21T22:15:08.460000 +CVE-2023-1194,0,1,0e0deb4c27aa6a24aa17cf117ca9e4e1f4848b1203b782ca35f1deb2e3ae9cb3,2024-08-21T18:20:30.137000 CVE-2023-1195,0,0,a6e9afb70b2b4637ca87741d57b4478bb172b65a3d019182df690af84bac9529,2023-05-26T18:27:29.387000 CVE-2023-1196,0,0,3b78ce5b21fe15fac3a0849f302e5d9d359e6cc2fff7986ef1f5d62bd790bd32,2023-11-07T04:02:50.747000 CVE-2023-1197,0,0,95adf7f63914afb96db7936aec3afe63bb42aee3fe13d0ab63112aa1aad7da8b,2023-03-11T03:30:53.137000 @@ -222525,6 +222525,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000 CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000 CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000 +CVE-2023-29929,1,1,ba752222632cdb8d13b351c9bce670a2fd57c75847ff6c6144d5c674fdf31bfb,2024-08-21T18:15:09.173000 CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000 CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000 CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000 @@ -224155,9 +224156,9 @@ CVE-2023-32245,0,0,b006dcad499643997f59b967ed8620eb8689245fc3a80c90f10d9e156aee4 CVE-2023-32247,0,0,6ed61dedd90284bab675cfd007656c22e76a5281d18c8e0b6ae0d0c320230d6f,2023-12-04T14:55:19.007000 CVE-2023-32248,0,0,a5d678c7b7103547aa2939c989f1036addae6cfeaed1fc01872c0756f6eccb2d,2023-12-04T14:54:50.907000 CVE-2023-3225,0,0,900a6da755c932fc51f406ca2354a5ccef9c3b9baa8b65bd7ef2e31abe56ece2,2023-11-07T04:18:15.240000 -CVE-2023-32250,0,0,297ff2aa372dff1ab6f3d73bd1bb5b0709a87544a12ae4b8544e15679d77af0f,2023-12-12T14:39:13.577000 +CVE-2023-32250,0,1,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000 CVE-2023-32252,0,0,d58cdd6d41b61e01636cbce96c5c95617a1fb413e4534a05ad59e2763a4df396,2023-12-04T14:53:38.480000 -CVE-2023-32254,0,0,6b5a253dae340d013a30e4c0e2bc9d0dbd766e23c41ae4377f9468af84792ca7,2023-12-12T14:38:38.447000 +CVE-2023-32254,0,1,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000 CVE-2023-32257,0,0,e863f95271bbd102a1dbc5990b29c3c9bedfb59faca99d10f3fe80d80959dfb3,2023-12-22T17:06:02.047000 CVE-2023-32258,0,0,1b7d9e9ed9a24d4763f3dd34c86ff525f58eabf344847aa293dd4e794e241b4a,2023-11-17T18:29:58.827000 CVE-2023-32259,0,0,63d94242b8b0d4e358593674a90324955b50adf4e3d50cf943b4320e76d2c808,2024-03-19T16:33:58.680000 @@ -229443,7 +229444,7 @@ CVE-2023-39187,0,0,1e2f733c364a0a935eea976f809c932a5620ee577865f260905a21785deeb CVE-2023-39188,0,0,1dbe43eb2ae9b7e031bfedfe5eabb7f022b67670006ce52b6150a1df4bea9a6e,2023-08-10T15:29:47.423000 CVE-2023-39189,0,0,49d56177e5708f7f33ecf8ec1adabceb1b19cbdf48fe7ad376718f05cd14641a,2024-05-22T17:16:03.030000 CVE-2023-39190,0,0,873a8a713e33526ba780ab65f9b512961ce53d2b57a22906d0fe6e897429416f,2023-11-07T04:17:27.090000 -CVE-2023-39191,0,0,4c8ed668cda50d4c99151793b41f7c0761ca331238fdc96e34f3aeac2e04fb53,2024-01-25T20:15:35.643000 +CVE-2023-39191,0,1,6a4baa34024e89c4461316ec374ac75a258ce9aa13502df00389ca7d217f014e,2024-08-21T18:16:34.433000 CVE-2023-39192,0,0,a6fe9cdcd9d48f80b49bf3c89938353607cdae62056604114c8179f6c266befe,2024-05-22T17:16:03.250000 CVE-2023-39193,0,0,3ad8b95389e83b92a344cb4402538f60b8731f4ce39ac2e8734cb37a8afd18cb,2024-05-22T17:16:03.400000 CVE-2023-39194,0,0,2030f9410aac6066f150fa3941eec569327600cbe4908600bc63b6e2de0988f7,2024-05-22T17:16:03.547000 @@ -231837,7 +231838,7 @@ CVE-2023-42298,0,0,325bd6dcacae03a8901546ecf6a68800fcd55993f137c16c4a30439b947a3 CVE-2023-42299,0,0,b79e66f9e9bb5bdc9d54054f3ebc7185aeb1754cc53451dcffd1ae15c07339f7,2023-11-10T04:12:40.023000 CVE-2023-4230,0,0,4967c66ffa7c5bf64ae519d8870b972b3f945d6d22d2a1979da49242c09e7efd,2023-09-01T17:12:36.097000 CVE-2023-42307,0,0,5fa4879b7a758f2464953629284a4551a3498c385f632cac8def5b03ec6db753,2024-03-13T12:33:51.697000 -CVE-2023-42308,0,1,3f6f62e7346fde4d116b4df82668d254e9367e62f9bf0a67af0cef27f85e59f8,2024-08-21T16:35:00.997000 +CVE-2023-42308,0,0,3f6f62e7346fde4d116b4df82668d254e9367e62f9bf0a67af0cef27f85e59f8,2024-08-21T16:35:00.997000 CVE-2023-4231,0,0,5976e141bff0004dec67fac64b9b67ccaf573de12ea4dd0cec06ce30924d7e32,2023-09-20T15:34:03.560000 CVE-2023-42319,0,0,f1a8ad673cf0d82b4b9a41e959ce42527dce3528d5d4253718fc8c311fcb1beb,2023-10-25T17:39:00.483000 CVE-2023-4232,0,0,debbd2aed7d29cbc7fc6d9ba25bfdc68f7d2c098abdc58f1fe1b453514486b05,2024-04-18T13:04:28.900000 @@ -239235,8 +239236,8 @@ CVE-2023-52881,0,0,6fd8affdcc64e7515585a36e8830d44119718460b76d8f8a6eab4860fa38e CVE-2023-52882,0,0,e51efc18668383cabb6a1a97b2fa54b9809b5bd71d28b08d72a7fdf9caf29900,2024-06-27T14:15:12.840000 CVE-2023-52883,0,0,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b74d7,2024-07-03T01:44:10.627000 CVE-2023-52884,0,0,bbf325b5c1ed57a9d1f4ab6303e0df9c8a8b60b96f00c7266f34fe596a2f1382,2024-06-21T11:22:01.687000 -CVE-2023-52885,0,1,ba54ce0f1e6cfdb0c3068ff6239477d1947ca1e313d076509a55e33f062d9169,2024-08-21T17:03:01.107000 -CVE-2023-52886,0,1,83b61df55327135062e5e522c73f391153e99ea45d147df2c64cdb19c2b2b0e2,2024-08-21T17:28:49.267000 +CVE-2023-52885,0,0,ba54ce0f1e6cfdb0c3068ff6239477d1947ca1e313d076509a55e33f062d9169,2024-08-21T17:03:01.107000 +CVE-2023-52886,0,0,83b61df55327135062e5e522c73f391153e99ea45d147df2c64cdb19c2b2b0e2,2024-08-21T17:28:49.267000 CVE-2023-52887,0,0,cb846ee4e76e369153e430accd03bef53983c1edb90492817231cbcbd98213a5,2024-07-29T16:21:52.517000 CVE-2023-52888,0,0,22b49aaad0de331d634875ed02b1dd2b64a739107c93a24ad94d1777a415da3c,2024-07-30T13:32:45.943000 CVE-2023-52889,0,0,ad1cde02a64052b28564d8e8a7e2af925007327c5229809929326bf9b8081627,2024-08-19T21:19:16.970000 @@ -242922,7 +242923,7 @@ CVE-2024-2008,0,0,9a3dfffdf84cbaecec5e4ac83fc5a2438eae99d0d114b1045bad131ec57012 CVE-2024-20080,0,0,90f248eed6a75fce7971996f28983ff9968e454d013e84d03f8b65c25bdd5601,2024-08-01T13:46:18.790000 CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000 CVE-2024-20082,0,0,56503a8297b29c06a4779b6ce0cb09b68c0c4128ced5292c021ec15204e93c22,2024-08-14T15:35:04.003000 -CVE-2024-20083,0,0,115a0278a8340bdf9f4aa376abba3ce34797850570a6b3263534130983a3285e,2024-08-14T13:00:48.243000 +CVE-2024-20083,0,1,d9b832ff5357fbfb0bb330afe0c52fd472ba2f26e66518e0a2caf3dcf4f28daf,2024-08-21T18:35:02.057000 CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 @@ -243035,7 +243036,7 @@ CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000 CVE-2024-20368,0,0,11ba77e6ca928b43fcf33bd9b64c67655ca382b15bfec85a328bbca787a43cf3,2024-04-03T17:24:18.150000 CVE-2024-20369,0,0,e23910e4adf6ac7fe444b246c85eb12e2e56e7b12054f1339b9256c8ec4ec112,2024-05-15T18:35:11.453000 -CVE-2024-20375,1,1,4fb6a21322317958d1ec43ef32dae141f64d5f5ef4f23637bb1872494c1b6f8a,2024-08-21T17:24:59.627000 +CVE-2024-20375,0,0,4fb6a21322317958d1ec43ef32dae141f64d5f5ef4f23637bb1872494c1b6f8a,2024-08-21T17:24:59.627000 CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc478,2024-05-01T19:50:25.633000 CVE-2024-20378,0,0,1d0c211142ee7b64cb979c7d6fe81a8dda4cc3d613763c0904f9ebf5643e5461,2024-05-01T19:50:25.633000 CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0ec,2024-05-24T01:15:30.977000 @@ -243071,6 +243072,7 @@ CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 CVE-2024-20479,0,0,e43b191fa2d4610d4436c6122b2a02d0645e504181a7e15baaa05c8cae8fe0da,2024-08-07T19:09:46.290000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 +CVE-2024-20488,1,1,191a528b2731fcf6221ed8ee98d54e34833f14ec3a1b6a134d9d25daacb35ac0,2024-08-21T19:15:13.163000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000 CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000 @@ -244000,7 +244002,7 @@ CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559b CVE-2024-21687,0,0,376ba9a42cfc804d783dd58059d1accf85ade36be58bc6e24e95588c80302a09,2024-08-01T13:46:48.050000 CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000 CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000 -CVE-2024-21690,1,1,7048d2ab1fbd019dd6cf299008c12072d2685cd19cd0b940e71ae4cebaf012a0,2024-08-21T17:25:08.560000 +CVE-2024-21690,0,0,7048d2ab1fbd019dd6cf299008c12072d2685cd19cd0b940e71ae4cebaf012a0,2024-08-21T17:25:08.560000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 CVE-2024-2171,0,0,e9c79cd9676afcf55166b18cc4887c5a70983811183f36611429f962ee8d8a26,2024-06-07T14:56:05.647000 CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000 @@ -244438,7 +244440,7 @@ CVE-2024-22273,0,0,bbfe4422f6a695e0d7f4adf7fd8e62a3d62f7c38479d626b031b977da5895 CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000 CVE-2024-22275,0,0,4e0b17231c07cc777231dbb9d62f6bfa759cfc82db650243f36e18a0ee106c1b,2024-05-22T12:46:53.887000 CVE-2024-22276,0,0,419203f50311fd388fe713fe6b9bd9748f16b9b808692bb6bb617d18f1b85850,2024-06-28T10:27:00.920000 -CVE-2024-22277,0,1,58ae5d0e4105b74890ddefb8230f50e402808e8f123d8f12b678d28eac27f1bc,2024-08-21T16:12:46.790000 +CVE-2024-22277,0,0,58ae5d0e4105b74890ddefb8230f50e402808e8f123d8f12b678d28eac27f1bc,2024-08-21T16:12:46.790000 CVE-2024-22278,0,0,f35dc006103cc663388ce8b4cff5063958c5dfc051683cc0f74cfb0c3db3bfcd,2024-08-14T22:15:04.253000 CVE-2024-22279,0,0,5d8aa0dbd91af7dcc363b8a8ffff6d2d8af807d5702d0e6e6114610449201025,2024-06-12T18:04:20.147000 CVE-2024-2228,0,0,4ca7747914203ad7b21ad0d53afc1cc8d90ca3afc5fa0d3e8fdef13a47d40ae2,2024-03-22T19:02:10.300000 @@ -245676,7 +245678,7 @@ CVE-2024-24199,0,0,7ba43404c5022da254878ea129b205d46b0f249a8f3526c8415be3cc2a20e CVE-2024-2420,0,0,13b83832dbf3c227f1bb0a786d7224f8bb2d919ddb4e3730a2d048cbbb3f3674,2024-05-30T18:18:58.870000 CVE-2024-24202,0,0,668325610a66240d6d1186abf034222333d655c33a74fab67ccef821464427c8,2024-08-19T20:35:04.473000 CVE-2024-2421,0,0,d6a9f4a7ca738e43373fd351f7d51d46e3ad2798d84cdbebb07a7724c675a343,2024-05-30T18:18:58.870000 -CVE-2024-24213,0,0,d5ccd9f708e2b9d65c48f3e32baebad9ccd6f168c64cfcf1e8034880e685b5c1,2024-08-19T20:35:05.230000 +CVE-2024-24213,0,1,287278b021309aa035f3a4bd904869bf5f79125ed1840b3f7786eee9a7e710d4,2024-08-21T18:06:24.633000 CVE-2024-24215,0,0,85b457ffd0214deceb92715f93f3b98e9ac0926a8e517f205498cdcd7f026571,2024-02-15T18:08:47.813000 CVE-2024-24216,0,0,cc96bdba0be53e21ec4f72b549cd1780854565b7b4a6c5081be7a211ccd03725,2024-02-08T13:44:21.670000 CVE-2024-2422,0,0,3cd5f28c31482f281d8aa1c4c5b76e9420ca9d6bd73cdb7ceb049f2a4aab7203,2024-05-30T18:18:58.870000 @@ -246653,13 +246655,13 @@ CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73be CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2bab0f,2024-08-13T19:35:05.710000 CVE-2024-25831,0,0,5b9f73c2b189e5dd33d90886632cdb674cb173750266ada8e06c07c01ebdf635,2024-08-20T20:35:09.747000 CVE-2024-25832,0,0,a4448e0b7fded4d69ae19d5a812394b0dfee60300a31f6c0311dd994464f2ea8,2024-02-29T13:49:29.390000 -CVE-2024-25833,0,1,b51394028b2e438a7195762bbea65216839d5c40b4973445f19556678b890008,2024-08-21T16:35:02.683000 +CVE-2024-25833,0,0,b51394028b2e438a7195762bbea65216839d5c40b4973445f19556678b890008,2024-08-21T16:35:02.683000 CVE-2024-25837,0,0,ad7d9c7c2df86362ce1fb90c6e14af3076a01961d6031fa4b4699cf7d18f98dc,2024-08-19T13:00:23.117000 CVE-2024-25839,0,0,b292ed69a69a89261805c11d0ab816be1464bb7d24dcdc630e86eded8b8dd6c4,2024-03-04T13:58:23.447000 CVE-2024-2584,0,0,dd550e2c3dd90cf91d2a8279de69803860a7180796c6bc877e47cf73e9bebe16,2024-03-18T19:40:00.173000 CVE-2024-25840,0,0,0ec9234af1bcd2e4f8f49d2790368c3158903e7d9ad6bfc706120341ee9e28f6,2024-02-28T14:06:45.783000 CVE-2024-25841,0,0,1e884690076a8543014dd1ef44f68620ac511f194d49881f814cb46199163cf6,2024-02-28T14:06:45.783000 -CVE-2024-25842,0,1,879059a526422c3229bcab4008d9de7b4b9aa3260c695660b9b79560bfbb710d,2024-08-21T16:35:03.457000 +CVE-2024-25842,0,0,879059a526422c3229bcab4008d9de7b4b9aa3260c695660b9b79560bfbb710d,2024-08-21T16:35:03.457000 CVE-2024-25843,0,0,b7ce35c602cb66544422a9541b1ca352e3e23db5766bb19933b8ddd232d2536b,2024-02-28T14:06:45.783000 CVE-2024-25844,0,0,1efbddea52e96516cb009d14a44c252f988b870416e9c0cb454ea358f81c127b,2024-03-04T13:58:23.447000 CVE-2024-25845,0,0,951e74ea3ea891e8023acd490009fca43f510ba7102419911edb4e33d96aa8f4,2024-03-08T14:02:57.420000 @@ -248013,11 +248015,11 @@ CVE-2024-27361,0,0,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea CVE-2024-27362,0,0,9d431a1116edfb20ae4c799537e5e9f5d11ebb0847e9e8bdd27f35d143873f1d,2024-07-12T14:58:02.413000 CVE-2024-27363,0,0,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000 CVE-2024-27370,0,0,d787ca1729f6374f316c8229cfb768db5a8087155da314897f8dbb9bbd830bc1,2024-08-20T16:35:05.843000 -CVE-2024-27371,0,1,9f9543c2ab901d26d97e0899583296b8d79cc83789296e1252e008496317a15f,2024-08-21T16:35:04.317000 +CVE-2024-27371,0,0,9f9543c2ab901d26d97e0899583296b8d79cc83789296e1252e008496317a15f,2024-08-21T16:35:04.317000 CVE-2024-27372,0,0,8907778c9fe6bbf87ab271d97dfb25ffd83018598cb715d55ddafede9aab4b45,2024-08-15T16:35:04.970000 CVE-2024-27373,0,0,926b1693c40cbc7615a0104dedd662ab64cdcfcf8165af55d6f5779ef02107a9,2024-06-27T16:41:34.797000 CVE-2024-27374,0,0,3b34220f69671b36a06fb2439f20f7eba7d2c207b7eb01a9af38b33fbd61591b,2024-07-03T01:50:34.903000 -CVE-2024-27375,0,1,92b9c639cd4b226c16e0cd751bae68e4dce25c06f4a3d76f82cfae0dd2d80c3f,2024-08-21T16:35:05.110000 +CVE-2024-27375,0,0,92b9c639cd4b226c16e0cd751bae68e4dce25c06f4a3d76f82cfae0dd2d80c3f,2024-08-21T16:35:05.110000 CVE-2024-27376,0,0,1ebdae80fd106c46f58011a1d5c59bf22bfdb9b800f242b56a2c59476db70d2d,2024-06-27T16:22:54.273000 CVE-2024-27377,0,0,205bfc682cd648dbb3fb004eed7bf03dcc0ffb1f33bab861ae1bacec7e440779,2024-06-27T16:01:21.063000 CVE-2024-27378,0,0,4bf6a7b64829709b7bd4a760a5c4864b781f81281af53f42fd40eaa4cf813990,2024-06-27T16:01:59.023000 @@ -248447,7 +248449,7 @@ CVE-2024-27997,0,0,38211b675f4409064c6233281099da5f5fa00ff059690325dad2c59b915c0 CVE-2024-27998,0,0,4b6f230fe964647fb680f6367b279bba522ac93005c2e8f6d523205374f3e144,2024-03-20T13:00:16.367000 CVE-2024-27999,0,0,eb71f5e78ce23e710caf587ffd7cde1246a6fc9b58a11c7b1c6cbe38842e0f52,2024-03-28T12:42:56.150000 CVE-2024-2800,0,0,74596529ca280c923328b734bd86866fc7dbc2558ef74b7cae183f2eae3e1b3f,2024-08-08T13:04:18.753000 -CVE-2024-28000,0,1,08efb1b1c95d7a361c37476c4accc51182840d3e3d04306b3a327b733e837865,2024-08-21T16:06:23.153000 +CVE-2024-28000,0,0,08efb1b1c95d7a361c37476c4accc51182840d3e3d04306b3a327b733e837865,2024-08-21T16:06:23.153000 CVE-2024-28001,0,0,769e60058cb29be891e3bd26013be397b6ae5a2c1de4b96ae3237e85af5cdd26,2024-03-28T12:42:56.150000 CVE-2024-28002,0,0,979c468740a66c74eeb1c5784ee90077b381a78255d231d99fff807000c5cb6b,2024-03-28T12:42:56.150000 CVE-2024-28003,0,0,bcd81510a407f30bd1be1a23c4e2407dda3d4099189594d6f9ca0831debc8ffd,2024-03-28T12:42:56.150000 @@ -248694,7 +248696,7 @@ CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030 CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000 CVE-2024-28339,0,0,e7edfb08e526caa3026f659d21730d02e6fceb32876a36cf2d55238da5d3b5b6,2024-03-12T17:46:17.273000 CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000 -CVE-2024-28340,0,1,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000 +CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000 CVE-2024-28344,0,0,07e206e8ae7b1052e93419db971a4a320fe24d9f630cd6feb731f0be928f9073,2024-07-03T01:51:39.137000 CVE-2024-28345,0,0,cbc92eac79dc638752aecc227342bc11a12121c68c4f31449456d516f3ae7ce1,2024-04-10T19:49:51.183000 CVE-2024-2835,0,0,91e1bef30b109ae6896eca4566686f034d0870ed7f02116f35133cb576984e90,2024-05-20T15:17:54.513000 @@ -248858,7 +248860,7 @@ CVE-2024-28735,0,0,004afab27d51efc6ac1b999df3e4f3751a9bc81de88a92938e218f69e07ed CVE-2024-28736,0,0,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888897,2024-07-03T01:51:49.307000 CVE-2024-28739,0,0,36caa1134a8a7b2783edbb7df33b4da4cf1e215d5eea570ae15bc02fd363246e,2024-08-12T18:18:17.717000 CVE-2024-2874,0,0,80b110f5e4061aa4b7108ad521bebbe850331343538d6ef70c9be87fbdfcd4cf,2024-05-24T01:15:30.977000 -CVE-2024-28740,0,0,828c63e17a66fa4cadbb23231d1ca9181a080d393e3a1f53175371eb551af743,2024-08-12T18:19:33.337000 +CVE-2024-28740,0,1,5f70f267e5a95ad5a027628a10c98f8169f84e918b27fa20ab04ed5ecaa1e182,2024-08-21T18:35:02.877000 CVE-2024-28741,0,0,795f862a6d9ed04b0207def6b2b416a0cc650c64f2309e9860cb5b0d520d30f6,2024-08-15T15:35:08.427000 CVE-2024-28744,0,0,6de1af81e457c114bae7b1738d6658348e92bf9c2953cae361b0b30d06e054f6,2024-08-01T13:49:15.900000 CVE-2024-28745,0,0,da878c5f5cc0e7f2e4abb5594a05991a98129a08d42ab910eae7e36c68d7e661,2024-03-18T12:38:25.490000 @@ -252276,8 +252278,8 @@ CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c CVE-2024-33653,0,0,265fc534e8717f316164edd35fe39b65af5bd4a9e2599f020b58283bd3269b45,2024-07-09T18:19:14.047000 CVE-2024-33654,0,0,0892ef25c45719b53efeedb9f6ebabbe65a8f1a2df54c2a179e8dc18f8e5c732,2024-07-09T18:19:14.047000 CVE-2024-33655,0,0,5b78877100297f0da919505636ca4a0c13bc834698615142818e1b1740a1898b,2024-06-10T18:15:34.520000 -CVE-2024-33656,1,1,4dba07a4d7c3975860634650cad6a2f6ef65414eb84506eae92fb7aa2b8aafe0,2024-08-21T17:24:59.627000 -CVE-2024-33657,1,1,16f4d3f5fb15d93af789c743eaccd0cb6f8039f81c1fd99ea9692086f0dcc089,2024-08-21T17:24:59.627000 +CVE-2024-33656,0,0,4dba07a4d7c3975860634650cad6a2f6ef65414eb84506eae92fb7aa2b8aafe0,2024-08-21T17:24:59.627000 +CVE-2024-33657,0,0,16f4d3f5fb15d93af789c743eaccd0cb6f8039f81c1fd99ea9692086f0dcc089,2024-08-21T17:24:59.627000 CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000 CVE-2024-33661,0,0,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 CVE-2024-33663,0,0,db8b0a89295da87b904c35495b8dabe0be3c83ae5d78acd0b06dd2958ec2a318,2024-08-01T13:52:05.147000 @@ -252851,7 +252853,7 @@ CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16a CVE-2024-34471,0,0,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000 CVE-2024-34472,0,0,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000 CVE-2024-34473,0,0,43374aed676f28dde9bbbef2a52ca305b9ed3cc132864c1fcb62c3381af2a62a,2024-05-06T12:44:56.377000 -CVE-2024-34474,0,0,af6bfd7b3c0524f90298af09605d739b460150f45bc5b4634b5aac256384cc1a,2024-05-06T12:44:56.377000 +CVE-2024-34474,0,1,6e1deb46e9a08c506cb3ac842207bea635d1ff5b91cd6c8644c3d105a2f41019,2024-08-21T18:35:04 CVE-2024-34475,0,0,3c160241762503df55acb87d7d14b9c9456523cbc048b20e9117848219522386,2024-07-03T02:00:14.950000 CVE-2024-34476,0,0,0e840da90ac72a5275cc1cab81863ba6c9d8f821141193be8bf66abb3acfdeaf,2024-08-01T13:52:23.687000 CVE-2024-34477,0,0,5d1de91fef7cafecd3b029f0bcee8de7cabdae801a9f3bc40e1b3eaf6a48cb39,2024-06-07T14:15:10.293000 @@ -252875,7 +252877,7 @@ CVE-2024-34508,0,0,5e2673a670e4b77b4a9c2499c88b60b0bcbf7731c3422764416c91ccda5ee CVE-2024-34509,0,0,3c941906fb696827a87e0e982c58b61c6ffdbf8aab60ea7334047097893c0c53,2024-06-28T19:15:05.630000 CVE-2024-34510,0,0,f301d8a0b574cf2dd7da2898e3fb90be94f70986543df229a4b66158f19cfd10,2024-05-06T12:44:56.377000 CVE-2024-34511,0,0,c1d20a47728b6c5526364d02e8958d8fb0539448423cf5c76333bac10d97f143,2024-05-14T15:39:15.780000 -CVE-2024-34515,0,1,114cbd02c999812d58d1b5d8c0232cb5a70990aca8005cfe1f7bb4b24ead461f,2024-08-21T17:35:01.453000 +CVE-2024-34515,0,0,114cbd02c999812d58d1b5d8c0232cb5a70990aca8005cfe1f7bb4b24ead461f,2024-08-21T17:35:01.453000 CVE-2024-34517,0,0,cde89b9593a0fa0e1ad4eef031d1be52532f44d623b2553db6a6b804041b3e30,2024-07-03T02:00:23.917000 CVE-2024-34519,0,0,e1bab0f51bff6ddc1064f759576ee7e30191ae4ab924c21597ebc2a29f9b8ff5,2024-07-03T02:00:25.010000 CVE-2024-34523,0,0,7ef51f7e789546b198cf934fa08689a630a0291ba9909985498eacb1d192e4fb,2024-08-02T03:15:43.153000 @@ -253424,7 +253426,7 @@ CVE-2024-35429,0,0,330b233a9d961e5ab60bb84ab073545ccf41085088e749b133fee4692c3b4 CVE-2024-3543,0,0,14aebe52440b6c29accdfa7acf400fe951e7d7441b56210ed47a5a2c1e52128f,2024-05-02T18:00:37.360000 CVE-2024-35430,0,0,56e6241f029678a052009701d49bb56dd50fb27b414c4e76330cb64eb76c9db6,2024-07-03T02:01:45.150000 CVE-2024-35431,0,0,0a35dffe7e6c93066fa509053c839d3a8bc16edf2b77120799090f4882a8d3ea,2024-08-01T13:52:41.087000 -CVE-2024-35432,0,0,3311c747ad82bdd6bdba2df7e2c344e7216b5782d0ebafa18a6d7633f507f841,2024-05-30T18:19:11.743000 +CVE-2024-35432,0,1,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c506d,2024-08-21T18:35:04.913000 CVE-2024-35433,0,0,0b3687e6d05fd0aabce2f6753ab48622a6daecb670483272307382dbb941306d,2024-05-30T18:18:58.870000 CVE-2024-35434,0,0,55e035c2a162134710b80f5640b923747de7468a0790da753e41ecb6e33217f6,2024-05-29T19:50:25.303000 CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000 @@ -253452,7 +253454,7 @@ CVE-2024-35537,0,0,5d87fa9d71542082a5117fd75bd541152a38491d14562b96fe74b3627bb4d CVE-2024-35538,0,0,ed04b7d932d0abc622d3f5e76f1c9f5ff5c97c7b20099e46279f32f369e5223d,2024-08-20T15:44:20.567000 CVE-2024-35539,0,0,16618d2486ea09bbf82db8818822a05ddd72b24bc841b39f2fd154025213c341,2024-08-21T14:35:10.017000 CVE-2024-3554,0,0,cc60bd735986056555560436c7b58f65485299a8475c11d30802709a9ea4095c,2024-05-02T18:00:37.360000 -CVE-2024-35540,0,1,4f572a874d260d53312a92cf2d7ba727a02942f3e7019b26764dd152b1bd2b78,2024-08-21T16:05:06.290000 +CVE-2024-35540,0,0,4f572a874d260d53312a92cf2d7ba727a02942f3e7019b26764dd152b1bd2b78,2024-08-21T16:05:06.290000 CVE-2024-35545,0,0,bc697f72b53789e21cd5d8ac45caf67cd064397c19ab7b48462104e593b9785f,2024-06-27T12:47:19.847000 CVE-2024-35548,0,0,27743d34ac7e82f8c9c7eae383a15382d5ad0f4949e113942667401ad6f68173,2024-08-02T04:15:55.577000 CVE-2024-3555,0,0,70e8594716c631628b2245556d17090b4d4ee8454e4dfa9b7f7905554c7aadd3,2024-06-04T16:57:41.053000 @@ -253998,7 +254000,7 @@ CVE-2024-36128,0,0,9da468fd538eee45c49c6b3a5b681c0b3c17cde174e2675cb22d4e1b048d5 CVE-2024-36129,0,0,e8b8667180ad871a39015931b777fa59fb290eb036737b8e789f39cbc635a5fb,2024-06-18T17:34:11.873000 CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b38,2024-05-17T02:40:01.607000 CVE-2024-36130,0,0,4671d62b05ac637a601468320fbde1254b9e1ab2c793e3e63f9ae03e57d902ad,2024-08-12T18:52:50.947000 -CVE-2024-36131,0,0,feb0f364ef759fb8d3eea9eac580e0d008d6e955a292e95acc00c4f3036190f9,2024-08-12T18:53:18.077000 +CVE-2024-36131,0,1,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb25e,2024-08-21T18:35:05.670000 CVE-2024-36132,0,0,1dce30d4e49190a42dd771e2cd02fc7bcd0f0b6c2d4894583a88755ab208fd59,2024-08-12T18:53:28.710000 CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6cfb,2024-08-15T17:31:15.880000 CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000 @@ -254274,7 +254276,7 @@ CVE-2024-36522,0,0,86674e42114231d1026f4ff35fe6fe6affeea594b7c00b1a81ef4e17dc0fe CVE-2024-36523,0,0,3016893dc57dcd62edd08208dde4ce2567742ed11633d9956e63ba6b508801fd,2024-06-13T18:36:09.010000 CVE-2024-36526,0,0,1ddb30b565e6d7a152e00264224393d020c0bb948b7f968c326e2d1f8170cd41,2024-08-01T13:52:58.227000 CVE-2024-36527,0,0,5a4da781a91464af6910d804126691f30125cf5f5ae9e52379cc70e43ae0f627,2024-07-03T02:03:14.827000 -CVE-2024-36528,0,1,219b411ec1aa5180703f379d25449667f2052c277c02e441e2817dff73b784e2,2024-08-21T17:35:02.500000 +CVE-2024-36528,0,0,219b411ec1aa5180703f379d25449667f2052c277c02e441e2817dff73b784e2,2024-08-21T17:35:02.500000 CVE-2024-3653,0,0,ebd69680b1122e6ac45d38522017549d10dde629dd149529cb0348d7b4220293,2024-08-12T13:38:27.570000 CVE-2024-36531,0,0,a4158d6a8860f8c9c37cc090a05d54c5f8fca61c7fff205691822d02cbdf6215,2024-08-01T13:52:59.007000 CVE-2024-36532,0,0,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000 @@ -254293,7 +254295,7 @@ CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5 CVE-2024-36547,0,0,1b4cc0318f47a7d1f45dacca15d9b24343df7af637add62667d3afc6feef36f0,2024-08-19T17:35:18.467000 CVE-2024-36548,0,0,e144d04945e12f1b5c400dc40c85f1ddfbf9c8356b7dd5897c3f62cd196828a6,2024-08-19T16:35:18.257000 CVE-2024-36549,0,0,55197a9eb0c500888bab7cc4a629fb75ed440d45a5f54f4b25e5199e4a6cc60a,2024-08-14T20:35:11.993000 -CVE-2024-36550,0,1,d598c384dd8bbd4edfd1900743514ac3a937e6a8f9e3bb960c12f741aca4d680,2024-08-21T16:35:07.113000 +CVE-2024-36550,0,0,d598c384dd8bbd4edfd1900743514ac3a937e6a8f9e3bb960c12f741aca4d680,2024-08-21T16:35:07.113000 CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000 CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000 CVE-2024-3657,0,0,5d5edd2c181d124b6fe340f680aa00429419dbcc7ec2b37280e0e8bc6bf5ff1f,2024-08-21T13:15:04.753000 @@ -254328,7 +254330,7 @@ CVE-2024-3665,0,0,363adacfba9b700d09abe8e5cb25a2e59c15ebef1e27e5a96d91922980f92b CVE-2024-36650,0,0,a6dc4fabc18762dbfb018c0e11850a01ac287f515682c65a85c025009c2704da,2024-07-03T02:03:26.290000 CVE-2024-36656,0,0,da14d6f6b98aba8dd134bbca05ce0beee2307c23e23b68d72ed361bfc76eaea0,2024-07-03T02:03:27.067000 CVE-2024-3666,0,0,6ad9793fce3985f8c3a050857cc50fdd13adc9821f463b47a95b3582d82793f8,2024-05-22T12:46:53.887000 -CVE-2024-36667,0,1,296f3287086da3f6cfa12e7ca929339a868eea2e8ba6cdd0781ec31906f03f82,2024-08-21T16:35:07.880000 +CVE-2024-36667,0,0,296f3287086da3f6cfa12e7ca929339a868eea2e8ba6cdd0781ec31906f03f82,2024-08-21T16:35:07.880000 CVE-2024-36668,0,0,e89c82c7c160394ecd7b95ff1019b3a4f5a00e165fb18cb7d323518ccaecb04b,2024-08-19T16:35:19.070000 CVE-2024-36669,0,0,104d3a672bff1b5eaa10a113e663439a5f312f1541afff3e81ca8512250c4931,2024-08-19T17:35:19.970000 CVE-2024-3667,0,0,67c8386bf84232df2260001ef819e9d91b62f19cfb2a953cb76f444117b56973,2024-06-06T14:07:44.473000 @@ -254347,7 +254349,7 @@ CVE-2024-36682,0,0,607667f3d3fa1e7539487ebcdf60477393019c86221af3075a4b31a599839 CVE-2024-36683,0,0,18a76ea23a5695131ac0a1a1cae26aee3d1ea92ed38cb283b784e28da9cb3b8c,2024-06-25T12:24:17.873000 CVE-2024-36684,0,0,92f14ba44da3232d94fa9d8919d066f2f528d700fa94d6456ec4eb59fdec8f01,2024-08-19T18:51:09.050000 CVE-2024-3669,0,0,adf9cc4d7b16c7513726b84fd5b10bd94ac2985d9cd2d264bea2883110b227ce,2024-08-01T13:56:38.537000 -CVE-2024-36691,0,1,2dc541714f35cff24b0fb3cd72710beeeeaa2b0f3379e9849d1938be2b5e0991,2024-08-21T17:35:03.320000 +CVE-2024-36691,0,0,2dc541714f35cff24b0fb3cd72710beeeeaa2b0f3379e9849d1938be2b5e0991,2024-08-21T17:35:03.320000 CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000 CVE-2024-3670,0,0,77ac11a62196ad685da1366e218d9d33cb33f8c42dea24a7d4be6249347cd9dc,2024-05-02T18:00:37.360000 CVE-2024-36702,0,0,3210d1551f985a1be028e17dfcccc53d1d6245bdae9389bfe77a8fe591c428bd,2024-07-03T02:03:32.733000 @@ -255034,7 +255036,7 @@ CVE-2024-37769,0,0,5d562468fe4e62bf5aa053de70325d9517e92227326a41659856d8da2dd29 CVE-2024-3777,0,0,0856ef763b1edbec0747809f2f5f1e269fdce9f6160541c599d8c16e527540d3,2024-04-15T13:15:31.997000 CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000 CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000 -CVE-2024-3779,0,1,1a47972c633583c7bae072fbb56beacb2d6111c4ffff8b051890256727892c2f,2024-08-21T17:38:16.057000 +CVE-2024-3779,0,0,1a47972c633583c7bae072fbb56beacb2d6111c4ffff8b051890256727892c2f,2024-08-21T17:38:16.057000 CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000 CVE-2024-37791,0,0,5b4a77640e01b5f5901f77da4cf3e217016c11878e7475119bb550241e2deb0e,2024-06-20T12:44:01.637000 CVE-2024-37794,0,0,0173114c4850547998c4a3719d0197d2f797f34c9e250dbc5cfe23ea2cc8953b,2024-07-03T02:04:43.130000 @@ -255848,8 +255850,8 @@ CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758 CVE-2024-39010,0,0,ea27e1a674e0e51152c366aff9b8434577dd6bdd1d1fbf49281cb1173cbd8dea,2024-08-08T14:17:52.963000 CVE-2024-39011,0,0,0ff72e1262c145c0e7ad0e12159fa8940005cef45637179ea7630e9fc6914efb,2024-08-08T14:16:25.860000 CVE-2024-39012,0,0,9df6324c2bfe44c83576ce38800d6b3518f1e8bebb5d26f5ef119b7475ae9607,2024-08-08T14:03:03.583000 -CVE-2024-39013,0,0,a4c20ecb3bde21856044d9eb2da0ec8e02acc3f9684d1a5bf6185d1fb2e7bba0,2024-07-01T16:37:39.040000 -CVE-2024-39014,0,0,9a0097bf0bd9a3cc47cff0cc484a6f4c909bfad413f77f22d65f886eb0aa8457,2024-07-01T16:37:39.040000 +CVE-2024-39013,0,1,88397ac64721f404ef835e429cd6b6ea19d04c3211d855c608a964fcc32dacb0,2024-08-21T18:35:06.380000 +CVE-2024-39014,0,1,e328d9a926890a5b4f53069f32eed15f888241e4388cf64d2236a02398c4c2dc,2024-08-21T18:35:07.170000 CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000 CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db398f0,2024-07-03T02:05:36.777000 CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000 @@ -255863,7 +255865,7 @@ CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59de CVE-2024-39028,0,0,9687db509e67ca899b7283535a6c24eebf7f6784e1a1f28baae3172078bffed5,2024-08-01T13:55:19.873000 CVE-2024-3903,0,0,1173acb865ab00a4b856055c98dd70060d7f57d01c944a25db26e0ac92cb735f,2024-08-01T13:56:45.143000 CVE-2024-39031,0,0,d24f6f8147beeb7e9c2d09f46b9b50d67c2b9ac54ebfd67e20353ba96152db2b,2024-07-25T22:15:08.837000 -CVE-2024-39036,0,0,7a67c4cb795e2f73635f9c736de213efa4709db998f5b9df548ec5198f4784ac,2024-08-12T18:35:39.273000 +CVE-2024-39036,0,1,1815c46fdce9cf5d7067d9b211491bb0c920c7748005faa34854c855193cbfe8,2024-08-21T18:57:12.603000 CVE-2024-3904,0,0,b47d95974559a4f3b756535a5502c34ce174362aa3e2f750b6b7a9a829cd5533,2024-07-23T01:15:09.063000 CVE-2024-3905,0,0,67966257112781442fc6e512d6c151edda862eaaff35815fcc6adec0f7a08ca4,2024-06-04T19:20:26.357000 CVE-2024-3906,0,0,a3b427119bdbbda357983f8fdd52a145484ad89b344f08b8387b1c5f33e2d6f6,2024-06-04T19:20:26.463000 @@ -255993,7 +255995,7 @@ CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28 CVE-2024-39338,0,0,b2902b8c8fc819dc7cfd9bba42bea4279b850087be05ea18d3d2870591906304,2024-08-15T20:35:13.427000 CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000 CVE-2024-39340,0,0,5ebdab5b5b68a92db4ff353d7a08162224794f82acef11835fd7731e9f604ef2,2024-08-01T13:55:49.473000 -CVE-2024-39344,1,1,ee27177971b1683530327613c91c029c554fe55aa8892f109d9ea751e8b53428,2024-08-21T17:25:08.560000 +CVE-2024-39344,0,0,ee27177971b1683530327613c91c029c554fe55aa8892f109d9ea751e8b53428,2024-08-21T17:25:08.560000 CVE-2024-39345,0,0,a7fe401efcbb2b3728b6e10777ee0a9c04a224d785c5c0839b1d13cfea4ecde8,2024-08-01T13:55:50.247000 CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000 CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000 @@ -256097,7 +256099,7 @@ CVE-2024-39483,0,0,d36581a3f952605fa4deddb55b42f749ee06fd7a8fd95b57c25fb72ba28ba CVE-2024-39484,0,0,a445c76503df3c2b08ea3e5bff9e0551e6280c35730c3d8354635c9d4c9c04c5,2024-07-08T18:01:56.137000 CVE-2024-39485,0,0,eeb489cc81d629e25edf2846d080f2d16c82c1a5d4e00cda1329db48257433c1,2024-07-08T15:36:56.127000 CVE-2024-39486,0,0,f6661e67cb8f63bf2a8706b1b4211e0b90a0a8c4c4943ff1097bf9c1f15dcc5d,2024-07-15T07:15:17.263000 -CVE-2024-39487,0,1,07f5386c1bdf0075b39a52e9355dbebed54d46b5a78637d307e6a04462c33cf2,2024-08-21T17:18:01.117000 +CVE-2024-39487,0,0,07f5386c1bdf0075b39a52e9355dbebed54d46b5a78637d307e6a04462c33cf2,2024-08-21T17:18:01.117000 CVE-2024-39488,0,0,23685677cb72fbb43ef99f190181df9d9e8c31ec0d3e18867ab50491586a3910,2024-07-11T13:05:54.930000 CVE-2024-39489,0,0,c63175d29bd941720feca94efc3f3a1164cbdc8d8d5c1251ffb632e82e90379f,2024-07-31T14:50:26.330000 CVE-2024-39490,0,0,3a7cfe69ff3072a0b714a0d11ffcf616850cc2417c5fe88da248bebd02107b67,2024-07-11T13:05:54.930000 @@ -256255,7 +256257,7 @@ CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251a CVE-2024-39688,0,0,dccea6cc179f4688243addc0514825c9dd13727763645739ebeb475d416db47a,2024-07-24T12:55:13.223000 CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000 CVE-2024-3969,0,0,017089a8e0e25cc18c41dde22c453ecf92ec4c4a53bf3304535dbfbcbb40fc3d,2024-05-28T17:11:55.903000 -CVE-2024-39690,0,1,548c1a8a7761f7a2711f05cc07ec0b531924c96fc05350235330c19432d9ad9a,2024-08-21T16:01:47.157000 +CVE-2024-39690,0,0,548c1a8a7761f7a2711f05cc07ec0b531924c96fc05350235330c19432d9ad9a,2024-08-21T16:01:47.157000 CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 CVE-2024-39693,0,0,3aed4b78b258f1f000b7104a802f9a4117c3d840404e28cf8e3ca8b4234aedba,2024-07-11T13:05:54.930000 CVE-2024-39694,0,0,381b8ab296ca7ac884a99d2ccce1d7cd1ffc3e5e3c8e60b132c7b247508328e4,2024-08-01T12:42:36.933000 @@ -256437,9 +256439,9 @@ CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000 CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000 CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000 -CVE-2024-40129,0,0,19145442d841f5fed93fa84d0b1dc7354c8e13623cff777e7d85508bf432819c,2024-08-01T13:56:53.610000 +CVE-2024-40129,0,1,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000 CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000 -CVE-2024-40130,0,0,f66a8829c405966d3d38c7789744136f333e7f71665ee80940842ffce3fa5547,2024-08-01T13:56:59.047000 +CVE-2024-40130,0,1,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000 CVE-2024-40137,0,0,4158bade34f096859f58d84cfe190a8d5559ddcf08eebfd1ce97260b054d79c0,2024-08-01T13:57:00.547000 CVE-2024-4014,0,0,b3b1290aefb4c494a91b06e73308720019bcbbd573300060d0dbb0155cbc5507,2024-04-22T13:28:43.747000 CVE-2024-4017,0,0,80bc2cfe2c053bce72096cd358a992628c3c16de9493da95b29bf0e4f3e1b16f,2024-04-22T13:28:50.310000 @@ -256474,7 +256476,7 @@ CVE-2024-4037,0,0,835f7b633520c38dc69c5473ca883b788d7739f8c5278809ab72b10ff3489f CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cdab4,2024-05-14T16:11:39.510000 CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000 CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000 -CVE-2024-40393,0,0,a8fa4d9c9028d03ae4c4c88e79b3a3f12935de932122e6ff5c1c67e0a64010a3,2024-07-17T13:34:20.520000 +CVE-2024-40393,0,1,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000 CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 @@ -256494,7 +256496,7 @@ CVE-2024-40430,0,0,819917321160eef63130d1d20449f426edcebc30c5d6dc539b6c68435ff1d CVE-2024-40433,0,0,e7a4ec9affcd5459ba2865b747a3c21f3af0ec6afc5f3d7573785ee38941782a,2024-08-01T13:57:28.500000 CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000 CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b53,2024-05-28T12:39:42.673000 -CVE-2024-40453,1,1,a63d732012a7b741a18e2d1a2fbf66b31e580a80c16419a5a08f6fa26146d80c,2024-08-21T17:24:59.627000 +CVE-2024-40453,0,0,a63d732012a7b741a18e2d1a2fbf66b31e580a80c16419a5a08f6fa26146d80c,2024-08-21T17:24:59.627000 CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 @@ -256518,7 +256520,7 @@ CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000 CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000 -CVE-2024-40500,0,1,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d9db,2024-08-21T16:05:32.603000 +CVE-2024-40500,0,0,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d9db,2024-08-21T16:05:32.603000 CVE-2024-40502,0,0,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000 CVE-2024-40503,0,0,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000 CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000 @@ -256709,8 +256711,8 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000 -CVE-2024-40892,0,0,f4b3d30cee3dbead5f513a470d6b7589a9f6fca1880298ea9f624486c63e7014,2024-08-13T12:58:25.437000 -CVE-2024-40893,0,0,75c648235a6f1fcfb2addb5d3726647373dc511b9170f6c03d285bfcb70f1cd1,2024-08-13T12:58:25.437000 +CVE-2024-40892,0,1,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000 +CVE-2024-40893,0,1,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000 CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000 CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000 CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000 @@ -256772,7 +256774,7 @@ CVE-2024-40949,0,0,791b23d5aa5b8f2913b54416c907a4bc6a3427cfe143f82f7d7f99adf2829 CVE-2024-4095,0,0,e2a40f44bdf8e372a41806afdce4161562b7b4bb2bcba8f3987036690d2e8184,2024-06-17T12:42:04.623000 CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f822,2024-07-12T16:34:58.687000 CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000 -CVE-2024-40952,0,1,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000 +CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000 CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000 CVE-2024-40954,0,0,6435d77632d64383b2dd408edc2b98ec70827908a39e4fc7f1aeac09bff6b72f,2024-07-12T16:34:58.687000 CVE-2024-40955,0,0,4f78b513b01dfd2400b7927009e3f8081393369b68b71a3a8bf67f98b5e12e0c,2024-07-12T16:34:58.687000 @@ -256781,8 +256783,8 @@ CVE-2024-40957,0,0,ba43e6ddc634305a816231c000c7b443548485728739cecf3ba6005f6c02b CVE-2024-40958,0,0,c4b20d9cb20e4970bb454dd1d6fa22674e8409df2a8f77cff22e9737b19836ab,2024-07-12T16:34:58.687000 CVE-2024-40959,0,0,e7c156318badfedaa056792bcbefa34231e67bdbb7ed04e052f8e0abfa80614c,2024-07-12T16:34:58.687000 CVE-2024-4096,0,0,50bdcb96d8146d46d54f79639093726453baeacacf83f329111a9e971fb9861d,2024-08-01T13:59:25.313000 -CVE-2024-40960,0,1,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb3e1,2024-08-21T16:53:01.407000 -CVE-2024-40961,0,1,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000 +CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb3e1,2024-08-21T16:53:01.407000 +CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000 CVE-2024-40962,0,0,3d1366142cae87f99bee1d01922e9c3346fad92689b81dead457f2b7f460d17c,2024-07-12T16:34:58.687000 CVE-2024-40963,0,0,2a96578cd7c6af1c34baa4ac9a95077df49820df6548101e36fdd738e266e9e1,2024-07-12T16:34:58.687000 CVE-2024-40964,0,0,71fa54b4dab6157dac57be297e369e5474c76b73727e066b7c320ab6b908d5be,2024-07-12T16:34:58.687000 @@ -256817,20 +256819,20 @@ CVE-2024-40990,0,0,cd4ca053a0ec5d11c69e407da176119a515b6b0abc494934cf9d76e0e1606 CVE-2024-40991,0,0,ec2ddb2f3ffaaab4f22b585138329157aff6badf22f9c0dc433ce0a15fb727e1,2024-07-12T16:34:58.687000 CVE-2024-40992,0,0,59330320f1c372354ad798dc40538850329b5c6373bec47c4461455ccd576b86,2024-07-12T16:34:58.687000 CVE-2024-40993,0,0,89f720d26a3286afd844c876b00dac13b1a1ac9b861825430f92c7a8bde3b9fe,2024-07-12T16:34:58.687000 -CVE-2024-40994,0,1,87451351170180789ee67455de46510dfba865151492ccdc75166700c2d95b86,2024-08-21T16:32:22.197000 -CVE-2024-40995,0,1,7e774e2d3646b0f7dfbcad03b022ad4520be89bcbae9394e79e67060f0b7112d,2024-08-21T16:33:00.850000 -CVE-2024-40996,0,1,024bdc0733e5f73fa0231a2a745cd31843ec15e904ddb5c76b9d4a0bfd4786c7,2024-08-21T16:36:14.723000 -CVE-2024-40997,0,1,c32eb20693ee26e8aa58ed3f2e829a98445467bea9797601bdb1f84499b8c041,2024-08-21T16:09:33.373000 +CVE-2024-40994,0,0,87451351170180789ee67455de46510dfba865151492ccdc75166700c2d95b86,2024-08-21T16:32:22.197000 +CVE-2024-40995,0,0,7e774e2d3646b0f7dfbcad03b022ad4520be89bcbae9394e79e67060f0b7112d,2024-08-21T16:33:00.850000 +CVE-2024-40996,0,0,024bdc0733e5f73fa0231a2a745cd31843ec15e904ddb5c76b9d4a0bfd4786c7,2024-08-21T16:36:14.723000 +CVE-2024-40997,0,0,c32eb20693ee26e8aa58ed3f2e829a98445467bea9797601bdb1f84499b8c041,2024-08-21T16:09:33.373000 CVE-2024-40998,0,0,9da508127245f96a0a3187b3791e694d7423147f0ff8b17a1f0863f2b85caeaa,2024-07-12T16:34:58.687000 CVE-2024-40999,0,0,befb0b425fb0d7279ac5ad8ccd391425d06a7b97e64b517b26bf38c02ed2bb47,2024-07-12T16:34:58.687000 CVE-2024-4100,0,0,7f59e9bc55c06404ac377b1145b413dcdbe8a5d2f3074db367eedbc1e2d39377,2024-07-09T18:19:14.047000 -CVE-2024-41000,0,1,e686e8fa14e77f5884a1e469f4251e35e44f493af012d847babf495df5eafb00,2024-08-21T16:17:13.427000 -CVE-2024-41001,0,1,29b7733bccdd729fd8f151ef33300cb3cb47287fad66b79705d0f6dafebc1715,2024-08-21T16:17:45.513000 -CVE-2024-41002,0,1,d5dca7b519105aebe7c927e62dd5afbcd4fe0f3f2ed6249b57814168be8039f7,2024-08-21T16:18:10.740000 +CVE-2024-41000,0,0,e686e8fa14e77f5884a1e469f4251e35e44f493af012d847babf495df5eafb00,2024-08-21T16:17:13.427000 +CVE-2024-41001,0,0,29b7733bccdd729fd8f151ef33300cb3cb47287fad66b79705d0f6dafebc1715,2024-08-21T16:17:45.513000 +CVE-2024-41002,0,0,d5dca7b519105aebe7c927e62dd5afbcd4fe0f3f2ed6249b57814168be8039f7,2024-08-21T16:18:10.740000 CVE-2024-41003,0,0,34af7c5bec0bec46e58b8eca63f4eaa9d72a070d8c36181617dd9cac2e47859b,2024-07-12T16:34:58.687000 CVE-2024-41004,0,0,1d7ce0f59b365834038557de07b82b5f32bc5f203fd421800f8210717139541c,2024-07-12T16:34:58.687000 CVE-2024-41005,0,0,0581c40a7d6578257fb62f4f8b7b249bca4b3435363decba2015a514cb7ba480,2024-07-12T16:34:58.687000 -CVE-2024-41006,0,1,69ba1d1e4b23644651b93bb74f2f8b7ddc85169bfb70261df249f37e2080d9a0,2024-08-21T17:20:57.467000 +CVE-2024-41006,0,0,69ba1d1e4b23644651b93bb74f2f8b7ddc85169bfb70261df249f37e2080d9a0,2024-08-21T17:20:57.467000 CVE-2024-41007,0,0,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b15a,2024-07-19T18:24:59.197000 CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181c4a,2024-07-16T13:43:58.773000 CVE-2024-41009,0,0,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000 @@ -256880,17 +256882,17 @@ CVE-2024-41049,0,0,92c1bb7b998a305af611ea0fb8cec280acf0ca6290c6083ab04ddb40be141 CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000 CVE-2024-41050,0,0,39d4269dc6ec271427b4bdd65b9d3d16d3d31b7b1303de1471509f3b60dd1681,2024-07-29T16:21:52.517000 CVE-2024-41051,0,0,828856464b37c81ed12190c5149ddea9cdaf7edfd74019e8a2aa69fd3cf3a9ff,2024-07-29T16:21:52.517000 -CVE-2024-41052,0,0,e85b40c87bc2897eeed51eb8eca6dc225f5518e78d3827708c7053f4f5674b75,2024-07-29T16:21:52.517000 -CVE-2024-41053,0,0,05b22f88796697f75b7ba1ed031084f4c2c736a1a846d7c22029cc453b4f5da0,2024-07-29T16:21:52.517000 +CVE-2024-41052,0,1,02410c9b72898d738184e0b7a3effa9630f2e9d19b23d5deeaa031a00c5a143e,2024-08-21T19:27:26.227000 +CVE-2024-41053,0,1,f44272aa5841bc62914782889e664342425d762592f8f78de62bccbea7d12c58,2024-08-21T19:21:41.530000 CVE-2024-41054,0,0,54d000610420765de59a42fcd6b0218f3e2dc53e9697b03d4c5cf83c4402e430,2024-07-29T16:21:52.517000 CVE-2024-41055,0,0,499100fd75a0a01af0a661e5f3f470cfc510510f055a9070bfb5cea9bafe2b0b,2024-07-29T16:21:52.517000 CVE-2024-41056,0,0,681ae471fcf06bdb78f6869758eaa87ed447f2fed56eb21007ad5f506a538998,2024-07-29T16:21:52.517000 CVE-2024-41057,0,0,99f60754c1ef6e2aef87de980618623143e6219cad98680847261d6cd9f33181,2024-07-29T16:21:52.517000 -CVE-2024-41058,0,0,c7c3450ed73fd85c89167d0284071cc0791971d832083e53c8b103c18fd823d0,2024-07-29T16:21:52.517000 +CVE-2024-41058,0,1,31868f2a557744984e7874683aa697ff5ee97c10d7e2f10058c8921d174aaec3,2024-08-21T19:35:22.120000 CVE-2024-41059,0,0,a3e848e0f22cf6429fd584bc8b1d0becbc43af3e8de05f6d70f42a052cdb4353,2024-07-29T16:21:52.517000 CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000 CVE-2024-41060,0,0,ec0fe6e11350c37a45a30d3a61b44ae7110f7091e533c89a2e06068486abe2d7,2024-07-29T16:21:52.517000 -CVE-2024-41061,0,0,c31ec4d22bacc04d92424ba2cfe5730a061114014910513b5203f859670cc592,2024-07-29T16:21:52.517000 +CVE-2024-41061,0,1,36d616e9bc36920a3c33a3b1c2ebff74d68391a8728cb87e68a5c76d7b4ef06e,2024-08-21T19:34:12.550000 CVE-2024-41062,0,0,fbf24b9fd211a6aa96a9c57e6e5ee51eed4d30e0f0990ba1f54a615f2caf60dd,2024-07-29T16:21:52.517000 CVE-2024-41063,0,0,e4ddf8fb0026c8f28f6d7d93c6ba6f6b51f6cf05a4df4cf405d518f420d57bca,2024-07-29T16:21:52.517000 CVE-2024-41064,0,0,38bd2f5b07078a53c43ab68cf08b88abdd1fbf1876fcfc6333b8f4086de00926,2024-07-29T16:21:52.517000 @@ -257028,7 +257030,7 @@ CVE-2024-41318,0,0,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9 CVE-2024-41319,0,0,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000 CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000 CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000 -CVE-2024-41332,0,0,cca934b4dcafac4b22539f0983b8a3da18ab21c86a99f4b91f9c251944a870b9,2024-08-13T01:14:31.280000 +CVE-2024-41332,0,1,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000 CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000 CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000 CVE-2024-41353,0,0,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000 @@ -257088,6 +257090,7 @@ CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000 +CVE-2024-41572,1,1,f415a06f9331f0092b607416c405edebe23a7ef92516bc8339bdf48ae35e5ad4,2024-08-21T19:15:13.380000 CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3f04,2024-08-12T13:41:36.517000 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 @@ -257135,8 +257138,8 @@ CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d5070886 CVE-2024-41670,0,0,d4de1327e25e7abc39266a562cb92a3c058d45ff783401ce0a66d0266a4c8b41,2024-07-29T14:12:08.783000 CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b806,2024-07-29T16:21:52.517000 CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000 -CVE-2024-41674,0,1,2efc360b62688be6ccef330f160a0fdc2fcd4a58aa8980d70f1862bf900859a3,2024-08-21T16:06:23.153000 -CVE-2024-41675,0,1,c552f3fd4715304dafe4a5eed89c59bfbc25d98add0df31c42e0865266e54768,2024-08-21T16:06:23.153000 +CVE-2024-41674,0,0,2efc360b62688be6ccef330f160a0fdc2fcd4a58aa8980d70f1862bf900859a3,2024-08-21T16:06:23.153000 +CVE-2024-41675,0,0,c552f3fd4715304dafe4a5eed89c59bfbc25d98add0df31c42e0865266e54768,2024-08-21T16:06:23.153000 CVE-2024-41676,0,0,b56341df25e194e84048e23b9e09a8bb0d4e56dc4a3c6b47ab03c0be3461cedc,2024-07-29T16:21:52.517000 CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 @@ -257277,7 +257280,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280 CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000 -CVE-2024-41937,1,1,0df28de5643f0c9acf3f67c95f507dc7e1a9360e16ae09e6bb16a4e1b3aaf747,2024-08-21T17:25:08.560000 +CVE-2024-41937,0,0,0df28de5643f0c9acf3f67c95f507dc7e1a9360e16ae09e6bb16a4e1b3aaf747,2024-08-21T17:25:08.560000 CVE-2024-41938,0,0,3ab7c3a39df7962916b58b6a8012e354ce7c2e72731bfa6d3bfa597d2e12afa7,2024-08-14T18:08:42.777000 CVE-2024-41939,0,0,4183ed079a81e71abb2d3254aa5006833dc573353e4bf1b5fd01bacb1a530db3,2024-08-14T18:09:24.030000 CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000 @@ -257604,7 +257607,7 @@ CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbee28,2024-08-08T18:55:19.180000 CVE-2024-42367,0,0,78b96b1f30a7354fdfb7431aa08d9784ec8c3726b77126448b6109517286436c,2024-08-12T13:41:36.517000 CVE-2024-42368,0,0,de4f48ab04f32dd7f3db383df19cc416867f89e8ecae60c2fdd0bef001ee0d34,2024-08-14T02:07:05.410000 -CVE-2024-42369,0,1,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2bea11,2024-08-21T16:01:03.147000 +CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2bea11,2024-08-21T16:01:03.147000 CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000 CVE-2024-42373,0,0,295f57d389a740d58ca7f1197ba4847ae8998d712f5bf5435ce1e4024bfbdcde,2024-08-13T12:58:25.437000 @@ -257684,12 +257687,12 @@ CVE-2024-42545,0,0,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956 CVE-2024-42546,0,0,fb60d203dacd557a0d6c3dd4a088a3933e203b772ae4b090e279b0a2f7b980c9,2024-08-15T16:35:15.603000 CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000 CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000 -CVE-2024-42550,1,1,fc040a9fdb9874d1ee6063db817db51f08698296778147bc870cf1ae6bde398f,2024-08-21T17:24:59.627000 +CVE-2024-42550,0,0,fc040a9fdb9874d1ee6063db817db51f08698296778147bc870cf1ae6bde398f,2024-08-21T17:24:59.627000 CVE-2024-42552,0,0,05029fbe912027602aebaf8833cf288ec3cd361d07011e6c98e55751bb0bdc6e,2024-08-20T15:44:20.567000 CVE-2024-42553,0,0,2423da66b36b5ac46e4d328e5cb18cc8071803cc838cae0003cc2096a1c3dcbb,2024-08-20T16:35:22.120000 CVE-2024-42554,0,0,e7093d400617647f295578e1e2a0acba43985e714edb761c848d698d7a6942ea,2024-08-20T15:44:20.567000 CVE-2024-42555,0,0,0a22b9ad39decd5ee3fb21d58c15efa0c29c80c6617d4653453476c140cafc1c,2024-08-20T16:35:23.320000 -CVE-2024-42556,0,1,81d6db8e8a0baef375d5428aa737e7b39335d62051ece35a19f26aa45f376141,2024-08-21T16:35:08.730000 +CVE-2024-42556,0,0,81d6db8e8a0baef375d5428aa737e7b39335d62051ece35a19f26aa45f376141,2024-08-21T16:35:08.730000 CVE-2024-42557,0,0,e02af384cbf4fcc983c541e561ec4a31ffa2ceb039568e1dee77a1c459bebde7,2024-08-20T15:44:20.567000 CVE-2024-42558,0,0,8f491b26435c6193a82ecd5e108c46f65e32c4d5502e567f20fed23169fbca61,2024-08-20T21:35:04.467000 CVE-2024-42559,0,0,9acb74b9f8ae969ec2fc9d0f6d482db1d87b890c76313d6c123d946977a290cc,2024-08-20T19:35:10.850000 @@ -257697,7 +257700,7 @@ CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c CVE-2024-42560,0,0,77c3eb361010feb420ff28950817a9c1609b41f6e3fa7cd1b726ce40de2e033c,2024-08-20T16:35:24.553000 CVE-2024-42561,0,0,851b224ad04a9881247fc5fa1c3fb46325b04d8a33b689b57f61279bf963ea10,2024-08-20T15:44:20.567000 CVE-2024-42562,0,0,95374f95cddb8581f360fb4a8bda45010193fe86e767e637b2647fc080f29add,2024-08-20T16:35:25.820000 -CVE-2024-42563,0,1,baa18250040bc5196343ebfbb432817447c4a3a44057e8dbcc112bc7387d631c,2024-08-21T16:35:09.490000 +CVE-2024-42563,0,0,baa18250040bc5196343ebfbb432817447c4a3a44057e8dbcc112bc7387d631c,2024-08-21T16:35:09.490000 CVE-2024-42564,0,0,d11dd74cdbc88c75461941d9a4470126fb867541e46ed51b0c7bf5d3da3ec994,2024-08-20T15:44:20.567000 CVE-2024-42565,0,0,1591c4cab80f6693619cd5a4da52c8a7cd3181b67994b124b718c4e4c7faf1a2,2024-08-20T21:35:05.227000 CVE-2024-42566,0,0,98ae4d4c54aadbbb33d8445750ac45a5fb4d45d2ba72f710ffd19034073726bc,2024-08-21T13:47:05.013000 @@ -257707,14 +257710,14 @@ CVE-2024-42569,0,0,a2bf09fa7918830ac6a9bdd170fcd5f4025f3b5655536c64aae4250f3722f CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000 CVE-2024-42570,0,0,f4fb85a858f58c2f291542defe868101fdd651787665eab2245b6ac99f2a7d38,2024-08-21T13:46:00.837000 CVE-2024-42571,0,0,1c554bb814a228d2952a27acace697648b5faf72b3d0b65c235a3480b0e47c2a,2024-08-20T15:44:20.567000 -CVE-2024-42572,0,1,8a27d950b3f1c9ad5db7a77b1ee249eea67e2798f67a1d2d16a37bd410483cab,2024-08-21T16:35:10.263000 +CVE-2024-42572,0,0,8a27d950b3f1c9ad5db7a77b1ee249eea67e2798f67a1d2d16a37bd410483cab,2024-08-21T16:35:10.263000 CVE-2024-42573,0,0,c4d9e0f6d8b833e2509d8c2910fa5ba22120e6bbd03b4460129e761d76e30cf4,2024-08-21T13:44:48.360000 CVE-2024-42574,0,0,aa616629d677652eb91e6bb032b777df1c13de96e0b62fbe4b20bbe0e1fe4f9a,2024-08-21T13:44:39.147000 CVE-2024-42575,0,0,cf2b2349db3c76ced20b6aa1a9b6de0d11718de3d1ae748f38b2de1c10e7197a,2024-08-21T13:43:06.420000 CVE-2024-42576,0,0,d7eb868484ad37f21c56ed60bc9cbb03790a1e242dbcb4957b7f3d19f6553c68,2024-08-20T16:35:29.750000 CVE-2024-42577,0,0,90aae1e6030150c8a860d623cdf957a84ff52b3a936bb9734a4fd516a3527414,2024-08-21T14:35:12.110000 CVE-2024-42578,0,0,e49e6d1eec15d8971d4646a9d9f4fa585ff2792aff3d9892d55116d7caa208d1,2024-08-20T15:44:20.567000 -CVE-2024-42579,0,0,fa99ce7ac5f22e1d2334d6eec7f7550bac4275b5f10f14882b3897e6f5bad313,2024-08-21T13:39:19.630000 +CVE-2024-42579,0,1,c99a5f9acecd1dfba8e26c5185f2a559c0ce5eb71a2cce527f62a9e51b0ebb06,2024-08-21T18:35:08.200000 CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000 CVE-2024-42580,0,0,2990563b67d4dc92b3ce407afe260e1a67fac4a4f00be92eeacf912a244c329a,2024-08-21T13:39:07.857000 CVE-2024-42581,0,0,c905d276d2309271a54559459476e6aa55a4022f51585f282439786c09ceb2ed,2024-08-21T13:38:50.380000 @@ -257730,7 +257733,7 @@ CVE-2024-42604,0,0,c728aa7d1997da2891fdaf68c4e186010a0ab578e913f3d19b193328f99c3 CVE-2024-42605,0,0,3d7b70705f0c340fd9e9ac2feaeb7c16213ffec0f6a7c6374438550a8c1d62c6,2024-08-21T13:12:40.957000 CVE-2024-42606,0,0,e46323a2b9a85aad3954a3b27bc1e8c958b659372d991d6df8f73aab5c26bf01,2024-08-21T13:12:27.070000 CVE-2024-42607,0,0,b5b5d184fb29386f840a66de2587a7be0c2df56835ad775e585769a324e9820a,2024-08-21T13:12:16.913000 -CVE-2024-42608,0,0,8688c7f667989fa963c92bc639f5a0c943a12272781992761448bdeec07e55cf,2024-08-21T15:54:44.310000 +CVE-2024-42608,0,1,2812a36dacc1d1d37dd871ef3cf52b053de223536dfa32113940a363ab5fab6d,2024-08-21T18:35:08.967000 CVE-2024-42609,0,0,f63b45fca798ad24817857f390287beb793195563f037ecfcae8997c9ecfddec,2024-08-21T13:12:03.427000 CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000 CVE-2024-42610,0,0,9ff653a6a99494fed368590a85a46ec66dee52a770d3e028c312550d378eb0f9,2024-08-21T13:11:37.863000 @@ -257796,6 +257799,16 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000 +CVE-2024-42777,1,1,f19d6b5356800377bd1539cbfc14b31e97ff797f3033dec3f5badbe693daa64b,2024-08-21T18:15:09.930000 +CVE-2024-42778,1,1,7dcf72b1dfb9bfe76b9d141481aefdee385b5bba55e20eb1891204c415ab8ed8,2024-08-21T18:15:10.003000 +CVE-2024-42779,1,1,c0b1fae1eef405e09938d56473acce09c74e979e86c711ae564c2b9c6f4326a9,2024-08-21T18:15:10.073000 +CVE-2024-42780,1,1,ffa79341d136a2fe32f61e2177f7968cc6085bf9af8cfac4879351d5892dcdc5,2024-08-21T18:15:10.150000 +CVE-2024-42781,1,1,1ac0c9af5612cbf5d1260f940e4e4e708d6e06d10e1d2878a91835e815cfc7a5,2024-08-21T18:15:10.227000 +CVE-2024-42782,1,1,ba055618f34155af28e55c7c75210e6ecb3f8ef361bccfbb9e575dcc4777a07e,2024-08-21T18:15:10.303000 +CVE-2024-42783,1,1,acd091b1f1c030b017eaf01a7cbf618eca139ba4341ff9f3ecab6d10eba3f509,2024-08-21T18:15:10.453000 +CVE-2024-42784,1,1,044452a33f637cb7d87ad5995060fe9ceade24692dbdf884a0a102e4b5d407f2,2024-08-21T18:15:10.630000 +CVE-2024-42785,1,1,552938865a02839d30ef320418a9071e80c7ca9bef81bef108e7cfdd75a7de36,2024-08-21T18:15:10.707000 +CVE-2024-42786,1,1,67be097c4312e65e740419ccf899e94bbb8bf27af0aa8beb26b760fd35d4a25f,2024-08-21T18:15:10.783000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 @@ -257828,7 +257841,7 @@ CVE-2024-42947,0,0,e7d01f7003d2f409e61d4e637f7500689fb65c07673a6b4b02e4e7886d96f CVE-2024-42948,0,0,2167f79bb14301e7998438c80225da1d9af3750f4b140d069a0f87d1b1360383,2024-08-15T19:31:38.217000 CVE-2024-42949,0,0,44c6441194e695d5a683578273dc6ba440e5cf17bcd806ba53209d34b464cf71,2024-08-16T18:15:30.507000 CVE-2024-4295,0,0,848d1af2676088d8bdb79c5f7e3bd4f81684dc40347bc492c56560372b53041d,2024-06-11T17:15:18.997000 -CVE-2024-42950,0,1,eb11eb812b7cc23c3e2677512c793bb40fc92f136b1df58b0cc1f22b415bf06e,2024-08-21T17:35:04.793000 +CVE-2024-42950,0,0,eb11eb812b7cc23c3e2677512c793bb40fc92f136b1df58b0cc1f22b415bf06e,2024-08-21T17:35:04.793000 CVE-2024-42951,0,0,7bdaaf021ce5c2c1a607b63871110c0151990fcef0c3aeca8294b3bad92bdb73,2024-08-16T18:35:14.290000 CVE-2024-42952,0,0,e1493349159808b41d3fd1446f0d95431c6347a80eabbe8adaa343717850dc24,2024-08-15T19:30:38.387000 CVE-2024-42953,0,0,8851520fe29c4e2cdfe788f671b16257937bb484146dbc70d9979d7ec9114024,2024-08-16T18:15:18.800000 @@ -257865,8 +257878,8 @@ CVE-2024-43009,0,0,468db8caeabef579a226d8a65490e413d586c09d4e7e764fb4b818b81835a CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000 CVE-2024-43011,0,0,a1a7726f53e21e3beb63c25ff5d202a0a16dad76f49dffd4b60f93fe1759157a,2024-08-19T14:35:10.893000 CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000 -CVE-2024-43022,1,1,bcbb977578d31f1f827de05fade0aa40a1008113e5479b6fe4732e422174cbee,2024-08-21T17:24:59.627000 -CVE-2024-43027,1,1,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000 +CVE-2024-43022,0,1,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000 +CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000 CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000 @@ -258037,7 +258050,7 @@ CVE-2024-43368,0,0,1d00a2d97832bca557e0027710c3b9dd305a4196742f053b6b5599e12fe83 CVE-2024-43369,0,0,3f715b9274c2b9674573124fd01c9f3a8a848640345dd0ef56c5a08f4595beba,2024-08-19T13:00:23.117000 CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000 CVE-2024-43370,0,0,63a4b6e00d1567d9d6f653490e2b73cb49023bb731b98d8f0b3fa5d3f581b5b7,2024-08-19T13:00:23.117000 -CVE-2024-43371,0,1,3a2a473e40f31fc3b260341cd4e0913415db50eacb872b2b6c13cad2ec020f0c,2024-08-21T16:06:23.153000 +CVE-2024-43371,0,0,3a2a473e40f31fc3b260341cd4e0913415db50eacb872b2b6c13cad2ec020f0c,2024-08-21T16:06:23.153000 CVE-2024-43372,0,0,a043dcae2b6cd795ef3b53e2a2297979218d8f1c42273b50d63478eed641cb64,2024-08-19T14:15:23.140000 CVE-2024-43373,0,0,db91654b81ea063be92db1e222d81162a2c449df0cbfa02fb41874b948a4c8f0,2024-08-16T21:46:08.440000 CVE-2024-43374,0,0,985df10ab42e21b923c86b553c9d031d32672b2cc13ac7d069fd0fa1d25bd2e8,2024-08-19T13:00:23.117000 @@ -258058,12 +258071,12 @@ CVE-2024-43401,0,0,15903cc3c455a698e44524d269216ecf71232ae93f3f18482e5b95f18bb9a CVE-2024-43403,0,0,2d2fd26bb8b3833065b554e3ee4081855a0a04ca3de9ec4a77dfc795be220eec,2024-08-21T12:30:33.697000 CVE-2024-43404,0,0,20af26cd731b3ba8b34b0057b5259bd09cfea8cca89a07a9d1aba2ec472dceb0,2024-08-20T15:44:20.567000 CVE-2024-43406,0,0,73b0ba9348d7fda79585237be1ca1a5ac69ce938ffa97f7ec991727d16bb5e34,2024-08-20T15:44:20.567000 -CVE-2024-43407,0,1,7d467f466ef499beae825bf32e799dcad5cd40ef566d80f60a26b3cbd900e048,2024-08-21T16:06:23.153000 +CVE-2024-43407,0,0,7d467f466ef499beae825bf32e799dcad5cd40ef566d80f60a26b3cbd900e048,2024-08-21T16:06:23.153000 CVE-2024-43408,0,0,d4537cc05369b1073eab6be6b0c0270081103ca8bf402f8fafe9ed3f7a29471a,2024-08-21T12:30:33.697000 CVE-2024-43409,0,0,936bb6be49fd3f1a52856d091099b7d0ee01c9becc80fdf8cce500121c258f30,2024-08-20T15:44:20.567000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 -CVE-2024-43410,1,1,8c80a18c88f75265fae7f89031cab1cfcbd4a6399d9448522c8036987a7542f6,2024-08-21T17:25:08.560000 -CVE-2024-43411,1,1,f92a9877c1d95fed34540f03846bc4d517644acd1a3d1746ec447531551b186c,2024-08-21T17:25:08.560000 +CVE-2024-43410,0,0,8c80a18c88f75265fae7f89031cab1cfcbd4a6399d9448522c8036987a7542f6,2024-08-21T17:25:08.560000 +CVE-2024-43411,0,0,f92a9877c1d95fed34540f03846bc4d517644acd1a3d1746ec447531551b186c,2024-08-21T17:25:08.560000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000 @@ -258739,7 +258752,7 @@ CVE-2024-5014,0,0,a159cfb950f4667dfac650da1dbd95c7b0726154dc655b46619c19dd5e035f CVE-2024-5015,0,0,57e7561ea7b4a22dc47e95fb948c2e633eea845a4a10c36b8de173108bb8285f,2024-08-21T13:37:02.370000 CVE-2024-5016,0,0,99504ccb587052e75d99d9fcbf07f0a52b025e8122dba2c854727d3b50b1c62e,2024-08-21T13:38:32.480000 CVE-2024-5017,0,0,4bf66f9149c1825eb6053785aae4f79372d6014d70aef068fefc59f9d5142f99,2024-08-21T13:40:49.903000 -CVE-2024-5018,0,1,ae4fae87d25d0ffdabf3f24c5b2aeefbd28a66a0c556c5b46ab6064495fdefe3,2024-08-21T16:00:23.410000 +CVE-2024-5018,0,0,ae4fae87d25d0ffdabf3f24c5b2aeefbd28a66a0c556c5b46ab6064495fdefe3,2024-08-21T16:00:23.410000 CVE-2024-5019,0,0,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845da,2024-08-21T13:43:03.670000 CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000 CVE-2024-5022,0,0,0ed043d616e9fb9347e4abec6b2a3f19c9cd15ea7715d52174611d64d6e50bde,2024-05-20T13:00:34.807000 @@ -259336,9 +259349,9 @@ CVE-2024-5712,0,0,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dc CVE-2024-5713,0,0,c0a70264e1ea76a973535ad7aa9bd75dbe3a56d9da197243643e4b409d2a1e15,2024-08-01T13:59:58.300000 CVE-2024-5714,0,0,3bed7ab990351d2edaae16abe4fb599113cf539749761008bcee140b1f61ca68,2024-06-27T19:25:12.067000 CVE-2024-5715,0,0,e1e04cb06aeff3910b9cd4da61fdba66eb5c18b86c8c893f8fd4f024cb9da509,2024-08-01T13:59:58.493000 -CVE-2024-5723,1,1,d79b1b24afbab8b654d7ebc0bb25f4fd5ccb17b3911d10f6346c12dc65f0b533,2024-08-21T17:24:59.627000 +CVE-2024-5723,0,0,d79b1b24afbab8b654d7ebc0bb25f4fd5ccb17b3911d10f6346c12dc65f0b533,2024-08-21T17:24:59.627000 CVE-2024-5724,0,0,95ee0fa9720ac6888a5767a9230a1f3fdfc5298c3fd17ac1617c2c7bec17d8c1,2024-08-16T20:40:50.620000 -CVE-2024-5725,1,1,0bb113b1fb71936f03030e6063ab083a4565ef8d540201ca95406dbe832962c3,2024-08-21T17:24:59.627000 +CVE-2024-5725,0,0,0bb113b1fb71936f03030e6063ab083a4565ef8d540201ca95406dbe832962c3,2024-08-21T17:24:59.627000 CVE-2024-5726,0,0,b4cd5dca5a477cdada0b4f3d32b95ed3a167d5579651d0457c156d64e550155f,2024-07-18T12:28:43.707000 CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000 CVE-2024-5728,0,0,970711b5fa2959720f2da02dc0abb41a56789d3063753f984448aaa0fb048438,2024-07-08T14:19:16.400000 @@ -259366,7 +259379,7 @@ CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132d CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 CVE-2024-5759,0,0,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 -CVE-2024-5762,1,1,7685db622b0ef316fe47b270e1905d87606eb2d71fbd315bb90522388aafa70f,2024-08-21T17:24:59.627000 +CVE-2024-5762,0,0,7685db622b0ef316fe47b270e1905d87606eb2d71fbd315bb90522388aafa70f,2024-08-21T17:24:59.627000 CVE-2024-5763,0,0,d5a17677db04dab40e7ba46a3004731b252dfa637f97a1e637824a196a22c6e9,2024-08-20T15:44:20.567000 CVE-2024-5765,0,0,79117abfade54ce3ab13d72bbbbedb2fc58ed3797b29d0ebf953e2abb4b24073,2024-08-01T13:59:59.193000 CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000 @@ -259496,9 +259509,9 @@ CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 CVE-2024-5926,0,0,c0270df40bf1e286ad8957d3baf72bffff8cfb079896c2cd70dab328142b04f1,2024-07-12T08:15:11.797000 CVE-2024-5927,0,0,1b7b6c83db008ddacf60314208106fd6b62f6e315f688ea9bb13e1efdd6d20e3,2024-06-13T11:15:48.917000 -CVE-2024-5928,1,1,8e96cb1349d05ce42218ec5722a6c8fedfe5b7ea558f0ba73b9d78cf5ff9764b,2024-08-21T17:24:59.627000 -CVE-2024-5929,1,1,b0d1da24c71fba23c3303c17605e904ab46e3ebfdb8608536ce60a3f6f8c124a,2024-08-21T17:24:59.627000 -CVE-2024-5930,1,1,73ee32316144a9b3ec88d84547f2a32a4ae1a786d53fe53103f45358dec30f7f,2024-08-21T17:24:59.627000 +CVE-2024-5928,0,0,8e96cb1349d05ce42218ec5722a6c8fedfe5b7ea558f0ba73b9d78cf5ff9764b,2024-08-21T17:24:59.627000 +CVE-2024-5929,0,0,b0d1da24c71fba23c3303c17605e904ab46e3ebfdb8608536ce60a3f6f8c124a,2024-08-21T17:24:59.627000 +CVE-2024-5930,0,0,73ee32316144a9b3ec88d84547f2a32a4ae1a786d53fe53103f45358dec30f7f,2024-08-21T17:24:59.627000 CVE-2024-5932,0,0,39314038664af0ba6a59940f14f6f4752329a2f5be1b3f0fdde557c7381d5472,2024-08-20T15:44:20.567000 CVE-2024-5933,0,0,4b5b8ee984dca52e93a5c74fef0bbbf1e4141af006167bcc3f0d3b5bd5eb1afc,2024-08-19T21:07:56.627000 CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b6e,2024-06-14T16:15:14.647000 @@ -259660,7 +259673,7 @@ CVE-2024-6134,0,0,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dd CVE-2024-6136,0,0,2425dc33d9a66499cd0e61ed788949ec618401c3fdf6a1fd388e70bf34e3cc7e,2024-08-13T01:18:26.820000 CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000 CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000 -CVE-2024-6141,1,1,60bae7861d68ff1bc8bd02ee2d76eaed6edd65267cee4671dff7614eee7383ed,2024-08-21T17:24:59.627000 +CVE-2024-6141,0,0,60bae7861d68ff1bc8bd02ee2d76eaed6edd65267cee4671dff7614eee7383ed,2024-08-21T17:24:59.627000 CVE-2024-6142,0,0,b186966dd1e43431007a65ef388b5fc16ca959c5df4a79ac4b3d70a69eba9543,2024-06-20T12:44:01.637000 CVE-2024-6143,0,0,809bcaf623fc8bb8a94d0137b3cba55dd5f1f165d6e316c641180eb9262d20ee,2024-06-20T12:44:01.637000 CVE-2024-6144,0,0,34fdda404a75a4c4d6599bec7541c145a061f61832fb3538fd14d272d1558c83,2024-06-20T12:44:01.637000 @@ -260086,15 +260099,15 @@ CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f2 CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000 CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000 CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000 -CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000 -CVE-2024-6729,0,0,bcb767224deb16bf2afeb05fe1225bef68f4362bc8d1b39fa14ddbd884997e94,2024-08-06T12:15:52.700000 +CVE-2024-6728,0,1,89e66778f2b381ea7c063797a9902e44dbd60e43d41df6b9b479954aa8b57128,2024-08-21T18:08:50.630000 +CVE-2024-6729,0,1,3c39f156d8f05be16bae3b2d5d19dbd9e5e58833dbb3cc98b9943490250aa643,2024-08-21T18:07:04.263000 CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000 CVE-2024-6731,0,0,c1f0bd3c11a2c8c6e666a080ff8caef145c9222128333d693bdc36ce4aafa4b2,2024-08-19T13:27:46.773000 CVE-2024-6732,0,0,4b564e3077773ce9465e3e7f1c3de207d911b9bdb780e0e7ab4cd3d37dda245b,2024-08-19T13:30:45.700000 -CVE-2024-6733,0,1,2c6af872f9b8e7fd5b566f1882ba0aab1c7fe087e89241fd4a5514342919d09e,2024-08-21T17:00:32.243000 -CVE-2024-6734,0,1,99b6c404dde349127fbc4e3a9bddf4648a2734ed6897dbd445a2358ddaf7af89,2024-08-21T17:00:52.007000 -CVE-2024-6735,0,1,9ef87cfa7be3ed557a324eb8235c9371d645f72e1b23bc285d329ecd8e5d2258,2024-08-21T17:01:02.657000 -CVE-2024-6736,0,0,cd891724cf60acf44adb2041fa0a22fbd65fd30182ae6730eef9f5f95cf8b475,2024-07-15T13:00:34.853000 +CVE-2024-6733,0,0,2c6af872f9b8e7fd5b566f1882ba0aab1c7fe087e89241fd4a5514342919d09e,2024-08-21T17:00:32.243000 +CVE-2024-6734,0,0,99b6c404dde349127fbc4e3a9bddf4648a2734ed6897dbd445a2358ddaf7af89,2024-08-21T17:00:52.007000 +CVE-2024-6735,0,0,9ef87cfa7be3ed557a324eb8235c9371d645f72e1b23bc285d329ecd8e5d2258,2024-08-21T17:01:02.657000 +CVE-2024-6736,0,1,2d663f35896bd1420a8935dfae2be163d45d490f852b5406a36a1a062262f9a2,2024-08-21T18:14:15.270000 CVE-2024-6737,0,0,8702e57b452a150308d6299787708abc780fef0e416c70970908b3d0d87bc73f,2024-07-16T14:06:09.530000 CVE-2024-6738,0,0,3a61a9d0dff57bd9a24abf3ccb065f63726018d20fe8e9197bc7bc11863de922,2024-07-16T14:06:27.810000 CVE-2024-6739,0,0,ff130f606a3e8a51263eb79c0c10405a59fd6ec00a9a26fc959f88e93b41ffd0,2024-07-16T18:02:40.327000 @@ -260147,10 +260160,10 @@ CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d97 CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000 CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000 CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000 -CVE-2024-6811,1,1,fcb69062318962c7f29c346967edc4eb346df61c05dace675d77661f13d3ec68,2024-08-21T17:25:08.560000 -CVE-2024-6812,1,1,c41f54f4372a4b179105459f6c49696d7184de4b816295370f5ab8028207d0e1,2024-08-21T17:25:08.560000 -CVE-2024-6813,1,1,6a21a5d43037bfd5d84ad70a83159aae7019b35c5a800088a530166c72802e27,2024-08-21T17:25:08.560000 -CVE-2024-6814,1,1,036c0b46f25187b9181e8a78842498f582eb75e5fcb228478713dbfcd9caea2d,2024-08-21T17:25:08.560000 +CVE-2024-6811,0,0,fcb69062318962c7f29c346967edc4eb346df61c05dace675d77661f13d3ec68,2024-08-21T17:25:08.560000 +CVE-2024-6812,0,0,c41f54f4372a4b179105459f6c49696d7184de4b816295370f5ab8028207d0e1,2024-08-21T17:25:08.560000 +CVE-2024-6813,0,0,6a21a5d43037bfd5d84ad70a83159aae7019b35c5a800088a530166c72802e27,2024-08-21T17:25:08.560000 +CVE-2024-6814,0,0,036c0b46f25187b9181e8a78842498f582eb75e5fcb228478713dbfcd9caea2d,2024-08-21T17:25:08.560000 CVE-2024-6823,0,0,1e2d1c8757819689d6550f5aeeb754dc03b20b4dd91487b47d8b2bbdb01a8e63,2024-08-13T12:58:25.437000 CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80faa8,2024-08-08T13:04:18.753000 CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000 @@ -260180,7 +260193,7 @@ CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf92 CVE-2024-6896,0,0,5408a7e80aa3e88cd45cfede99bb9ef131493e304d3dbf46fdd9905f82d27439,2024-08-08T20:06:25.957000 CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000 CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000 -CVE-2024-6899,0,1,0e1303a05eac5f64f40b636b733340591f6500aece8697f82e69b185e523484a,2024-08-21T17:30:03.590000 +CVE-2024-6899,0,0,0e1303a05eac5f64f40b636b733340591f6500aece8697f82e69b185e523484a,2024-08-21T17:30:03.590000 CVE-2024-6900,0,0,e500188038c3ea14b8e23eb8bbafe809d907d6d44fb62c1134048b209905575c,2024-07-24T16:55:06.977000 CVE-2024-6901,0,0,5b35468e95067e893aef6f3b2a5c35230a71dda604aa4246e174e6067847a2c6,2024-07-24T16:55:57.230000 CVE-2024-6902,0,0,9b85a01f5de4fc5c3a3410cfeacfa5e7187e00590b2e96e858dd024e26f3a385,2024-07-24T16:55:37.197000 @@ -260220,13 +260233,13 @@ CVE-2024-6948,0,0,0b9fbb236c6e3f5ea21d1e35e20ae66f7f191a5cc171b7ef9247f18011e040 CVE-2024-6949,0,0,50fb9ada1c84c7692d0a258888bcfbeb043b4a29416a40cdc9f5aa2aa0edc74b,2024-07-22T13:00:31.330000 CVE-2024-6950,0,0,eef15633338af4a4d46f21c9ea1976ad7775894e17137260e2d107902fc3b3ff,2024-07-22T13:00:31.330000 CVE-2024-6951,0,0,ebbc0494a46d3e9d3d9e38f19f55f076805f950ade9957285c0b9a9903fc46f8,2024-08-14T16:34:39.177000 -CVE-2024-6952,0,1,918977008643369bfcea6db43d9f8d1eb39335c72e76787e42816cbd089da27d,2024-08-21T17:41:15.617000 -CVE-2024-6953,0,1,291eaa6525a2e87766f77633de5130202f5fd8fb4ed44f4af0f0f2dc212bc23a,2024-08-21T17:40:06.063000 -CVE-2024-6954,0,1,c06d03a87a212d68531c7c73c484227f56949bfb0d1b91e3dc55b0bff86a2313,2024-08-21T17:38:34.087000 -CVE-2024-6955,0,1,a26f625ecf124adff42bb43bc9f1e0c8d32b78d7fbf99f165aa453f32a4235a7,2024-08-21T17:37:00.700000 -CVE-2024-6956,0,1,402b3b90bc0ef6eea6fea2da2c73e896560064f50f2a4d52cad793cf96bb3277,2024-08-21T17:35:59.550000 -CVE-2024-6957,0,1,b4f44e4de7831c46c7995591b032592b6aa63f3442f007561464731699c5213c,2024-08-21T17:33:42.753000 -CVE-2024-6958,0,1,815ebcc0d5fc84aab6c67001f06fe76ce9152d116a343e60ea5524ee95f4434e,2024-08-21T17:42:29.697000 +CVE-2024-6952,0,0,918977008643369bfcea6db43d9f8d1eb39335c72e76787e42816cbd089da27d,2024-08-21T17:41:15.617000 +CVE-2024-6953,0,0,291eaa6525a2e87766f77633de5130202f5fd8fb4ed44f4af0f0f2dc212bc23a,2024-08-21T17:40:06.063000 +CVE-2024-6954,0,0,c06d03a87a212d68531c7c73c484227f56949bfb0d1b91e3dc55b0bff86a2313,2024-08-21T17:38:34.087000 +CVE-2024-6955,0,0,a26f625ecf124adff42bb43bc9f1e0c8d32b78d7fbf99f165aa453f32a4235a7,2024-08-21T17:37:00.700000 +CVE-2024-6956,0,0,402b3b90bc0ef6eea6fea2da2c73e896560064f50f2a4d52cad793cf96bb3277,2024-08-21T17:35:59.550000 +CVE-2024-6957,0,0,b4f44e4de7831c46c7995591b032592b6aa63f3442f007561464731699c5213c,2024-08-21T17:33:42.753000 +CVE-2024-6958,0,0,815ebcc0d5fc84aab6c67001f06fe76ce9152d116a343e60ea5524ee95f4434e,2024-08-21T17:42:29.697000 CVE-2024-6960,0,0,932ef4036cbd886ee22297597ffd985e884d3c0cad50613ff0bd32ecdcd39a17,2024-08-01T14:00:50.973000 CVE-2024-6961,0,0,c26f41db6b5c6e22104567980ea901ebcdc3d0c6ac8c59905ee37ac020ae3afe,2024-08-01T14:00:51.710000 CVE-2024-6962,0,0,b8054e2d59ceccdcd4628c1dbc900d3f0c22ab58e2eaf33700d9d63f648dd237,2024-07-25T15:47:18.363000 @@ -260528,7 +260541,7 @@ CVE-2024-7443,0,0,6fd967d6e919ba4fd37dfeb9ebba86f65e44a71c337f483ada629ef6535926 CVE-2024-7444,0,0,ca3d64055e225d6b5e8eee0e0444f0cb79935fb72609b2a9f4d68e4b74c3192c,2024-08-20T19:56:15.850000 CVE-2024-7445,0,0,cfdc75d4fec77cd886589c658aa3dd464f31452c81f68546e40e8c22e50a8eed,2024-08-09T15:36:06.757000 CVE-2024-7446,0,0,e26be21c8dbcfe67dfe123a70d3d827309d2b8d2fde731242ee6ec383c477df8,2024-08-09T15:36:35.453000 -CVE-2024-7448,1,1,ae9849032eac16c236c4781468f5868682dc2760c8d4f5d5b735d0acf907ec20,2024-08-21T17:24:59.627000 +CVE-2024-7448,0,0,ae9849032eac16c236c4781468f5868682dc2760c8d4f5d5b735d0acf907ec20,2024-08-21T17:24:59.627000 CVE-2024-7449,0,0,31b14531757b0311680dadfa626760cb5034a4ff48ce18c613a332462c638a89,2024-08-20T19:49:11.947000 CVE-2024-7450,0,0,f36a88ecb7cf7b37b6090837acfb29fe52cc382469b7cf045e11a727c85c93f7,2024-08-09T15:33:58.153000 CVE-2024-7451,0,0,6c3c74a805aba0686ff087a4aeedf52269a2704aceeaba8fd15f2602a7b0b5b8,2024-08-09T15:33:56.027000 @@ -260629,15 +260642,15 @@ CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e496652 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 CVE-2024-7592,0,0,8fcc04f54e061bfd6e46ae198ccc83c91032e0aab9065b8f437b9e9535665aed,2024-08-20T16:02:16.280000 CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000 -CVE-2024-7600,1,1,df9ea5382ae76eaa07d2038f3c1a261b5dab3a8d51edba8a1615dd75b8a7ae86,2024-08-21T17:25:08.560000 -CVE-2024-7601,1,1,0cd0cc3e9b592f69c60fa9525e9b4044ea678650dac96bf878bb0bc12d18b5f7,2024-08-21T17:25:08.560000 -CVE-2024-7602,1,1,681670da0d5ea368276c458bfd335dc84142a379f35cd9d1072e79c0c0968dd3,2024-08-21T17:25:08.560000 -CVE-2024-7603,1,1,ee75ca73d9ff000a521d60dd2bd96d940a61dcfaa024b75a8d0f0f33bb52d71c,2024-08-21T17:25:08.560000 -CVE-2024-7604,1,1,58eb9c041603c3622120dc34dbfc5b0275d32c68e3480a84279fede21b10ec78,2024-08-21T17:24:59.627000 +CVE-2024-7600,0,0,df9ea5382ae76eaa07d2038f3c1a261b5dab3a8d51edba8a1615dd75b8a7ae86,2024-08-21T17:25:08.560000 +CVE-2024-7601,0,0,0cd0cc3e9b592f69c60fa9525e9b4044ea678650dac96bf878bb0bc12d18b5f7,2024-08-21T17:25:08.560000 +CVE-2024-7602,0,0,681670da0d5ea368276c458bfd335dc84142a379f35cd9d1072e79c0c0968dd3,2024-08-21T17:25:08.560000 +CVE-2024-7603,0,0,ee75ca73d9ff000a521d60dd2bd96d940a61dcfaa024b75a8d0f0f33bb52d71c,2024-08-21T17:25:08.560000 +CVE-2024-7604,0,0,58eb9c041603c3622120dc34dbfc5b0275d32c68e3480a84279fede21b10ec78,2024-08-21T17:24:59.627000 CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000 -CVE-2024-7613,0,0,06e5e4cabe0ef18122aca52d435df5e080447fe62b8094db57d734d45448c36d,2024-08-12T13:41:36.517000 -CVE-2024-7614,0,0,54eddeca8e1c6b6ecc667c92d7e5534bf70f527d9e0326937623565b4f96285b,2024-08-12T13:41:36.517000 -CVE-2024-7615,0,0,c95186bee30ee9d98984fd42abb70a6c57cc1a040a77bb7f8cddb1e0de2ab249,2024-08-12T13:41:36.517000 +CVE-2024-7613,0,1,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000 +CVE-2024-7614,0,1,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 +CVE-2024-7615,0,1,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000 CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000 @@ -260698,10 +260711,10 @@ CVE-2024-7707,0,0,38947b3991050cbcb34490d84db5d3d8182daacb8ab1c53d2e724892f18e8f CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000 CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 -CVE-2024-7722,1,1,ed589b436121ac9a3fcd90fc85c4083056988d4210c0a21437bc5f095ecc7e14,2024-08-21T17:24:59.627000 -CVE-2024-7723,1,1,f8418822989427c5ec1502a344654c7e86d8c9bf23bba85bb56e5246084c028f,2024-08-21T17:24:59.627000 -CVE-2024-7724,1,1,2140d53b1531a123a76a6a3dc8b0dd231e5c8087b65471a97b5981e4adc89652,2024-08-21T17:24:59.627000 -CVE-2024-7725,1,1,d259c6d5729bf44a1338f2a16127fec02c9b65e8cb1e5bc73a0892db20205863,2024-08-21T17:24:59.627000 +CVE-2024-7722,0,0,ed589b436121ac9a3fcd90fc85c4083056988d4210c0a21437bc5f095ecc7e14,2024-08-21T17:24:59.627000 +CVE-2024-7723,0,0,f8418822989427c5ec1502a344654c7e86d8c9bf23bba85bb56e5246084c028f,2024-08-21T17:24:59.627000 +CVE-2024-7724,0,0,2140d53b1531a123a76a6a3dc8b0dd231e5c8087b65471a97b5981e4adc89652,2024-08-21T17:24:59.627000 +CVE-2024-7725,0,0,d259c6d5729bf44a1338f2a16127fec02c9b65e8cb1e5bc73a0892db20205863,2024-08-21T17:24:59.627000 CVE-2024-7728,0,0,c0ed30007f00488b5c62db3cfd8f859193059df346d1ebce1c04c936068d2a21,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,b303d5d4be15b474d481a2bd874b63765444e7a77fd0332a4aa454ee055ae189,2024-08-14T13:00:37.107000 CVE-2024-7731,0,0,4a861aabf412f4b5069dda19ca66661f2d33b6edc7ffa683ebdfa08ec3de8567,2024-08-14T13:00:37.107000 @@ -260709,10 +260722,10 @@ CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d CVE-2024-7733,0,0,bb60f9c1721a7d7267312f0897dbc581707f825a01d4c52185c190045c2c2268,2024-08-14T02:07:05.410000 CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000 CVE-2024-7739,0,0,48d24e6c734bdd0aabede58961a2ddba8bd9566478ef049fa21ee7be6d7677d2,2024-08-14T02:07:05.410000 -CVE-2024-7740,0,0,28c63057226da1f4eb41e9760f7d691d9f0f0460721dbce1bb29a734f370ba8e,2024-08-14T02:07:05.410000 -CVE-2024-7741,0,0,8dd0073f91345b3e286d9fb43f27766c169036bb31ececad1ea53f4fc3f24b11,2024-08-14T02:07:05.410000 -CVE-2024-7742,0,0,c5e47faa09fa117a6d9bc5a66e2b0fd87fc2edd44801044a230a15d6b9f0a897,2024-08-14T02:07:05.410000 -CVE-2024-7743,0,0,3235187f2f7061cd444ef7d2afe0cb7960f2e8c10cbb31f71abd28ffcd7aa9ca,2024-08-14T02:07:05.410000 +CVE-2024-7740,0,1,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000 +CVE-2024-7741,0,1,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000 +CVE-2024-7742,0,1,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000 +CVE-2024-7743,0,1,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000 CVE-2024-7746,0,0,57c293bd84bcc81db971f993e54710083e23fbaa2d9a714afae737b9c1e2cedc,2024-08-13T17:11:53.553000 CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000 CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000 @@ -260730,7 +260743,7 @@ CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c7 CVE-2024-7792,0,0,780efb1d4f2f4b2b409fe743d3f22e99dbfd1dd19ca4b6135b1d10d208fddc9f,2024-08-20T19:08:12.970000 CVE-2024-7793,0,0,bb4d13faa2c61a286b24cee75d87f2b6ca9a8400f7f1f86af9de88e306f04a14,2024-08-19T16:25:22.220000 CVE-2024-7794,0,0,518887acdec1d096ed1811f068ac701594939d9da7ca16210cb9fbd6cafa8631,2024-08-19T16:27:08.303000 -CVE-2024-7795,1,1,73ce209254878b5c3098ccd867b236fd49d4addfc3fae20ed136f1d0f4a7a1ff,2024-08-21T17:24:59.627000 +CVE-2024-7795,0,0,73ce209254878b5c3098ccd867b236fd49d4addfc3fae20ed136f1d0f4a7a1ff,2024-08-21T17:24:59.627000 CVE-2024-7797,0,0,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5fe,2024-08-19T16:28:23.557000 CVE-2024-7798,0,0,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000 CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000 @@ -260766,7 +260779,7 @@ CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3 CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000 CVE-2024-7867,0,0,6a317fb9db8a508202f8841173e6c3d2bd77edc707a891aff0fcaf7f472e0f1b,2024-08-19T13:00:23.117000 CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000 -CVE-2024-7885,0,1,d4e86ffa8f6c41db8fd62899fcadef82a76f3f1405a536b574424e08695e6cf7,2024-08-21T16:06:23.153000 +CVE-2024-7885,0,0,d4e86ffa8f6c41db8fd62899fcadef82a76f3f1405a536b574424e08695e6cf7,2024-08-21T16:06:23.153000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000 @@ -260782,7 +260795,7 @@ CVE-2024-7905,0,0,21f9c7e0a38dacbbd12a6dfd1c594b7e02a0285538c8d01b6b02b4c01004d2 CVE-2024-7906,0,0,5925ebd1a52432bd63b3f19ac1ead0d4887664fec659899d48bbaa77d66a321d,2024-08-19T12:59:59.177000 CVE-2024-7907,0,0,827448a6d782832b90e0dd3114804655fe12e38aa269495431146155f04a25e9,2024-08-19T18:53:05.753000 CVE-2024-7908,0,0,1704b05a8eab2513be21f00da86f5d343c3177e7c40e6732dc94cca77c757036,2024-08-19T18:51:45.210000 -CVE-2024-7909,0,0,3ff5920e8c2d440f1d0a0566cd9f8d3e8252d8e263e071d23d56a988554a2719,2024-08-19T18:51:07.600000 +CVE-2024-7909,0,1,40f7aff5d4e7669f2f16671b680f3fd5a01c5b2e923d87f6df868e1cdd6fdef1,2024-08-21T19:15:13.487000 CVE-2024-7910,0,0,dddecbe9efccf1f397282c79f0ba4716c91b37bb24bbae91fa6ba76ac0a217be,2024-08-19T18:49:49.110000 CVE-2024-7911,0,0,859a4ab2d69fd8051484705c8ccd7b2fca36f9fd16b342bf7a32ac0026ea24e4,2024-08-19T18:48:06.527000 CVE-2024-7912,0,0,d022e995569549791df9628a3255ea9ef44a2cde43358affb6b230c8e7dbab8f,2024-08-19T16:16:10.667000 @@ -260814,11 +260827,11 @@ CVE-2024-7945,0,0,d2428ee2dcd967452089d140ce94a2be4092f314afe3e103f6f27860690dc8 CVE-2024-7946,0,0,55b44492c55caac843a1ad836ee11f9cccc3723d88087e17cb61194f5c694743,2024-08-21T13:55:24.780000 CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193e5,2024-08-21T13:53:38.750000 CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000 -CVE-2024-7949,0,0,a0f87c25225f514b77e6885828a01bd09830515b5f3d810f59da2bdb40fb721c,2024-08-21T13:51:13.580000 +CVE-2024-7949,0,1,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000 CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000 CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000 -CVE-2024-8007,0,1,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000 +CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000