From b784901a65700f42694a6d21f3f1c298d71f4358 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 24 Aug 2024 12:03:15 +0000 Subject: [PATCH] Auto-Update: 2024-08-24T12:00:17.576552+00:00 --- CVE-2023/CVE-2023-304xx/CVE-2023-30430.json | 12 +- CVE-2023/CVE-2023-309xx/CVE-2023-30997.json | 12 +- CVE-2023/CVE-2023-309xx/CVE-2023-30998.json | 12 +- CVE-2023/CVE-2023-350xx/CVE-2023-35022.json | 14 +- CVE-2023/CVE-2023-383xx/CVE-2023-38368.json | 10 +- CVE-2024/CVE-2024-223xx/CVE-2024-22333.json | 14 +- CVE-2024/CVE-2024-417xx/CVE-2024-41774.json | 12 +- CVE-2024/CVE-2024-81xx/CVE-2024-8127.json | 152 ++++++++++++++++++++ README.md | 17 ++- _state.csv | 17 +-- 10 files changed, 216 insertions(+), 56 deletions(-) create mode 100644 CVE-2024/CVE-2024-81xx/CVE-2024-8127.json diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30430.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30430.json index 8c875c60e58..f3f6fecc64b 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30430.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30430.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30430", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-27T16:15:10.620", - "lastModified": "2024-08-02T15:05:03.667", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-24T11:15:04.317", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 6.2, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30997.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30997.json index 5f2791b9324..a0e0d9040f1 100644 --- a/CVE-2023/CVE-2023-309xx/CVE-2023-30997.json +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30997.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30997", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-27T19:15:10.800", - "lastModified": "2024-08-02T15:27:26.730", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-24T11:15:04.673", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.4, + "baseScore": 7.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 5.9 } ] diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30998.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30998.json index 43bf3a07c9c..0626919c22f 100644 --- a/CVE-2023/CVE-2023-309xx/CVE-2023-30998.json +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30998.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30998", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-27T19:15:11.187", - "lastModified": "2024-08-02T15:28:08.690", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-24T11:15:04.873", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.4, + "baseScore": 7.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 5.9 } ] diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json index d3c91d94731..bdbd241496b 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35022", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T16:15:02.600", - "lastModified": "2024-08-20T14:13:16.427", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-24T11:15:05.047", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 4.0, - "baseSeverity": "MEDIUM" + "baseScore": 3.3, + "baseSeverity": "LOW" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 1.4 } ] diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38368.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38368.json index 99b4e6bdec6..79c2ce82bdd 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38368.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38368.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38368", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-27T19:15:11.460", - "lastModified": "2024-08-04T12:16:00.803", + "lastModified": "2024-08-24T11:15:05.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 6.2, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22333.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22333.json index bffab4cfc5c..a8beabf8081 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22333.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22333.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22333", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-13T14:15:11.110", - "lastModified": "2024-08-07T17:26:13.623", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-24T11:15:05.467", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 4.0, - "baseSeverity": "MEDIUM" + "baseScore": 3.3, + "baseSeverity": "LOW" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 1.4 } ] diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41774.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41774.json index da921ffd994..309b43cd68e 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41774.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41774.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41774", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-13T11:15:17.973", - "lastModified": "2024-08-22T13:27:39.753", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-24T11:15:05.670", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 5.5, + "baseScore": 4.8, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.3, + "exploitabilityScore": 1.7, "impactScore": 2.7 } ] diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8127.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8127.json new file mode 100644 index 00000000000..ed4dd1bc79a --- /dev/null +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8127.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2024-8127", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-24T10:15:04.370", + "lastModified": "2024-08-24T10:15:04.370", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This vulnerability affects the function cgi_unzip of the file /cgi-bin/webfile_mgr.cgi of the component HTTP POST Request Handler. The manipulation of the argument path leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_unzip.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275698", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275698", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.396236", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 85e520ed6c0..e35ba243d0e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-24T10:00:16.703032+00:00 +2024-08-24T12:00:17.576552+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-24T08:15:04.063000+00:00 +2024-08-24T11:15:05.670000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261079 +261080 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -- [CVE-2024-7351](CVE-2024/CVE-2024-73xx/CVE-2024-7351.json) (`2024-08-24T08:15:04.063`) +- [CVE-2024-8127](CVE-2024/CVE-2024-81xx/CVE-2024-8127.json) (`2024-08-24T10:15:04.370`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `7` +- [CVE-2023-30430](CVE-2023/CVE-2023-304xx/CVE-2023-30430.json) (`2024-08-24T11:15:04.317`) +- [CVE-2023-30997](CVE-2023/CVE-2023-309xx/CVE-2023-30997.json) (`2024-08-24T11:15:04.673`) +- [CVE-2023-30998](CVE-2023/CVE-2023-309xx/CVE-2023-30998.json) (`2024-08-24T11:15:04.873`) +- [CVE-2023-35022](CVE-2023/CVE-2023-350xx/CVE-2023-35022.json) (`2024-08-24T11:15:05.047`) +- [CVE-2023-38368](CVE-2023/CVE-2023-383xx/CVE-2023-38368.json) (`2024-08-24T11:15:05.273`) +- [CVE-2024-22333](CVE-2024/CVE-2024-223xx/CVE-2024-22333.json) (`2024-08-24T11:15:05.467`) +- [CVE-2024-41774](CVE-2024/CVE-2024-417xx/CVE-2024-41774.json) (`2024-08-24T11:15:05.670`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 322d4056d06..df0d582654c 100644 --- a/_state.csv +++ b/_state.csv @@ -222814,7 +222814,7 @@ CVE-2023-3042,0,0,4ffb0a798b27135693d0203330a9c50fc11d9ba5989f0e1c349afc0ccae600 CVE-2023-30428,0,0,1efeec4521c1a839ffce9db519aae5f3b59a6d29b3b62d170ba0843e2efdc83d,2023-07-20T16:41:45.247000 CVE-2023-30429,0,0,27d09dd85c230885df071c5f8e27796ba6483afc1e418cf2b610af918d289e0d,2023-07-20T16:47:49.747000 CVE-2023-3043,0,0,09e537fa053cef06eef2088a7b3b0ae592cdbc3886ebc90ce64b70ac5590af26,2024-01-12T19:18:06.067000 -CVE-2023-30430,0,0,9c3c27eb82d8b7664f3df11684ae2c351a0fcec4e7d73a21d3f4379f378eda09,2024-08-02T15:05:03.667000 +CVE-2023-30430,0,1,e8ab45b47e6a0b34bcc30671dafa5794d9dd6e2a2b6b519a00d17d8fbed9fdf6,2024-08-24T11:15:04.317000 CVE-2023-30431,0,0,a4d0b8dc929e2eb23d72b6911cdb8d0e6ab0113367ce1f180fc64f7f2bb0fab2,2023-07-31T19:15:16.290000 CVE-2023-30433,0,0,dd339006b05be3847f7b076d76cf2c872ebc87a1eb3b28ef6127051233c66faf,2023-07-28T13:57:03.003000 CVE-2023-30434,0,0,cf827b2e6de85ce12f0be7e7ddfd04813e409d564e19f0808eca74c91d46bd5a,2023-05-11T18:45:43.990000 @@ -223314,8 +223314,8 @@ CVE-2023-30993,0,0,c8cd99973390ba8216648c74aeabc9afdbec9b32fb2819c0273b8b55de5ec CVE-2023-30994,0,0,f5d053ad0a566020d5caa8e4b1adf3b03208313ac50e66696bd27a25eef200ec,2023-10-18T20:48:41.863000 CVE-2023-30995,0,0,4b8cbf9cea1a21fe53b1ee1e6d462e33c7bb2d3a82b0dc4ef85827986b70778a,2023-10-10T20:15:09.650000 CVE-2023-30996,0,0,8a64f6cd4760b6458797be086be47526b41dc80f495a0bd14bff963833976ec9,2024-06-21T19:15:26.747000 -CVE-2023-30997,0,0,5a9cdbbc4282be58f8117c8e74dee2f28529fd3b34c7494a6d2191698a3100ba,2024-08-02T15:27:26.730000 -CVE-2023-30998,0,0,564c1f08d7599cce65b19af06fb76373ba18d0a40b9c3408084ac41c05afd63e,2024-08-02T15:28:08.690000 +CVE-2023-30997,0,1,2fc8e2a47e27d09547df2f3c68989753702659f76b615f548939567e823f051d,2024-08-24T11:15:04.673000 +CVE-2023-30998,0,1,a8807b6e531f44d381a6e524fe3973a0ab896e7efd09caa37ed4aa827a59d08e,2024-08-24T11:15:04.873000 CVE-2023-30999,0,0,7f6289ceb3528d8673f13505a6c257a4badec85212c9af4c7b19079f175ab653,2024-02-06T21:31:55.033000 CVE-2023-3100,0,0,f51861655831ae5f2d04423d44b734069523877f0cb4ce519e250d3b1385d110,2024-05-17T02:27:16.360000 CVE-2023-31001,0,0,af829d450fc27f31f74cdd0accc391af3395d5bb550a9aae70fcfb4ae8b18ee4,2024-01-18T17:06:28.277000 @@ -226356,7 +226356,7 @@ CVE-2023-35018,0,0,6d336ce3e2614937180971b4858c079e9a4762f40daaf2f592acb48025066 CVE-2023-35019,0,0,1291349f3b1d1d4adf1c92cac15e5df37965c90cdb3e3c741c73d93303d641a0,2023-08-04T17:23:56.413000 CVE-2023-3502,0,0,74be66f33660d5a960e431317df48fb842e4013315111e826f94f24e7bf2f927,2024-05-17T02:27:32.370000 CVE-2023-35020,0,0,ad9d714b38fc8dfafebf526e5bcd88bda4558e15578975a719df5c9198c79c30,2024-01-24T21:38:11.280000 -CVE-2023-35022,0,0,d5f23bc16e5c4f8268ac77331c232fcd8b44fdbdf1378d750d9156b59071a091,2024-08-20T14:13:16.427000 +CVE-2023-35022,0,1,29fecfd53ddaeeaab29e0dca4e8d95115a62ab32989d7e86eaa68c4ef8133e7b,2024-08-24T11:15:05.047000 CVE-2023-35024,0,0,b99623d62fd61cec8b42feb7692d36a2dddfce4725f8455d7ba260278fc27d1c,2023-10-18T21:04:02.917000 CVE-2023-35029,0,0,e92935d889ee7a18e80a49707d3023b26a55365680006a3e5edfac7046aa802e,2023-06-22T16:51:23.137000 CVE-2023-3503,0,0,9899b3a06c9c6b85f8b5fdfd6303f5bfb45d62bdf6dce68bc15f1326d515bc23,2024-05-17T02:27:32.480000 @@ -228840,7 +228840,7 @@ CVE-2023-38363,0,0,5d567ca36d68bada1966cb8013ba9388f62a1e3ac51af88afccfec2595295 CVE-2023-38364,0,0,e8781858dd63f12725556439972e1c19d07369b694f9023baae5e6e1abc7466f,2023-11-16T21:42:44.240000 CVE-2023-38366,0,0,d81a123c387aad52e89b1347347e26180ebfadfcf396c406bb043eedb5c46ccb,2024-03-01T14:04:26.010000 CVE-2023-38367,0,0,01ad222beec06a0c7fa29133d6ae3a5989e0abd419949bb8046f28c19603a86c,2024-02-29T13:49:29.390000 -CVE-2023-38368,0,0,5f39cd63c04cc18a6285d1ac1c22989cb35f474eb57535bc97030485ae43ccf8,2024-08-04T12:16:00.803000 +CVE-2023-38368,0,1,0d78951996fe1fb63ced5ee0fd793ec7e72e82422e16a94106816d6965de3969,2024-08-24T11:15:05.273000 CVE-2023-38369,0,0,c91dd280a08bf7f58190c17458ca2d7cc53f18627ab7d5c893cf27ff88663ff6,2024-02-10T04:01:12.283000 CVE-2023-3837,0,0,a4825f48e706c9ac328948168eff6e41b7a5ddef4ce4d0b60fd3d0eb94799eb8,2024-05-17T02:27:52.140000 CVE-2023-38370,0,0,2f608b49fa78e28ed7d54597307441f89eca69687954b9c4cb03d84feb5857b4,2024-07-31T20:23:36.970000 @@ -244543,7 +244543,7 @@ CVE-2024-22329,0,0,aa0a912726f87ac0fc2f03e4f48cf9b56180a47c1f55734bdb4c9a367e289 CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000 CVE-2024-22331,0,0,d490fba89e7f88683c136dfcfc87c9cff8ad31b547c7cdf5425991357b2dcb7b,2024-02-13T20:26:23.780000 CVE-2024-22332,0,0,638d06450f89d191258df8fe36d1620abd0564acdb0d8f1f383caf127d6d43b9,2024-04-03T02:15:07.973000 -CVE-2024-22333,0,0,32daa0ad16ffcf3cce1875751b5e8b62b44414240e6f14552d6f5aff016eaa45,2024-08-07T17:26:13.623000 +CVE-2024-22333,0,1,2aea130a34348f78dfbf003fc187c19aae24d1eb68c0b3938ae198b41308d45b,2024-08-24T11:15:05.467000 CVE-2024-22334,0,0,1951698d7ab1d55a1824ae76507a3577dbbe6facddaaf9272bcefe471309fc13,2024-04-15T13:15:51.577000 CVE-2024-22335,0,0,a452659277dfc0c00bbebf3f7fdbdbc10eb5e3a4586e5ce33a7b718b3f3008c7,2024-02-20T19:50:53.960000 CVE-2024-22336,0,0,34ed66b8b7f583d44759ce52a251db14fa1a95596195a1c1fd9558e86e073ccc,2024-02-20T19:50:53.960000 @@ -257291,7 +257291,7 @@ CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 CVE-2024-41773,0,0,e915a596fb7e1ca4e452145ef4744da8e1b8ffba9e32d109e0437370be6438d6,2024-08-21T12:30:33.697000 -CVE-2024-41774,0,0,42da2543a9388f5e4e9842b30e9bac4ae3d1d3acc4938c24e268b95f522142f0,2024-08-22T13:27:39.753000 +CVE-2024-41774,0,1,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000 CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000 CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 CVE-2024-41800,0,0,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000 @@ -260677,7 +260677,7 @@ CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5f7,2024-08-20T19:25:17.513000 CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000 CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000 -CVE-2024-7351,1,1,35ecac90fe479e7e0eac09d2c1c89d7d904a32c15fdd3b1e32b662d1a1870006,2024-08-24T08:15:04.063000 +CVE-2024-7351,0,0,35ecac90fe479e7e0eac09d2c1c89d7d904a32c15fdd3b1e32b662d1a1870006,2024-08-24T08:15:04.063000 CVE-2024-7353,0,0,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000 CVE-2024-7355,0,0,071610fbf603e9022aa74d299a7d28ffd46303d85d85cb60c4b41df2eba6145e,2024-08-07T15:17:46.717000 CVE-2024-7356,0,0,422e8f0e5351e2aaa94610787f75fca2971bce2e8243e94e1dab25149b00bf15,2024-08-05T12:41:45.957000 @@ -261078,3 +261078,4 @@ CVE-2024-8089,0,0,fe8d41ba149aaae8be5bcde261fbae8cee913e6a537c9c73424591ad94ea6f CVE-2024-8112,0,0,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000 CVE-2024-8113,0,0,663828d204cb9ecb17f530ae295b4541dee23e7a4b7b9d658530d5cb44ff87e3,2024-08-23T16:18:28.547000 CVE-2024-8120,0,0,b588d9e16e67a2e06fbd40a6289508e4549b2d995767d4ddf7a7de8f5dc1fd92,2024-08-24T03:15:04.543000 +CVE-2024-8127,1,1,d1141915719639d4a45272a624f00fc8374c50578320b4ac97a3acb867c6e2c9,2024-08-24T10:15:04.370000