Auto-Update: 2024-08-08T20:00:17.133533+00:00

This commit is contained in:
cad-safe-bot 2024-08-08 20:03:12 +00:00
parent ea48197151
commit bf4cccd2b1
79 changed files with 3383 additions and 314 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-20190",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T00:15:07.580",
"lastModified": "2024-08-05T22:15:31.440",
"lastModified": "2024-08-08T19:35:01.580",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -23,6 +23,18 @@
}
],
"metrics": {},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-176"
}
]
}
],
"references": [
{
"url": "https://aka.ms/windowsbugbar",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-20471",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-02-01T21:15:13.670",
"lastModified": "2024-07-30T01:15:11.233",
"lastModified": "2024-08-08T18:35:00.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -74,6 +94,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-24062",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.317",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR12, 4.0.0 SR04, 4.1.0 SR02, and 4.2.0 SR01 fails to validate the directory structure of the root file system during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-24063",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.410",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR10 fails to validate /etc/mtab during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-24064",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.467",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR4 fails to validate /etc/initab during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-28865",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.533",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR15, 4.0.0 SR05, 4.1.0 SR03, and 4.2.0 SR02 fails to validate the directory contents of certain directories (e.g., ensuring the expected hash sum) during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-33206",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.597",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR16, 4.0.0 SR06, 4.1.0 SR04, 4.2.0 SR03, and 4.3.0 SR01 fails to validate symlinks during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-40261",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.670",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR17, 4.0.0 SR07, 4.1.0 SR04, 4.2.0 SR04, and 4.3.0 SR03 fails to validate file attributes during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48902",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T04:15:09.013",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-08-08T19:35:03.727",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en tramyardg autoexpress versi\u00f3n 1.3.0, que permite a atacantes remotos no autenticados escalar privilegios, actualizar datos de autom\u00f3viles, eliminar veh\u00edculos y cargar im\u00e1genes de autom\u00f3viles mediante la omisi\u00f3n de autenticaci\u00f3n en uploadCarImages.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://packetstormsecurity.com/files/177661/Tramyardg-Autoexpress-1.3.0-Authentication-Bypass.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0101",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T17:15:17.560",
"lastModified": "2024-08-08T17:15:17.560",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0102",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T17:15:18.013",
"lastModified": "2024-08-08T17:15:18.013",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-0104",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T18:15:09.800",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Mellanox OS, ONYX, Skyway, MetroX-2 and MetroX-3 XC contain a vulnerability in the LDAP AAA component, where a user can cause improper access. A successful exploit of this vulnerability might lead to information disclosure, data tampering, and escalation of privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5559",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0107",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T17:15:18.240",
"lastModified": "2024-08-08T17:15:18.240",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0108",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T17:15:18.473",
"lastModified": "2024-08-08T17:15:18.473",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20701",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:10.737",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:50:27.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20701",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21449",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:14.177",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:50:39.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21449",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24307",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-03T08:15:08.140",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-08-08T19:35:10.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Path Traversal en el m\u00f3dulo \"Product Designer\" (manipulador de productos) de Tunis Soft para PrestaShop anterior a la versi\u00f3n 1.178.36, permite a un atacante remoto escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del m\u00e9todo ajaxProcessCropImage()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-22.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26852",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:08.530",
"lastModified": "2024-06-27T12:15:21.490",
"lastModified": "2024-08-08T19:35:11.773",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net/ipv6: evita posible UAF en ip6_route_mpath_notify() syzbot encontr\u00f3 otro use-after-free en ip6_route_mpath_notify() [1] Commit f7225172f25a (\"net/ipv6: previene el use-after-free in ip6_route_mpath_notify\") no pudo solucionar la causa ra\u00edz. Necesitamos diferir las llamadas a fib6_info_release() despu\u00e9s de ip6_route_mpath_notify(), en la fase de limpieza. [1] ERROR: KASAN: slab-use-after-free en rt6_fill_node+0x1460/0x1ac0 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff88809a07fc64 mediante la tarea syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 25/01/2024 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [en l\u00ednea] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/report. c:601 rt6_fill_node+0x1460/0x1ac0 inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184 ip6_route_mpath_notify net/ipv6/route.c:5198 [en l\u00ednea] ip6_route_multipath_add net/ipv6/route.c:5404 et6_rtm_nuevaruta+ 0x1d0f/0x2300 net/ipv6/route.c:5517 rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543 netlink_unicast_kernel net/netlink/af_netlink.c:1 341 [en l\u00ednea] netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367 netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket .c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/0x240 entrada_SYSC ALL_64_after_hwframe+0x6f/0x77 RIP : 0033:0x7f73dd87dda9 C\u00f3digo: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 24 08 0f 05 <48 > 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: de RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9 RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 RBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000 R10: 00000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858 Asignado por tarea 23037: kasan_save_stack mm/kasan/common.c:47 [en l\u00ednea] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 veneno_kmalloc_redzone mm/kasan/common.c:372 [en l\u00ednea] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389 kasan_kmalloc include/linux/kasan.h: 211 [en l\u00ednea] __do_kmalloc_node mm/slub.c:3981 [en l\u00ednea] __kmalloc+0x22e/0x490 mm/slub.c:3994 kmalloc include/linux/slab.h:594 [en l\u00ednea] kzalloc include/linux/slab.h:711 [en l\u00ednea] fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155 ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758 ip6_route_multipath_add net/ipv6/route.c:5298 [inet6_rtm_newroute+0x74 4/0x2300 neto /ipv6/route.c:5517 rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [en l\u00ednea] netlink_unicast +0x7ea/0x980 net/netlink/af_netlink.c:1367 netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/0x240 entrada_SYSCALL_64_after_ hwframe+0x6f/0x77 Liberado por la tarea 16: kasan_save_stack mm/kasan/common.c:47 [en l\u00ednea] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640 veneno_slab_object+0xa6/0xe0 m --- truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/31ea5bcc7d4cd1423de6be327a2c034725704136",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26875",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:09.723",
"lastModified": "2024-06-27T12:15:21.710",
"lastModified": "2024-08-08T19:35:13.037",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: pvrusb2: corrige uaf en pvr2_context_set_notify [Syzbot inform\u00f3] ERROR: KASAN: slab-use-after-free en pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2 -context.c:35 Lectura del tama\u00f1o 4 en la direcci\u00f3n ffff888113aeb0d8 por tarea kworker/1:1/26 CPU: 1 PID: 26 Comm: kworker/1:1 No contaminado 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 25/01/2024 Cola de trabajo: usb_hub_wq hub_event Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c :106 print_address_description mm/kasan/report.c:377 [en l\u00ednea] print_report+0xc4/0x620 mm/kasan/report.c:488 kasan_report+0xda/0x110 mm/kasan/report.c:601 pvr2_context_set_notify+0x2c4/0x310 controladores/ media/usb/pvrusb2/pvrusb2-context.c:35 pvr2_context_notify controladores/media/usb/pvrusb2/pvrusb2-context.c:95 [en l\u00ednea] pvr2_context_disconnect+0x94/0xb0 controladores/media/usb/pvrusb2/pvrusb2-context.c :272 Liberado por la tarea 906: kasan_save_stack+0x33/0x50 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640 veneno_slab_object mm/kasan/common.c:241 [en l\u00ednea] __kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257 kasan_slab_free include/linux/kasan.h:184 [en l\u00ednea] slab_free_hook mm/slub.c:2121 [en l\u00ednea] slab_free mm/slub.c:4299 [en l\u00ednea] kfree+0x105/0x340 mm/slub.c:4409 pvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [en l\u00ednea] pvr2_context_thread_func+0x69d/0x960 controladores/medios /usb/pvrusb2/pvrusb2-context.c:158 [Analizar] La tarea A estableci\u00f3 desconectar_flag = !0, lo que result\u00f3 en que se cumpliera la condici\u00f3n de la tarea B y se liberara mp, lo que gener\u00f3 este problema. [Soluci\u00f3n] Coloque la operaci\u00f3n de asignaci\u00f3nconnect_flag despu\u00e9s de todo el c\u00f3digo en pvr2_context_disconnect() para evitar este problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0a0b79ea55de8514e1750884e5fec77f9fdd01ee",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26907",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:11.257",
"lastModified": "2024-06-25T22:15:25.960",
"lastModified": "2024-08-08T18:35:02.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31648",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-15T21:15:07.503",
"lastModified": "2024-04-16T13:24:07.103",
"lastModified": "2024-08-08T19:35:18.173",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Cross Site Scripting (XSS) en Insurance Management System v1.0, permite a atacantes remotos ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre de categor\u00eda en /core/new_category2."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31648.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-32624",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:36:48.213",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-08-08T18:35:04.250",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La librer\u00eda HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5T__ref_mem_setnull en H5Tref.c (llamado desde H5T__conv_ref en H5Tconv.c), lo que resulta en la corrupci\u00f3n del puntero de instrucci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33771",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:38:05.203",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-08-08T19:35:19.960",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer en /bin/boa en D-Link DIR-619L Rev.B 2.06B1 a trav\u00e9s de goform/formWPS permite a usuarios remotos autenticados activar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s del par\u00e1metro \"p\u00e1gina web\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34217",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:38:35.587",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-08-08T19:35:20.870",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que TOTOLINK CP450 v4.1.0cu.747_B20191224 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n addWlProfileClientMode."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/addWlProfileClientMode",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34580",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-26T05:15:51.093",
"lastModified": "2024-08-02T03:15:44.277",
"lastModified": "2024-08-08T18:15:10.157",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "Apache XML Security for C++ through 2.0.4 implements the XML Signature Syntax and Processing (XMLDsig) specification without protection against an SSRF payload in a KeyInfo element. NOTE: the supplier disputes this CVE Record on the grounds that they are implementing the specification \"correctly\" and are not \"at fault.\""
"value": "Apache XML Security for C++ through 2.0.4 implements the XML Signature Syntax and Processing (XMLDsig) specification without protection against an SSRF payload in a KeyInfo element. NOTE: the project disputes this CVE Record on the grounds that any vulnerabilities are the result of a failure to configure XML Security for C++ securely. Even when avoiding this particular issue, any use of this library would need considerable additional code and a deep understanding of the standards and protocols involved to arrive at a secure implementation for any particular use case. We recommend against continued direct use of this library."
},
{
"lang": "es",
@ -67,10 +67,18 @@
"url": "https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2024-21893.md",
"source": "cve@mitre.org"
},
{
"url": "https://lists.apache.org/thread/po2gocnw4gtf4boy5mmjb54g62qhbrl9",
"source": "cve@mitre.org"
},
{
"url": "https://santuario.apache.org/download.html",
"source": "cve@mitre.org"
},
{
"url": "https://shibboleth.atlassian.net/wiki/spaces/DEV/pages/3726671873/Santuario",
"source": "cve@mitre.org"
},
{
"url": "https://www.sonatype.com/blog/the-exploited-ivanti-connect-ssrf-vulnerability-stems-from-xmltooling-oss-library",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35256",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:17.623",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:50:56.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35256",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35271",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:19.023",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:51:09.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35271",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35272",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:19.217",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:33:14.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35272",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3659",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-08-08T13:15:13.823",
"lastModified": "2024-08-08T15:35:18.413",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37318",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:19.520",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:36:54.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37318",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37319",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:19.757",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:39:41.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37319",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37320",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:19.973",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:40:08.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37320",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37321",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:20.180",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:40:27.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37321",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37322",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:20.390",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:41:20.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37322",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37323",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:20.603",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:41:44.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37323",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37324",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:20.797",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:42:10.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37324",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37326",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:20.997",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:42:31.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37326",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37327",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:21.190",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:42:50.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37327",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37328",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:21.387",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:43:07.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37328",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37329",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:21.660",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:43:34.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37329",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37330",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:21.910",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:43:52.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37330",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37331",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:22.113",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:44:18.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37331",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37332",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:22.313",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:44:37.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37332",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37333",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:22.523",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:44:55.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37333",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37334",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:22.730",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:51:42.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.7.0004.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AA66B1AD-D4E7-4DC7-9ED4-3608B94C70B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.3.0005.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98B8B7C5-05C0-4DA2-A7C1-CFC29647ECAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37334",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37336",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:22.927",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:45:37.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37336",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-37382",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:10.317",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in import host feature in Ab Initio Metadata Hub and Authorization Gateway before 4.3.1.1 allows attackers to run arbitrary code via crafted modification of server configuration."
}
],
"metrics": {},
"references": [
{
"url": "https://www.abinitio.com/en/security-advisories/ab-2024-003/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37888",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-14T18:15:27.790",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:01:19.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mlewand:open_link:*:*:*:*:*:ckeditor:*:*",
"versionEndExcluding": "1.0.5",
"matchCriteriaId": "16D07EE1-6CA4-425C-80D5-7F53DED13D35"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mlewand/ckeditor-plugin-openlink/security/advisories/GHSA-rhxf-gvmh-hrxm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38087",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:44.673",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:45:56.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38087",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38088",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:44.933",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T18:31:54.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCC7A2-8975-49C9-BD67-A325D9551AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E63B842-F49A-4F5F-A547-AF8DF7324541"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0CC093-7A7E-4994-BB1B-72C1B050C297"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEAE594-FE38-49B2-9C52-6CD88CF9A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7608D770-BD38-416D-9BDA-6A3BE804379F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB32724-0AA2-40E4-9C2E-9332295B544F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D278A8-2E03-4C9F-880E-236AC63B8947"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB9ECDA-39C4-45AA-870D-92DD18F1E7EF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38088",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2024-39287",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-08-08T18:15:10.380",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dorsett Controls Central Server update server has potential information \nleaks with an unprotected file that contains passwords and API keys."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-41161",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-08-08T18:15:10.640",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and WiFi bridge repeaters, software versions \n3.3.23.6.9 and prior, enables an unauthenticated remote attacker to \nbypass authentication using hard-coded administrator credentials. These \naccounts cannot be disabled."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41238",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T16:15:09.123",
"lastModified": "2024-08-08T17:35:05.697",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41239",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T19:15:48.093",
"lastModified": "2024-08-08T16:15:09.190",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T19:04:43.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:responsive_school_management_system:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02775C53-3AA5-4707-A166-D1FE5B1288EF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/Stored%20XSS.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41910",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-08-06T14:16:04.350",
"lastModified": "2024-08-06T16:30:24.547",
"lastModified": "2024-08-08T18:15:10.897",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XXS vulnerabilities in the version of JavaScript used."
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XSS vulnerabilities in the version of JavaScript used."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware hasta 10.10.2.2 en dispositivos Poly Clariti Manager. El firmware conten\u00eda m\u00faltiples vulnerabilidades XXS en la versi\u00f3n de JavaScript utilizada."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41942",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T15:15:17.527",
"lastModified": "2024-08-08T15:15:17.527",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42354",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T15:15:17.793",
"lastModified": "2024-08-08T15:15:17.793",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42355",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T15:15:18.013",
"lastModified": "2024-08-08T15:15:18.013",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42356",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T15:15:18.247",
"lastModified": "2024-08-08T15:15:18.247",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42357",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T15:15:18.460",
"lastModified": "2024-08-08T15:15:18.460",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42365",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T17:15:19.340",
"lastModified": "2024-08-08T17:15:19.340",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42366",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T17:15:19.590",
"lastModified": "2024-08-08T17:15:19.590",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2024-42408",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-08-08T18:15:10.953",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The InfoScan client download page can be intercepted with a proxy, to \nexpose filenames located on the system, which could lead to additional \ninformation exposure."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2024-42493",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-08-08T18:15:11.207",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dorsett Controls InfoScan is vulnerable due to a leak of possible \nsensitive information through the response headers and the rendered \nJavaScript prior to user login."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6706",
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"published": "2024-08-07T23:15:41.350",
"lastModified": "2024-08-08T14:35:14.497",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T19:05:03.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"type": "Secondary",
@ -51,10 +81,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openwebui:open_webui:0.1.105:*:*:*:*:*:*:*",
"matchCriteriaId": "33127669-DDB0-4B45-9D9D-D3B85CEC7180"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
],
"references": [
{
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-005.txt",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6884",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-08T06:15:41.603",
"lastModified": "2024-08-08T13:04:18.753",
"lastModified": "2024-08-08T19:35:22.760",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Gutenberg Blocks with AI by Kadence WP WordPress anterior a 3.2.39 no valida ni escapa algunas de sus opciones de bloqueo antes de devolverlas a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de Cross-Site Scripting Almacenado"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/1768de0c-e4ea-4c98-abf1-7ac805f214b8/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7115",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-26T02:15:10.720",
"lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T19:06:00.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mdmafujulhasan:online-payroll-management-system:2023-09-11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8AED4B-84E1-496D-A3F7-76FD16E24E6F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/cve6",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272446",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272446",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.376885",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7116",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-26T03:15:02.087",
"lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T19:08:18.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mdmafujulhasan:online-payroll-management-system:2023-09-11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8AED4B-84E1-496D-A3F7-76FD16E24E6F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/cve7",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272447",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272447",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.376887",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7117",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-26T04:15:02.637",
"lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T19:11:30.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mdmafujulhasan:online-payroll-management-system:2023-09-11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8AED4B-84E1-496D-A3F7-76FD16E24E6F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/cve8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272448",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272448",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.376889",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7118",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-26T04:15:02.977",
"lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T19:02:12.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mdmafujulhasan:online-payroll-management-system:2023-09-11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8AED4B-84E1-496D-A3F7-76FD16E24E6F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/cve9",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272449",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272449",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.376890",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7119",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-26T05:15:10.577",
"lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T19:01:17.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mdmafujulhasan:online-payroll-management-system:2023-09-11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8AED4B-84E1-496D-A3F7-76FD16E24E6F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/cve10",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272450",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272450",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.376891",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7348",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2024-08-08T13:15:14.007",
"lastModified": "2024-08-08T13:15:14.007",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7394",
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"published": "2024-08-08T17:15:20.023",
"lastModified": "2024-08-08T17:15:20.023",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7477",
"sourceIdentifier": "securityalerts@avaya.com",
"published": "2024-08-08T16:15:09.363",
"lastModified": "2024-08-08T16:15:09.363",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7480",
"sourceIdentifier": "securityalerts@avaya.com",
"published": "2024-08-08T16:15:09.567",
"lastModified": "2024-08-08T16:15:09.567",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:19.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7490",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-08-08T15:15:19.057",
"lastModified": "2024-08-08T17:15:20.163",
"vulnStatus": "Received",
"lastModified": "2024-08-08T18:55:28.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-7530",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.723",
"lastModified": "2024-08-06T16:30:24.547",
"lastModified": "2024-08-08T18:35:06.897",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect garbage collection interaction could have led to a use-after-free. This vulnerability affects Firefox < 129."
},
{
"lang": "es",
"value": "La interacci\u00f3n incorrecta con la recolecci\u00f3n de basura podr\u00eda haber dado lugar a un use-after-free. Esta vulnerabilidad afecta a Firefox &lt; 129."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904011",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-08T18:00:17.302181+00:00
2024-08-08T20:00:17.133533+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-08T18:00:03.977000+00:00
2024-08-08T19:35:22.760000+00:00
```
### Last Data Feed Release
@ -33,56 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
259371
259383
```
### CVEs added in the last Commit
Recently added CVEs: `12`
- [CVE-2024-0101](CVE-2024/CVE-2024-01xx/CVE-2024-0101.json) (`2024-08-08T17:15:17.560`)
- [CVE-2024-0102](CVE-2024/CVE-2024-01xx/CVE-2024-0102.json) (`2024-08-08T17:15:18.013`)
- [CVE-2024-0107](CVE-2024/CVE-2024-01xx/CVE-2024-0107.json) (`2024-08-08T17:15:18.240`)
- [CVE-2024-0108](CVE-2024/CVE-2024-01xx/CVE-2024-0108.json) (`2024-08-08T17:15:18.473`)
- [CVE-2024-41238](CVE-2024/CVE-2024-412xx/CVE-2024-41238.json) (`2024-08-08T16:15:09.123`)
- [CVE-2024-42365](CVE-2024/CVE-2024-423xx/CVE-2024-42365.json) (`2024-08-08T17:15:19.340`)
- [CVE-2024-42366](CVE-2024/CVE-2024-423xx/CVE-2024-42366.json) (`2024-08-08T17:15:19.590`)
- [CVE-2024-7121](CVE-2024/CVE-2024-71xx/CVE-2024-7121.json) (`2024-08-08T17:15:19.820`)
- [CVE-2024-7123](CVE-2024/CVE-2024-71xx/CVE-2024-7123.json) (`2024-08-08T17:15:19.970`)
- [CVE-2024-7394](CVE-2024/CVE-2024-73xx/CVE-2024-7394.json) (`2024-08-08T17:15:20.023`)
- [CVE-2024-7477](CVE-2024/CVE-2024-74xx/CVE-2024-7477.json) (`2024-08-08T16:15:09.363`)
- [CVE-2024-7480](CVE-2024/CVE-2024-74xx/CVE-2024-7480.json) (`2024-08-08T16:15:09.567`)
- [CVE-2023-24062](CVE-2023/CVE-2023-240xx/CVE-2023-24062.json) (`2024-08-08T18:15:09.317`)
- [CVE-2023-24063](CVE-2023/CVE-2023-240xx/CVE-2023-24063.json) (`2024-08-08T18:15:09.410`)
- [CVE-2023-24064](CVE-2023/CVE-2023-240xx/CVE-2023-24064.json) (`2024-08-08T18:15:09.467`)
- [CVE-2023-28865](CVE-2023/CVE-2023-288xx/CVE-2023-28865.json) (`2024-08-08T18:15:09.533`)
- [CVE-2023-33206](CVE-2023/CVE-2023-332xx/CVE-2023-33206.json) (`2024-08-08T18:15:09.597`)
- [CVE-2023-40261](CVE-2023/CVE-2023-402xx/CVE-2023-40261.json) (`2024-08-08T18:15:09.670`)
- [CVE-2024-0104](CVE-2024/CVE-2024-01xx/CVE-2024-0104.json) (`2024-08-08T18:15:09.800`)
- [CVE-2024-37382](CVE-2024/CVE-2024-373xx/CVE-2024-37382.json) (`2024-08-08T18:15:10.317`)
- [CVE-2024-39287](CVE-2024/CVE-2024-392xx/CVE-2024-39287.json) (`2024-08-08T18:15:10.380`)
- [CVE-2024-41161](CVE-2024/CVE-2024-411xx/CVE-2024-41161.json) (`2024-08-08T18:15:10.640`)
- [CVE-2024-42408](CVE-2024/CVE-2024-424xx/CVE-2024-42408.json) (`2024-08-08T18:15:10.953`)
- [CVE-2024-42493](CVE-2024/CVE-2024-424xx/CVE-2024-42493.json) (`2024-08-08T18:15:11.207`)
### CVEs modified in the last Commit
Recently modified CVEs: `33`
Recently modified CVEs: `65`
- [CVE-2024-3180](CVE-2024/CVE-2024-31xx/CVE-2024-3180.json) (`2024-08-08T17:15:19.223`)
- [CVE-2024-34230](CVE-2024/CVE-2024-342xx/CVE-2024-34230.json) (`2024-08-08T16:35:11.040`)
- [CVE-2024-37315](CVE-2024/CVE-2024-373xx/CVE-2024-37315.json) (`2024-08-08T16:35:23.750`)
- [CVE-2024-37884](CVE-2024/CVE-2024-378xx/CVE-2024-37884.json) (`2024-08-08T16:39:59.217`)
- [CVE-2024-37887](CVE-2024/CVE-2024-378xx/CVE-2024-37887.json) (`2024-08-08T16:33:31.063`)
- [CVE-2024-38301](CVE-2024/CVE-2024-383xx/CVE-2024-38301.json) (`2024-08-08T17:01:45.347`)
- [CVE-2024-40898](CVE-2024/CVE-2024-408xx/CVE-2024-40898.json) (`2024-08-08T16:02:40.887`)
- [CVE-2024-41037](CVE-2024/CVE-2024-410xx/CVE-2024-41037.json) (`2024-08-08T17:53:57.487`)
- [CVE-2024-41038](CVE-2024/CVE-2024-410xx/CVE-2024-41038.json) (`2024-08-08T17:54:28.177`)
- [CVE-2024-41087](CVE-2024/CVE-2024-410xx/CVE-2024-41087.json) (`2024-08-08T18:00:03.977`)
- [CVE-2024-41089](CVE-2024/CVE-2024-410xx/CVE-2024-41089.json) (`2024-08-08T17:50:48.727`)
- [CVE-2024-41092](CVE-2024/CVE-2024-410xx/CVE-2024-41092.json) (`2024-08-08T17:51:11.700`)
- [CVE-2024-41093](CVE-2024/CVE-2024-410xx/CVE-2024-41093.json) (`2024-08-08T17:40:31.917`)
- [CVE-2024-41095](CVE-2024/CVE-2024-410xx/CVE-2024-41095.json) (`2024-08-08T17:40:57.760`)
- [CVE-2024-41096](CVE-2024/CVE-2024-410xx/CVE-2024-41096.json) (`2024-08-08T17:26:54.243`)
- [CVE-2024-41098](CVE-2024/CVE-2024-410xx/CVE-2024-41098.json) (`2024-08-08T17:27:55.600`)
- [CVE-2024-41239](CVE-2024/CVE-2024-412xx/CVE-2024-41239.json) (`2024-08-08T16:15:09.190`)
- [CVE-2024-6065](CVE-2024/CVE-2024-60xx/CVE-2024-6065.json) (`2024-08-08T16:10:07.147`)
- [CVE-2024-6066](CVE-2024/CVE-2024-60xx/CVE-2024-6066.json) (`2024-08-08T16:05:04.247`)
- [CVE-2024-6067](CVE-2024/CVE-2024-60xx/CVE-2024-6067.json) (`2024-08-08T16:24:21.720`)
- [CVE-2024-6084](CVE-2024/CVE-2024-60xx/CVE-2024-6084.json) (`2024-08-08T16:20:42.537`)
- [CVE-2024-6110](CVE-2024/CVE-2024-61xx/CVE-2024-6110.json) (`2024-08-08T16:12:55.633`)
- [CVE-2024-6652](CVE-2024/CVE-2024-66xx/CVE-2024-6652.json) (`2024-08-08T16:43:37.053`)
- [CVE-2024-7490](CVE-2024/CVE-2024-74xx/CVE-2024-7490.json) (`2024-08-08T17:15:20.163`)
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-08T16:35:14.220`)
- [CVE-2024-38087](CVE-2024/CVE-2024-380xx/CVE-2024-38087.json) (`2024-08-08T18:45:56.203`)
- [CVE-2024-38088](CVE-2024/CVE-2024-380xx/CVE-2024-38088.json) (`2024-08-08T18:31:54.827`)
- [CVE-2024-41238](CVE-2024/CVE-2024-412xx/CVE-2024-41238.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-41239](CVE-2024/CVE-2024-412xx/CVE-2024-41239.json) (`2024-08-08T19:04:43.380`)
- [CVE-2024-41910](CVE-2024/CVE-2024-419xx/CVE-2024-41910.json) (`2024-08-08T18:15:10.897`)
- [CVE-2024-41942](CVE-2024/CVE-2024-419xx/CVE-2024-41942.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42354](CVE-2024/CVE-2024-423xx/CVE-2024-42354.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42355](CVE-2024/CVE-2024-423xx/CVE-2024-42355.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42356](CVE-2024/CVE-2024-423xx/CVE-2024-42356.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42357](CVE-2024/CVE-2024-423xx/CVE-2024-42357.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42365](CVE-2024/CVE-2024-423xx/CVE-2024-42365.json) (`2024-08-08T18:55:19.180`)
- [CVE-2024-42366](CVE-2024/CVE-2024-423xx/CVE-2024-42366.json) (`2024-08-08T18:55:19.180`)
- [CVE-2024-6706](CVE-2024/CVE-2024-67xx/CVE-2024-6706.json) (`2024-08-08T19:05:03.057`)
- [CVE-2024-6884](CVE-2024/CVE-2024-68xx/CVE-2024-6884.json) (`2024-08-08T19:35:22.760`)
- [CVE-2024-7115](CVE-2024/CVE-2024-71xx/CVE-2024-7115.json) (`2024-08-08T19:06:00.017`)
- [CVE-2024-7116](CVE-2024/CVE-2024-71xx/CVE-2024-7116.json) (`2024-08-08T19:08:18.813`)
- [CVE-2024-7117](CVE-2024/CVE-2024-71xx/CVE-2024-7117.json) (`2024-08-08T19:11:30.467`)
- [CVE-2024-7118](CVE-2024/CVE-2024-71xx/CVE-2024-7118.json) (`2024-08-08T19:02:12.083`)
- [CVE-2024-7119](CVE-2024/CVE-2024-71xx/CVE-2024-7119.json) (`2024-08-08T19:01:17.340`)
- [CVE-2024-7348](CVE-2024/CVE-2024-73xx/CVE-2024-7348.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-7394](CVE-2024/CVE-2024-73xx/CVE-2024-7394.json) (`2024-08-08T18:55:19.180`)
- [CVE-2024-7477](CVE-2024/CVE-2024-74xx/CVE-2024-7477.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-7480](CVE-2024/CVE-2024-74xx/CVE-2024-7480.json) (`2024-08-08T18:55:19.180`)
- [CVE-2024-7490](CVE-2024/CVE-2024-74xx/CVE-2024-7490.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-08T18:35:06.897`)
## Download and Usage

View File

@ -102522,7 +102522,7 @@ CVE-2017-20187,0,0,439daba23cb231bf9a3a05cf84608ee08920e004d7fa3d5d3a05b0063643f
CVE-2017-20188,0,0,329272b92a1630954b6e2d9259a2b0f82ef555ab5ce6524e8e685ef56f14514b,2024-05-17T01:17:26.920000
CVE-2017-20189,0,0,dce97d2fac31f8ad5a1ef7790c7ca57d8c8e31ae0f291f1158d33fc1a1e4dbdb,2024-01-30T23:01:53.763000
CVE-2017-2019,0,0,0503760b9e3a588a1928b34508ca8410ada27b38d1650c235dca432cc0f673d6,2023-11-07T02:43:30.710000
CVE-2017-20190,0,0,3cc0e3b102786de6c787afab3389382e2d2272de3da6aa41def1c4ee9906c349,2024-08-05T22:15:31.440000
CVE-2017-20190,0,1,ab9ad5d427f26f97e2dff21ada3d7b6e713ef510acb60c8447bdbfe0a1feac80,2024-08-08T19:35:01.580000
CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353360,2024-05-17T01:17:27.427000
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
@ -137362,7 +137362,7 @@ CVE-2019-20467,0,0,a262a0da4323f751e5d424d90d285d640c26baf67cd9492208f20dcec2dfc
CVE-2019-20468,0,0,81a3f4066c0e84ff04bb0b3f5d44c494876099fcd7f5f9297dd99b26595d1c66,2024-07-30T01:15:11.007000
CVE-2019-2047,0,0,39d6e243b2ff476db07be9e4ffba0368a9d218b4b325be13c9a06ebb9014f3f9,2021-07-21T11:39:23.747000
CVE-2019-20470,0,0,2ad6e14fc14d0d07898b470e5757da49945753375935430bd6841ab8e0d5cf44,2024-08-01T13:41:55.777000
CVE-2019-20471,0,0,f5234f96a91801542f9419959437ee135091c0eda34c90d9e9a8938d445b8a11,2024-07-30T01:15:11.233000
CVE-2019-20471,0,1,fde34218ba841754bf23da4de58005edc9af4877a76211d340d30c961207f95e,2024-08-08T18:35:00.500000
CVE-2019-20473,0,0,e481ac0c66e05ab3e1b4fe31fd83e18f1a11bac975a85144bc7bb11874c7bc9c,2024-08-01T13:41:56.617000
CVE-2019-20474,0,0,57e2b48ce5d539e18ac2d72bce93e92561ab9a40d2accc1b68949e376410c01b,2022-01-01T19:54:56.077000
CVE-2019-20477,0,0,980075eba63e1b6dba87305a73c4446e3d265aa1cc0ce387abc09a4c8d026438,2023-11-07T03:09:10.187000
@ -212126,7 +212126,7 @@ CVE-2022-48659,0,0,739b868a474a4ffd0d46243cb98b66c6dfd7ee413018b4f326afd972c1be9
CVE-2022-4866,0,0,199e44d50116095b956b964a4c6fd43b01b5552a04fb1a09a2a7d98fc1c49607,2023-01-06T21:24:01.587000
CVE-2022-48660,0,0,8d46c959e786b8b58955f0ff93ba1d3c08d6316eb1842ed4f09b2150e1c368bf,2024-04-30T15:06:08.540000
CVE-2022-48661,0,0,3c1a91a4878fc0dffd0274a57d5ef2e983527ee481ceb34709f9a63b3494b859,2024-04-30T15:05:37.530000
CVE-2022-48662,0,1,4ca2f1a058f4d2db61a4549f15a664d250019454531a3330e1e773232ecca95f,2024-08-08T16:35:01.007000
CVE-2022-48662,0,0,4ca2f1a058f4d2db61a4549f15a664d250019454531a3330e1e773232ecca95f,2024-08-08T16:35:01.007000
CVE-2022-48663,0,0,faa35d27b468e0fe98ba3119f078a76fddc46319da6c037dd74eacad5fe5db95,2024-04-29T12:42:03.667000
CVE-2022-48664,0,0,98f5b9aae9394a787d88883dde988c23ff88ed82e2585a6fbf2ab1feed010f18,2024-04-29T12:42:03.667000
CVE-2022-48665,0,0,61f8dd0c53e94318dbff1c099a7764d159a4ff134c1b49d99d2540fba60ac74e,2024-04-29T12:42:03.667000
@ -217762,6 +217762,9 @@ CVE-2023-24058,0,0,16a1b8d2c8f6e9521afc5ad7d9e751bc2a2f51cc265db69a156ca23c3660b
CVE-2023-24059,0,0,85c8b3c7e51d4493812abc1130db36e5e554ca89f20febe06dc7c3c22cd7b3bb,2023-02-07T14:19:00.787000
CVE-2023-2406,0,0,93360eeb7d23c99f5e3d8592b06b8d380a992d1764480465d68abc46a85ae39a,2023-11-07T04:12:36.890000
CVE-2023-24060,0,0,237020e686b9d1fc77a983ae9b232c7b16e133620015d99d897981c2e94f39f4,2023-02-07T19:13:09.287000
CVE-2023-24062,1,1,b16090863b472492372cda3ae7019b52dfc5904f2b44c6c14a1599575befa353,2024-08-08T18:55:19.180000
CVE-2023-24063,1,1,4986cda0d209054631e4bccd3328891392bae09870f133621a7fd030be12ff42,2024-08-08T18:55:19.180000
CVE-2023-24064,1,1,4b8ebaa7b5be0eaddc0d5fd65ac0188284654ea2367d024767f3154a9f52f1dd,2024-08-08T18:55:19.180000
CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000
CVE-2023-24068,0,0,b2dd8c07d421160046d625a68ed657194371f600a0afa0ab50e87ec10b29f09d,2024-08-02T11:16:10.173000
CVE-2023-24069,0,0,31c87c9ec1a1f4e0e7ca7308f0b22f9d6b11a20fcdca63dde72ea3afa1217817,2024-08-02T11:16:10.287000
@ -221668,6 +221671,7 @@ CVE-2023-2886,0,0,477489445a6f471cd3651b117fbf09416c16a3d7a4e7e46e8dd7486e10c87d
CVE-2023-28862,0,0,1af0d4a2a1f54e0c65748ae11dcf6c8d306e7ce5050f714cb8bd21304ffd2ff4,2023-07-14T13:15:09.167000
CVE-2023-28863,0,0,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000
CVE-2023-28864,0,0,324e76b8a1dbbfe673722acba31555a0a11e3e449df86950e1771c91d26b1827,2023-07-27T03:47:50.647000
CVE-2023-28865,1,1,a690f96d4d055e488f88d43d5f0e459124e94286062b0ad973c4e339764814fa,2024-08-08T18:55:19.180000
CVE-2023-28866,0,0,943391c7b240adde0202bacb48afef5edfa2b7d2d32f1761a9ddbf651b944ce4,2023-11-07T04:10:55.740000
CVE-2023-28867,0,0,318a66eaa8452f89942f53703d11d40849d2cc65087bebb0348dcf4f3572c7cb,2023-04-03T14:01:07.433000
CVE-2023-28868,0,0,e275a03d8640a97b2d96fd845bc40f2c87b07888c0c512aa8d3aec81f7c1a577,2023-12-12T22:35:26.717000
@ -224962,6 +224966,7 @@ CVE-2023-33201,0,0,2597fe221e1f761d6b3e6cbfd030eadf4704e1547f552dc061c463420a08a
CVE-2023-33202,0,0,e7e7f7c9ba650dcbf0171405662b00bcdfd5e41c4d322835f858a2d745b8a7ec,2024-01-25T14:15:25.783000
CVE-2023-33203,0,0,cf97be42175c0d354e6941d64dd260b17cae783a76d09f7b56e470976d97a999,2023-05-26T16:52:01.157000
CVE-2023-33204,0,0,6e4260f72baf73d6ea1ccb7950395df7ee85b3280176ec814ba5c18c1ed8d5f6,2023-11-07T04:14:46.243000
CVE-2023-33206,1,1,8012d772113aa4efeb69b677c5c4507cd8b12aafc03328abda41a85d63486c43,2024-08-08T18:55:19.180000
CVE-2023-33207,0,0,db833585ca058f88a52ecdd20945cb37b2537bb7bd89e56de798e340453ba00b,2023-11-16T23:42:11.750000
CVE-2023-33208,0,0,452d00abc7c8385efc2c332f0818f4d3115f3a0e717b56374cce97c1d1eaf069,2023-08-31T18:40:52.317000
CVE-2023-33209,0,0,d8369996175c8373d5bfa6cb0ed4b69f08c78793d48f6b2cda42411d5f915879,2023-12-26T21:36:15.107000
@ -230174,6 +230179,7 @@ CVE-2023-40254,0,0,27efb0368168d79caa00b4133031d8fb68b34ecfd132b042a5961f412575e
CVE-2023-40256,0,0,b582804fa33a295156ceb4267c834e483bb86e84c99d0ec7c8c39444912512fe,2023-08-18T18:40:02.253000
CVE-2023-4026,0,0,3212945c551dc5c1719d7d6137de0348751110a933425a5bf5f780d8b6cb15ce,2023-11-07T04:22:03.850000
CVE-2023-40260,0,0,05bb0576fb08380ea903522d60f06a904bc360b72ae4772cbb05cfc33464fa32,2023-09-20T21:15:11.697000
CVE-2023-40261,1,1,d8ec471e8c2b753f37616258061af933cdc1f0280e07e09bd8a2fae39bb2c84d,2024-08-08T18:55:19.180000
CVE-2023-40262,0,0,d58d63bce35087dda362e1111aeac9b1b75c4bd8ea1442d999e9a4301c6860b7,2024-02-15T04:33:52.467000
CVE-2023-40263,0,0,5624dd31a999eb07813388b5a3ed101dece0ae7506f50c2ff15d5500eaaece55,2024-02-15T04:33:23.013000
CVE-2023-40264,0,0,f7a83c86b7c4bdbb55bbbd88d882459ecf055d59ca4c58a5bc50d5b8349b6af0,2024-02-16T20:56:44.780000
@ -236321,7 +236327,7 @@ CVE-2023-48893,0,0,5043ec8dc2f1768fadeb39d099a00fdee7291c475c685e34a7d4cf80fe0e4
CVE-2023-48894,0,0,a8ac6b0e77117c087418b4211860ce42b56dfbcebdd512bfef2c5168662c0ee4,2023-12-06T18:48:22.700000
CVE-2023-4890,0,0,a20402f4d56a9a3e121227aa9e4a1781edc3cee12ae92ab661db6592110635ab,2023-11-07T04:23:08.510000
CVE-2023-48901,0,0,531f6d3614843d157a3c9dc6e101bfcf96a5f8efa37d961dda35dcbf99be2006,2024-08-06T17:35:02.180000
CVE-2023-48902,0,0,22cfaf5768143880446ff712b90de950d1c9dc63c4cf1148f99ce71d4219a4a4,2024-03-21T12:58:51.093000
CVE-2023-48902,0,1,e66dc38bb79946c160d1da0897afd2ba808308e6cfda5fb4cfee782308be2c46,2024-08-08T19:35:03.727000
CVE-2023-48903,0,0,c36eea55d7ebb58b6550658aa069864d729af997931b2f0f1cd8f0bd7c2c2e23,2024-08-05T14:35:02.280000
CVE-2023-48906,0,0,dcf61e4baeea39a70a46cf16ef25f7d94c12ff2d2949997b5a61f61056a26263,2024-04-02T12:50:42.233000
CVE-2023-48909,0,0,6e26fded8220754411f0b0c0969e60ad89d13528c1e447cb4c30f373b2f2fd1f,2024-01-22T16:33:28.663000
@ -237067,7 +237073,7 @@ CVE-2023-50000,0,0,9f688a9792ad2ce6d0658cbf9071b12e1b4df659935180a67724a25c5cd88
CVE-2023-50001,0,0,b4771677786ecba9bde15a0f76b34acceb49e626365dbda21f278b0628caa15d,2023-12-09T04:45:12.637000
CVE-2023-50002,0,0,4ec906b692f1a9dd432c48a906e1571a789a584d37b771b6956e1b52d20411aa,2023-12-09T04:45:15.093000
CVE-2023-50007,0,0,c2a98c3d87da72b92c324ba3cb08ad35629bf406e9b3c35addda6f10f3816108,2024-07-03T01:42:48.353000
CVE-2023-50008,0,1,7f115fb7cf065952761d4f3da06cb7d1d06fdd92c76ae962b98d8b7ee2cdcb0d,2024-08-08T16:35:02.053000
CVE-2023-50008,0,0,7f115fb7cf065952761d4f3da06cb7d1d06fdd92c76ae962b98d8b7ee2cdcb0d,2024-08-08T16:35:02.053000
CVE-2023-50009,0,0,170dd9930657e166b905729f0ac42a66a8992249c05ebf1d569c0f4eb6cd99b1,2024-07-03T01:42:49.137000
CVE-2023-5001,0,0,d9ac16974d049c360e3bd40fa3597b22777e9e496c7757647056f596e2b1a7bd,2023-11-07T04:23:17.670000
CVE-2023-50010,0,0,2cb91c5b0cd0b34eab6d9a9d9e423db72c16e763bec8471e43a8ef97d96dc827,2024-07-03T01:42:49.940000
@ -237413,7 +237419,7 @@ CVE-2023-50693,0,0,dd08939e4ce32c03f59f04532580821ca5b697adc34a251e1c45db564373a
CVE-2023-50694,0,0,78b1aa0914931a0876815df8adb1c998b4fa38e7b62d7363c774f0a97cabce80,2024-03-21T02:49:58.640000
CVE-2023-5070,0,0,9fb6a723c8279931601cd42b57dae05abcb788776665c70d867d5b3fe8e04ffe,2023-11-07T04:23:25.600000
CVE-2023-50700,0,0,a170e7fca21b0a66cf96d92c9a79d76d10f0f906521b1974e4809465f286d528,2024-08-01T13:45:26.497000
CVE-2023-50702,0,1,5a9a6e1f931a55dff8e60df6ebb6d3783b09408223c86b861d914b06ab161284,2024-08-08T16:35:03.110000
CVE-2023-50702,0,0,5a9a6e1f931a55dff8e60df6ebb6d3783b09408223c86b861d914b06ab161284,2024-08-08T16:35:03.110000
CVE-2023-50703,0,0,5412fe627eb96f0f79abae297ed08738bff2931ef5956788ab3e3239f68219e5,2023-12-29T16:32:32.477000
CVE-2023-50704,0,0,d49cda3dff4ba1c0ede49172a75175738fe4d5075a250a9b7bfefb732a3e26ef,2023-12-29T16:31:20.133000
CVE-2023-50705,0,0,ad0a3e4412ad9c92740ec4e4e393908819d60949342bffcc602e49dd7390ae76,2023-12-29T16:28:38.393000
@ -239224,7 +239230,7 @@ CVE-2023-5393,0,0,ce078de54b177ac4406f630c3c1fed3ce153dfa6eaf31f252a0377c134b8cd
CVE-2023-5394,0,0,a96d7207f4eb5f9d49798c5e726b517481bba2916f942eb56932f569e6dc4d9e,2024-04-12T12:43:57.400000
CVE-2023-5395,0,0,42220d960331ea232791f8929a2890ca4fa05b271badde81e14439f1a1e3f0dd,2024-04-17T20:08:21.887000
CVE-2023-5396,0,0,007a12e631c053a3e331d0a53b8f249595ed84b8b7b57b06d9e2c90e9e577e11,2024-04-17T20:08:21.887000
CVE-2023-5397,0,1,09540507e05c48e772c47aa2a9d172c4b1ebc1df188d43479285639da81701fa,2024-08-08T16:35:04.180000
CVE-2023-5397,0,0,09540507e05c48e772c47aa2a9d172c4b1ebc1df188d43479285639da81701fa,2024-08-08T16:35:04.180000
CVE-2023-5398,0,0,03dafa4dab8d65556fef227ab72b602748ace9cd1ad664cc261be580c6de3ef7,2024-04-17T20:08:21.887000
CVE-2023-5399,0,0,2077fc3839d7041d58d4243bb44c146fe2a56129890351df55240d8647ef2ac3,2023-10-29T02:33:20.933000
CVE-2023-5400,0,0,248a9a65e9b9caa77a1b34eeb3f0b78767eeb5cf9522e2439f2b3bce2064987c,2024-04-17T20:08:21.887000
@ -240965,11 +240971,12 @@ CVE-2024-0097,0,0,828e0d6edaac74d80e85e7cd248c4487f7d9ed2e02d8d361934a62f860a855
CVE-2024-0098,0,0,069a5c23019341513ba5e45eb7cd80085fa3c5305327bc38e3233b2410f520d3,2024-05-14T16:13:02.773000
CVE-2024-0099,0,0,a353a072382bc9c8f100deeb43f065f1ec38735a442f0652f39ff4a5b9a341a3,2024-06-17T12:43:31.090000
CVE-2024-0100,0,0,f536814b5676db735894c02187696008c7cf1b3d39286954ee01bd7aaee5fdca,2024-05-14T16:13:02.773000
CVE-2024-0101,1,1,1e85eaa0e6f02d7c957fcc14c2e942ff4ea3831be8864e4f7fe5413e400b8f89,2024-08-08T17:15:17.560000
CVE-2024-0102,1,1,79147c4b917305337ce222e03fcf97f5dcd85cd50dd383102a8f7a874fa89713,2024-08-08T17:15:18.013000
CVE-2024-0101,0,1,e05385cc33ee9826ecfb9b850d6c047d48e9cbc40731cddfee9987a45953dd02,2024-08-08T18:55:19.180000
CVE-2024-0102,0,1,9281c0dd21fa4a6ba10451d2ce8db4dc465e5b0d2d5ede46729e28d1c30e2d60,2024-08-08T18:55:19.180000
CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000
CVE-2024-0107,1,1,b7328357e000247162d1b1ff91c0ee7902dd7ca392f89b8b3405fd20663b27cd,2024-08-08T17:15:18.240000
CVE-2024-0108,1,1,0f9c01a35f626b0080419755561c41419878a521a591f52ce6ac90990b96b475,2024-08-08T17:15:18.473000
CVE-2024-0104,1,1,d8bcd6e809d941165bede9e7513dc9cd703b11fdc2885a0daf273de4ae59c1c4,2024-08-08T18:55:19.180000
CVE-2024-0107,0,1,04e059eed29d1073bf6cbd89ce6e56260688f648aed9825b306f4fe58b9fe238,2024-08-08T18:55:19.180000
CVE-2024-0108,0,1,cca1e739954a9a1fd809df6166e99578c9bee5616f50180f0b07bead1a8c898a,2024-08-08T18:55:19.180000
CVE-2024-0151,0,0,76f8e609c18c3e1a4007c23b03249fd06e27f5de1d5adec60540b40f497459b7,2024-04-25T08:15:07.420000
CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000
CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000
@ -242984,7 +242991,7 @@ CVE-2024-20698,0,0,a60010c037f6b47d92f2aa100f7d8a53d79be2eb5769a2c8e9d02ceb6254a
CVE-2024-20699,0,0,bbde4aa236aa5bd1aaf9161e47fb1a1aee0558a0b300c08e5e21499a50eacae3,2024-06-11T15:15:58.073000
CVE-2024-2070,0,0,5d32ea05e6f2f66047d01700931546aa730f575dbd8fb6cf9e3d97d558acf9d7,2024-05-17T02:38:01.770000
CVE-2024-20700,0,0,48c4885aac74f6e4a736d19a626247228a5eb1d7955c526892b2cec51e0346df,2024-05-29T00:15:16.493000
CVE-2024-20701,0,0,2c9d5647bb5202cbb503b9082d427cc8f8e3d64bd4df56062aed7b35092f8c18,2024-07-09T18:18:38.713000
CVE-2024-20701,0,1,80320ca61fab502542e730745151e818c2a19100ed46caffbb8a3cda6ff93522,2024-08-08T18:50:27.110000
CVE-2024-20709,0,0,cfe59cb3498fcb40cb3ff855c0f48bc1a0141b54054cb56a4ea6efd6294dc34c,2024-01-23T19:28:38.997000
CVE-2024-2071,0,0,694e18ae25b2b51379d53ff5f9db1f2ed56a6e502a066bf83b179959b5ef82d4,2024-05-17T02:38:01.863000
CVE-2024-20710,0,0,a31e0c272fde0903cb50f7f7397256d7cb7e241ae25eb1c9f7898bc928ac22b9,2024-01-12T19:14:08.107000
@ -243655,7 +243662,7 @@ CVE-2024-21445,0,0,1e9644529a4c09a7e7b867fd24131ae695337874b20e05fc2c8f29a74f020
CVE-2024-21446,0,0,d91af89ff77312fee55a3cb5f9839f37302d10ad728d89077b6cfd938f9718c3,2024-04-11T20:15:32.857000
CVE-2024-21447,0,0,bcb33d59d4cc54b7944f70b43838b78d2de28c13052766332282f9f8eec5b1e5,2024-04-10T13:24:00.070000
CVE-2024-21448,0,0,40142b83431d484ca38acbb788d7523f2721d5755a5a237be8e19334b7e92f0f,2024-05-29T00:15:36.470000
CVE-2024-21449,0,0,066bbcf5543ef471d60fdab166e6874b8fe2c8a7bc3d305b883ab6edc80ddf1e,2024-07-09T18:18:38.713000
CVE-2024-21449,0,1,fff61c3bafc8b68912dea981e752397a37789f3c781b7739d1962849387eb766,2024-08-08T18:50:39.357000
CVE-2024-2145,0,0,827ab96169cf8c47e9ce401a991ae891b3ddee0c4e3c5089f0bba0550e86a7e8,2024-05-17T02:38:04.100000
CVE-2024-21450,0,0,25401a86ed4cf6aee58f7dc7ff8bede6f2584b071ad1edcb27bf966a0a91c76a,2024-04-11T20:15:33.050000
CVE-2024-21451,0,0,fda859879476242f447364ed932f4e097d32ef677cea24910429c5be2e67982f,2024-04-11T20:15:33.143000
@ -244482,7 +244489,7 @@ CVE-2024-22627,0,0,7de1240a28417cbc53b0ae0bc15d5725aafb2c30be8715fae81f72db699db
CVE-2024-22628,0,0,c48e2ec55f18b02d5d682e8e3830e76341123221faa60f4082cbda6cff78fe53,2024-01-19T14:33:00.143000
CVE-2024-2263,0,0,99c9bacabc6e08e73f0d8c338bf9824b2423a516921892dd6360ed31ad0e3588,2024-04-01T12:49:00.877000
CVE-2024-22632,0,0,a97332f0b173cc610cbf62f4df4cd14dbcbefc795dfe6e338a0059d8c9ab3926,2024-04-26T12:58:17.720000
CVE-2024-22633,0,1,62bbea01bbc9e791cb93aa09eb03c6d5e054ab6b131ba05c74d3ac37dac5c57e,2024-08-08T16:35:05.543000
CVE-2024-22633,0,0,62bbea01bbc9e791cb93aa09eb03c6d5e054ab6b131ba05c74d3ac37dac5c57e,2024-08-08T16:35:05.543000
CVE-2024-22635,0,0,b93c7bc1d12536d652dcc85ddd79edfb5c7213a29d94f8bd78c761d3d7145598,2024-01-29T15:57:23.770000
CVE-2024-22636,0,0,89d4b44d2ef5b65ebff1ecc48c0ac08f7378ed51f775b08505485e1b9be39e7e,2024-01-29T15:57:32.540000
CVE-2024-22637,0,0,a291343c074c38d5ffa0ead2af145c1d6fcfb9e6210b62bf7edb9b14c027e94a,2024-02-15T15:19:44.187000
@ -245510,7 +245517,7 @@ CVE-2024-24301,0,0,09fef4ec6b3f7e08d0238c798debb077539e76e61034c99c0f3a3241209eb
CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000
CVE-2024-24303,0,0,1b8ff87407101e3ade8b623ffad8ec7905f9dec8c0366ab6b55ba0460b0fea60,2024-02-14T19:38:18.727000
CVE-2024-24304,0,0,da2049d6e037296a577319f7d1190adf56def2498ce12560f8feb099b85c1170,2024-02-14T19:54:48.247000
CVE-2024-24307,0,0,39a344019676e6416da2523a0df5c9f8c3ef5d6158c597c3ca0abd8588967a1c,2024-03-04T13:58:23.447000
CVE-2024-24307,0,1,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a16b,2024-08-08T19:35:10.177000
CVE-2024-24308,0,0,1c7b217f4d07f1cef0d4c8802d8e004cd219229214920fa463f6f25f09db8557,2024-02-15T19:34:49.943000
CVE-2024-24309,0,0,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000
CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000
@ -247268,7 +247275,7 @@ CVE-2024-26849,0,0,25376421f8e268085706cb9a45ce988a2ed5db66e27372f0da148d22949e9
CVE-2024-2685,0,0,f0d9422c947d37e56aa28ba2337c0cc54722ca03a7f38746070a195f54e41bf1,2024-05-17T02:38:25.380000
CVE-2024-26850,0,0,00873ff9f8e756bee297702b0ccb8c4cb86947a18a9f440307dec32d2671e27c,2024-04-17T12:48:07.510000
CVE-2024-26851,0,0,db15a16c2aaa5df1966c0d1fc1201f533eed60aedce750b1fd551ab9bdc5ed3e,2024-06-27T13:15:56.800000
CVE-2024-26852,0,0,4fb6e6b990757acbffa7ce5e4b94150acf573ef0544b4dffd27468d158c19ba8,2024-06-27T12:15:21.490000
CVE-2024-26852,0,1,f16b4b6a26c173280cdf4127a7f9df17c3c84e7730b4a7576c1fcabfce595e92,2024-08-08T19:35:11.773000
CVE-2024-26853,0,0,827c2cb8caefeecde1c32072d63c4255951fe7e076c638214179f90ffb2959fb,2024-04-17T12:48:07.510000
CVE-2024-26854,0,0,71382c729dcbfb61122fea21c2172ded949fa87a0f12accbe08dbcfd7b75a577,2024-07-03T01:49:55.907000
CVE-2024-26855,0,0,e888087f68858cd8e18a3fb9ad8ef9b69bd71878372dd5f633aa7569383e87f8,2024-06-25T22:15:24.110000
@ -247293,7 +247300,7 @@ CVE-2024-26871,0,0,163b20ef3bcb237a106dee1f35f93c51d1f8bd86dcab5270708465faef3c0
CVE-2024-26872,0,0,e1be30e0f1b63fecb16069be5a8c042987bcba62c1848ca23e7ab104e4ef6a99,2024-06-25T22:15:24.450000
CVE-2024-26873,0,0,3a3877364dd5fcf82056d7626734c3d2cb4100f26dd0fb338b1cc2ce0a4b26cc,2024-04-17T12:48:07.510000
CVE-2024-26874,0,0,d4a2e66139b6c5571ffb5ddc01a62942368f4cbaf11ad33866910988dca15e98,2024-06-27T13:15:56.957000
CVE-2024-26875,0,0,cde0a73f1c8a22ea8ff5e672cf503106a24174a39a31a8816d624fdce36c6f98,2024-06-27T12:15:21.710000
CVE-2024-26875,0,1,776f032242ac1e7add152fd2be17e01c5c12995fa4d824d950364492e82d131a,2024-08-08T19:35:13.037000
CVE-2024-26876,0,0,87a49be69760f9088fe2bba4db9cde6d323af69b323688fc0bb6fc1e935e16b5,2024-04-17T12:48:07.510000
CVE-2024-26877,0,0,7b5237ee65908468f328c7475b98e7a4207eb826410a8157a34c13278e5cb653,2024-06-25T23:15:26.897000
CVE-2024-26878,0,0,138eb74473aa6d1d3b5705c5c5f6c3f05d9798e9a389f668cd4f717014b9b6e0,2024-06-27T12:15:21.783000
@ -247328,7 +247335,7 @@ CVE-2024-26903,0,0,02f8db8e283ea09bbfc4f021b4a46017f09af264e6504d48377e1408e0255
CVE-2024-26904,0,0,465375d12896d369ba32f0f5a9c1b1a82fd461e229bd66d68713d6d3b21eb08e,2024-05-21T07:15:08.260000
CVE-2024-26905,0,0,3a7eec9b90564e2a68e23468690a383dcd20d922935be237a30b806b26ccb711,2024-07-29T13:15:10.593000
CVE-2024-26906,0,0,42532862975f8bdf6c218bb08e8c76f0bdeb5f292a8c20c2de1b8755512c9a2b,2024-06-25T22:15:25.877000
CVE-2024-26907,0,0,00d718a412070a4297719ea0fb3f7b55969fac373e166e4b352e4dbc743daf28,2024-06-25T22:15:25.960000
CVE-2024-26907,0,1,446b7fe6bd3521bdad8e0df3b9aa51c6dd91773148f15c64fb12a798e319ec1b,2024-08-08T18:35:02.500000
CVE-2024-26908,0,0,5ecc683879bcc08f4a65e6b0675afebd2da7cfed4f9fada740f88a540c7f8b1e,2024-04-30T08:15:17.140000
CVE-2024-26909,0,0,e3d7941f07403bc0745f4894278d17e22a07c87692715dac5395fbc71a84fef3,2024-04-29T19:45:21.680000
CVE-2024-2691,0,0,1606e90bf9d34cf5f4f3495983392fa55577ead311870fa1dbee6afe3a0927f6,2024-08-07T22:20:28.833000
@ -247352,7 +247359,7 @@ CVE-2024-26925,0,0,2724913f362a9890cc8fb3dd8cbeebdee08487b2bf7ffa79a3e9b6cbc6100
CVE-2024-26926,0,0,afaf5b7b6b1e2e8422b7d9a5d5e09d6dca5c5bcaea40d04fd581fd0c9bb650ce,2024-06-25T23:15:27.893000
CVE-2024-26927,0,0,4116dbe7df52a1c2d9850cca2fd6397392bdbeda2c2b84e268cf9d86129f791b,2024-07-03T01:50:01.863000
CVE-2024-26928,0,0,8849c5ddf3f8359b34f84019effa9d5d4066ffd02515d38a7a9e159b15bfe7a3,2024-04-29T12:42:03.667000
CVE-2024-26929,0,1,0345601d3687dcfc0db8f00b9b8b65897332ed99291c5fbcbfec34873b944ced,2024-08-08T16:35:06.543000
CVE-2024-26929,0,0,0345601d3687dcfc0db8f00b9b8b65897332ed99291c5fbcbfec34873b944ced,2024-08-08T16:35:06.543000
CVE-2024-2693,0,0,5b20da29193cdbd021de554496a550f19c059f255dc84cf7e6153dfe6b8cf895,2024-04-10T13:23:38.787000
CVE-2024-26930,0,0,eebfc5b7d2d8fe5cbe99cdd9da00ebebd63fd431cc6c01a6fd1333054068c5b1,2024-05-23T19:10:49.540000
CVE-2024-26931,0,0,fd1d56ef07a54cc94e651da59890263257da3a79c612811464e959c80e42800d,2024-06-27T13:15:57.053000
@ -247989,7 +247996,7 @@ CVE-2024-27757,0,0,cd3b5b6b7fe57179d531119e33f0f74486d4fc8f97f5ac96ca27aa14ec09c
CVE-2024-27758,0,0,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7b50,2024-08-01T13:48:45.070000
CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000
CVE-2024-27764,0,0,dcb5f4d1c0bf36ea54d48a35b1fb25d36699fcee8f1dae6b9d2e2eb62b497b1c,2024-03-06T15:18:08.093000
CVE-2024-27765,0,1,946f1ae3b42eeddef53163b64360f4980758030270d5c196b145f2c4061e3615,2024-08-08T16:35:07.573000
CVE-2024-27765,0,0,946f1ae3b42eeddef53163b64360f4980758030270d5c196b145f2c4061e3615,2024-08-08T16:35:07.573000
CVE-2024-27767,0,0,588021191ffc186f7dafcc065bb8b722083fff47f2715dec13cceb116744ce43,2024-03-18T19:40:00.173000
CVE-2024-27768,0,0,2a172611cfb3cb531839add9d871259e9ae7004ba84244aa574347493f81c01e,2024-03-18T19:40:00.173000
CVE-2024-27769,0,0,40c08942e7bc0a364e2e9393c4316622b03ce4f4c87f0140fc357e25906e47fa,2024-03-18T19:40:00.173000
@ -250171,7 +250178,7 @@ CVE-2024-3092,0,0,58e4c2f42c32b89d77c71a34b852d576a28801e4a89752dc17e73517fbf960
CVE-2024-30920,0,0,755e5fd72bb1859fa0ef82051ceaafd42ee2d81708d249e6f1a815457a0034d0,2024-07-03T01:54:16.273000
CVE-2024-30921,0,0,8e85a33db60f73a94dcc7d8613386cc444fa7f9176c5206bdd02bb45585e34b2,2024-07-03T01:54:17.057000
CVE-2024-30922,0,0,cf163111ed5d85555cabc446f2f9d97fac6c7f0ed747ee1f78406fef4e9bf3e0,2024-07-03T01:54:17.827000
CVE-2024-30923,0,1,7a2527b99b92b80199b99b73f6b95e071f710c19fc4c06ba189dbf6ed66c0865,2024-08-08T16:35:08.933000
CVE-2024-30923,0,0,7a2527b99b92b80199b99b73f6b95e071f710c19fc4c06ba189dbf6ed66c0865,2024-08-08T16:35:08.933000
CVE-2024-30924,0,0,22bd972b2c3f6dbbb8e41f56a66263757ec7eb8e597484f0e2796a2cac4237a4,2024-07-03T01:54:18.593000
CVE-2024-30925,0,0,23f6cfde37cb305753d473ae13036a29f5bb7fcda37b8c8f7b5e05d6955a525c,2024-07-03T01:54:19.410000
CVE-2024-30926,0,0,2e48339c860de6d8b8371963c63d2e47743152d622b217fd2eb9f09dedcce9c7,2024-07-03T01:54:20.187000
@ -250671,7 +250678,7 @@ CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5
CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000
CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000
CVE-2024-3164,0,0,38bea5ea29fb4ffa7766bbe0beb8807abf0c8d405294ac50c0e82ba1bd904579,2024-07-26T14:15:02.560000
CVE-2024-31648,0,0,2922cc98178cad367ce9967a9bb0554e38b9bf3f7eeaabe3324ef2b9c342145f,2024-04-16T13:24:07.103000
CVE-2024-31648,0,1,14919d1b61efab10d4203511450f239ac7204789ae95d83bb57af18f0000d172,2024-08-08T19:35:18.173000
CVE-2024-31649,0,0,8b247291638ecff50896f2aca79dadb1b9c9aa19002fdb0afc961b73616ecbcc,2024-08-01T13:51:03.573000
CVE-2024-3165,0,0,80972bb4e4cfe5922196180e44e15963a79521816e646014cac03ba5f7adab4e,2024-07-26T14:15:02.690000
CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000
@ -250713,7 +250720,7 @@ CVE-2024-3178,0,0,724b5b9b62dd4e92f1f229f9f28fcb0bddf71f92c79c0b94c18fdb2af7074b
CVE-2024-31783,0,0,dea8534fc1b6933b26cda6217a1982520e5d50556b9ff7b4e3fbbb8c80f4a35b,2024-04-16T13:24:07.103000
CVE-2024-31784,0,0,872beb17d1c68d7ed92a4188cf9514602c2aada50c10052ecdc3a0e44dff88ee,2024-08-01T13:51:07.627000
CVE-2024-3179,0,0,464d285bc972fdb5e95f8aa4a77b96bdfaeed1940a229e7762cb456353d6a4b4,2024-04-04T12:48:41.700000
CVE-2024-3180,0,1,5bb7af5f4cf3797fd0e13fd61c5a120e857e3a7924c7f2a1b54e6cd1ca4c495c,2024-08-08T17:15:19.223000
CVE-2024-3180,0,0,5bb7af5f4cf3797fd0e13fd61c5a120e857e3a7924c7f2a1b54e6cd1ca4c495c,2024-08-08T17:15:19.223000
CVE-2024-31801,0,0,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b836488bc,2024-07-03T01:55:21.550000
CVE-2024-31802,0,0,dd0b491f4b4a8abc2eb95691f4e0d78bda6718f8c1d907d0d856648428006edd,2024-06-28T10:27:00.920000
CVE-2024-31803,0,0,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f243,2024-08-01T13:51:08.687000
@ -251310,7 +251317,7 @@ CVE-2024-32620,0,0,85e9859841ce948d1529bf9265c5b199e10e1e938238ea78ce808ec9455f9
CVE-2024-32621,0,0,806b79c7ca5f50b9fa1d18f42f83a60186d0b7d94afcd8c845a9bca37bec5584,2024-05-14T16:12:23.490000
CVE-2024-32622,0,0,cf9770a1b9df9f6f1a800e40872a5efcbb4c06250c59cadaf82c9c48d2e3b950,2024-05-14T16:12:23.490000
CVE-2024-32623,0,0,a94c23c0c8f9c3e6770fcdb3523a72ba3a6a1e1fcaadb35697fb50c3e33015a8,2024-07-03T01:56:51.853000
CVE-2024-32624,0,0,44726d987c473036f3fe2c17923f554c50c3d1dadd582e90c066d08039376cd5,2024-05-14T16:12:23.490000
CVE-2024-32624,0,1,86e096c2049d0b80094b488954ab97fce68d8a6249b2af872f018934e88b002d,2024-08-08T18:35:04.250000
CVE-2024-32625,0,0,3133aab50841c8a349d70e4488dcb72f990b76173b72979ba8d18b0c9cc689ee,2024-04-16T13:24:07.103000
CVE-2024-3263,0,0,1b4809d44673553ac5c413954bed873a76fa136867c6a54bcec9930ce55e0758,2024-05-14T16:11:39.510000
CVE-2024-32631,0,0,976960b3233145908ee4314174d96ae9dd1a5e40ad826957114103ac5674a3f1,2024-04-16T13:24:07.103000
@ -252052,7 +252059,7 @@ CVE-2024-33766,0,0,e85f175409d802a24c53d0d157ca20d583441fadf5b5134f3403f5dd4531c
CVE-2024-33767,0,0,ff2f0e72bb758b0e28266cb8827bda2c95a9e95708f40257e627c79bc2afc50b,2024-05-01T13:02:20.750000
CVE-2024-33768,0,0,b1c48e63fb04c842ea9858e17e5e39e3ff9e03db9d53c98333b940714f472142,2024-07-03T01:58:42.057000
CVE-2024-3377,0,0,1510516d64045a935995422c6fdaee7a2e23965b26ec5e4515131d4dcc176720,2024-05-17T02:39:53.543000
CVE-2024-33771,0,0,ef96a626547a9d3ea66d6c640298e77f7447875c179b294d73bf9dfc2be8bc4b,2024-05-14T16:12:23.490000
CVE-2024-33771,0,1,de5d2b98d044b2716ef74c05bc54a011b73685f9a10e074c8f5b2d8fa561dceb,2024-08-08T19:35:19.960000
CVE-2024-33772,0,0,f0b993d69416991d779357f1c269614dbca746050b50a37f5428d607eb22cb25,2024-07-03T01:58:42.817000
CVE-2024-33773,0,0,c7722b551c6505584361864d25c2fc2534d918de5122176041a5bccbc9806e89,2024-05-14T16:12:23.490000
CVE-2024-33774,0,0,22679a5bc336af838f53ff0ea5722076310c1b6e9ebc2465523e59c3ae5cee65,2024-05-14T16:12:23.490000
@ -252379,7 +252386,7 @@ CVE-2024-34211,0,0,a5192c74d8099f66009f8c235170ce7402607dfeb9a20ecc84a2abd2966f6
CVE-2024-34212,0,0,349c5ceaae711c6c258753506e7441916ed8a606582e8e23b3a895f6369c1db5,2024-07-03T01:59:37.463000
CVE-2024-34213,0,0,53d3ba806aa46d773a8e337fee7142388687e212bee6517408c0857d401b6448,2024-07-03T01:59:38.230000
CVE-2024-34215,0,0,88585b38adcdb11fabddf85123f183f044f14feba5e8e740334272a1fa850701,2024-07-03T01:59:38.987000
CVE-2024-34217,0,0,bdaf9082ac0c0fae893c10ca9ea01e36b63178186067e770d97c4d60d48ec47c,2024-05-14T16:12:23.490000
CVE-2024-34217,0,1,cfbe2d9832ba74b5e1d2777893445ff1d8f4c83519f8611daa643bf8cd2ff987,2024-08-08T19:35:20.870000
CVE-2024-34218,0,0,aac6cf7cfc70c4cde8ce5f0ee80848f4ce2c2520c2faf83b08bd31ed75ca5c0d,2024-07-03T01:59:39.750000
CVE-2024-34219,0,0,ea2eed625c87236c7b8d1af86ba0c138ca23a455600b33f7e7239f3921492efd,2024-05-14T16:12:23.490000
CVE-2024-3422,0,0,5f60b24505b1e7fc45669de7abca6b1144a134b9cac6c7f843eaaa0cb8d68c2e,2024-05-17T02:39:54.907000
@ -252391,7 +252398,7 @@ CVE-2024-34224,0,0,f4b792085c33fe751ba37a69e3ef609b6c4267fa901657944ebf702e373cd
CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000
CVE-2024-34226,0,0,ee0bf03dfbb7276f0e585da87dd55a8f54aaadf529a97ab40343d543468cb68c,2024-05-14T16:12:23.490000
CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000
CVE-2024-34230,0,1,a05a38a79741a72c9d6f5456446d713ef2ea9e7cfac29bb555039d0657084814,2024-08-08T16:35:11.040000
CVE-2024-34230,0,0,a05a38a79741a72c9d6f5456446d713ef2ea9e7cfac29bb555039d0657084814,2024-08-08T16:35:11.040000
CVE-2024-34231,0,0,bc89f3c9bb61baf29d2d35dc13499882fd5aa1b8a06439e514ae7d635339b6f7,2024-08-01T13:52:18.070000
CVE-2024-3424,0,0,c4f58681c753d20af997e7344afbac06ec6a3371ca686fb7c9b49ad5c93b94a2,2024-05-17T02:39:55.073000
CVE-2024-34240,0,0,0bd91146d8fc729ed5df9e4184632c68ef13b96fc0c02f7c671568de44e3b0a0,2024-05-22T12:46:53.887000
@ -252632,7 +252639,7 @@ CVE-2024-34573,0,0,82ca0b9b260238fc8193bf82f5bea85dcdeb8c8fd722769c69f6849636d7f
CVE-2024-34574,0,0,3e74c1beadff3fd890d2b5da4de2565dbad760d56326afd390946b5e96fda210,2024-05-08T13:15:00.690000
CVE-2024-34575,0,0,393b99ab99d08853751fd9680d36e14a49cd8e34f0aeacbb783a82d97ec9bda1,2024-05-17T18:36:05.263000
CVE-2024-3458,0,0,87e528d305caa39d9a35bfd4c8efb11949cfac496f77400f61f34f91d68ca048,2024-05-17T02:39:57.243000
CVE-2024-34580,0,0,9c8529440690c713568628918eb0dcb19874eff8855dda9a14457347e59dad12,2024-08-02T03:15:44.277000
CVE-2024-34580,0,1,b13d0d10186fa8ce8e24199cc1dc2d80b13694b6d8eff194e8908c96c81a6c72,2024-08-08T18:15:10.157000
CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000
CVE-2024-34582,0,0,3575cd86cb0cd0d60c587b3ff4f175ef56fea26df4e10b66896d0161802b3d28,2024-07-03T02:00:41.190000
CVE-2024-34583,0,0,99a59b61cd99e09dc04b437be3f2aa32c4c55f1e65c2d9d3fcc5d15f08b7b745,2024-07-05T17:12:21.677000
@ -253022,7 +253029,7 @@ CVE-2024-35252,0,0,abc4118fdb4313c77e0013cc66829f0782a05e427a95a903d7de17d02f4f0
CVE-2024-35253,0,0,4860462cf567d507b35b85f1b338fbe5c52fffbd9f14118ce4fe8c63db46011a,2024-06-20T17:13:17.437000
CVE-2024-35254,0,0,45ef78e7aab61785b60639ab749398d66c1fb5a7b87988e5d821011437a5eefa,2024-06-20T16:16:47.070000
CVE-2024-35255,0,0,dd2820217033d300b334ae05889b3c3f413c0da4e96707fa039fcafe96b24ff2,2024-06-20T16:31:46.127000
CVE-2024-35256,0,0,02d9ae572692f07bd127996c7ff0259bcc83977d1d1c3198a4efd8c09aeb0102,2024-07-09T18:18:38.713000
CVE-2024-35256,0,1,d5a6ae58fc78f0ff4992cb812a54fe658aa14b0129af650e09b305e064058e54,2024-08-08T18:50:56.197000
CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a875,2024-05-17T02:39:59.067000
CVE-2024-35260,0,0,ade48aea1e03059f4c6e4bf7d0aa3b52cede73bf846ea05896b4e57d53575ded,2024-08-02T03:15:50.793000
CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
@ -253032,8 +253039,8 @@ CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a6
CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000
CVE-2024-35271,0,0,c57b1f21be050f06c1e468a17475e0d62c838ec23c477ed527a0e41aa2432dda,2024-07-09T18:18:38.713000
CVE-2024-35272,0,0,274177d2d22df63fa0760c0dc12cda270bf4a57034839e2f74bfbd59edb463c5,2024-07-09T18:18:38.713000
CVE-2024-35271,0,1,cdbfc4395a8e92fe3a40b1fd22607b93e804de72bc708206a369eda6febd9bdc,2024-08-08T18:51:09.090000
CVE-2024-35272,0,1,21cbcac35a76cf2546e4b5eabe4cf122629a8c90c7e6d4aea0ac66e3d7194dea,2024-08-08T18:33:14.440000
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
@ -253990,7 +253997,7 @@ CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1a
CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000
CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000
CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000
CVE-2024-3659,0,0,45d8955e8ffd3d16f89a4279f52887a232a2257d1cf08559d9df0afb2157d916,2024-08-08T15:35:18.413000
CVE-2024-3659,0,1,2ed718ae28ceb8e4f7d52b0a060fbe45e212746a041da98ae407c89904905fc5,2024-08-08T18:55:28.493000
CVE-2024-36597,0,0,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000
CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000
CVE-2024-36599,0,0,2b2bc07f90b37a08fed3176237d4d673945409fdbbe06bfa5eecf36828a7ec56,2024-08-01T20:31:01.340000
@ -254443,29 +254450,29 @@ CVE-2024-37310,0,0,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601
CVE-2024-37312,0,0,c9951de02441eaa79d1cb1dd04f0cb479ff9f95a9feb89bd2a12c3935f476481,2024-06-17T12:42:04.623000
CVE-2024-37313,0,0,56e03be6114dcbcc420d52ba189ce21fd838f398741344c11caac865e40212b6,2024-06-17T12:42:04.623000
CVE-2024-37314,0,0,2a8bc61fa93764cb0fb07c24d5bac1ea60f00f829a9b504f8438b7c40cefcf59,2024-06-17T12:42:04.623000
CVE-2024-37315,0,1,78d1052b31ae41f56b435a7566552773a5c40ebb59f83a745739357048c084e1,2024-08-08T16:35:23.750000
CVE-2024-37315,0,0,78d1052b31ae41f56b435a7566552773a5c40ebb59f83a745739357048c084e1,2024-08-08T16:35:23.750000
CVE-2024-37316,0,0,23efa33580c16c198846d8cbc540c3b959c8c6cc5d8e7e643aacce595c39ab53,2024-06-17T12:42:04.623000
CVE-2024-37317,0,0,39b0b4317a6651cb59a140f8d7c551e6209dd76ddab831aefab29483d97c356d,2024-06-17T12:42:04.623000
CVE-2024-37318,0,0,f24ae26ca0facd31c951e48825bfa20026c0187e1527557d74d4daef2adbc562,2024-07-09T18:18:38.713000
CVE-2024-37319,0,0,7d017c79ccc3f705faf8a4c0ccdc6584afdd8bc15696ad2fd1dae4f04398fc66,2024-07-09T18:18:38.713000
CVE-2024-37318,0,1,82690cfe11e6e50a30476df05f4f79df9c950fc779c797746222a6d5488f788f,2024-08-08T18:36:54.347000
CVE-2024-37319,0,1,3686b9b3e7ab1d2d1ae743a102fa0469b7c5ebec5d9019efe44c141c29c0c334,2024-08-08T18:39:41.537000
CVE-2024-3732,0,0,1e5e3029c64a5f725486d32a5d97f2bbd597392012dab477d1543e258f8bb4ef,2024-04-23T12:52:09.397000
CVE-2024-37320,0,0,6345925e90ac10160904e9b10b182ef09ebadf1a57bd782939e4e0ee9068737c,2024-07-09T18:18:38.713000
CVE-2024-37321,0,0,495c7212ec58e20696af0373127702bfa82cad4d0b945f6d9c2c7d88361be644,2024-07-09T18:18:38.713000
CVE-2024-37322,0,0,10f29d5fae5e85da3fa864c99f7e1cf125f9d28c87009b8ffbeda2cbfed33817,2024-07-09T18:18:38.713000
CVE-2024-37323,0,0,3c9c49eecddc8e4feb075ad208e047004efc1694bd57c01f9852d681eee41737,2024-07-09T18:18:38.713000
CVE-2024-37324,0,0,145d07f435e541815043ba1d20a47016f2c3b5f496d95cb9e6f6af29dea5dffe,2024-07-09T18:18:38.713000
CVE-2024-37320,0,1,52cd5355310316c3c1d8ff3bfc1866f0c347a376cdcf040d922cb358cfc3c899,2024-08-08T18:40:08.887000
CVE-2024-37321,0,1,3a191e9479e5b6b71ab06432cc1bba0fed6c761564675196ff63873f3627dcd5,2024-08-08T18:40:27.350000
CVE-2024-37322,0,1,7890c12be3fc7ae6a0de8c762fd62014d3b44321fc99235fe85b2912fa1528d3,2024-08-08T18:41:20.253000
CVE-2024-37323,0,1,3d88d918c2c47bc73a6a00947073f9fb66d566f56aa316d54e38c00b62ca69fc,2024-08-08T18:41:44.730000
CVE-2024-37324,0,1,308640419ddff319167bcd6bae859950697f66511d4cb578be7f78476e67f053,2024-08-08T18:42:10.850000
CVE-2024-37325,0,0,1d87585535a572046f3269d4a6e53e39d113df4fc37e43ad494b3059408daa64,2024-06-13T18:36:09.013000
CVE-2024-37326,0,0,4351db56e1adaa58a3641d4ac6d1dc60f22ef964eea09ece3b63a22e58498b86,2024-07-09T18:18:38.713000
CVE-2024-37327,0,0,9f3ab0213ece576a91985ebc5e7fb679dd22f92f079034b63ff74f1739bcca65,2024-07-09T18:18:38.713000
CVE-2024-37328,0,0,eb97e67a9b89929b75aa5398b9e7b7ed6b10df9497b81eb17bdc483ab00fd1f3,2024-07-09T18:18:38.713000
CVE-2024-37329,0,0,50ca2ce10635d38f200ed91c0e3c2088dce2d93c01025a2eee55c6973c999afd,2024-07-09T18:18:38.713000
CVE-2024-37326,0,1,9773c953cba0c27a0b048f1b26ec2c714fe23b316770567e128d392682f706a8,2024-08-08T18:42:31.443000
CVE-2024-37327,0,1,4e41c0148a719afc92c9ab685c007c508f37245b341e1c36c572de2d60cfe4ff,2024-08-08T18:42:50.373000
CVE-2024-37328,0,1,66b0ddf99d4267d2ddf5b3d9432cf694c4efbd6ffd867ca686aa9fee93d4f03d,2024-08-08T18:43:07.557000
CVE-2024-37329,0,1,da1d1e1082bcbf5e1b9ff358dc5e13de5addd1dfba2a9ae1e82a265419b97fc9,2024-08-08T18:43:34.633000
CVE-2024-3733,0,0,f46a385e0f079b92b4bf82f6537b2845f94de0d4fb1f51bc91c30d173674e880,2024-04-25T13:18:13.537000
CVE-2024-37330,0,0,ded3225cbb17d924a03790ec42e571cf1415428c11b455b1099b2e5ad279929c,2024-07-09T18:18:38.713000
CVE-2024-37331,0,0,74dc7821a80fa2044b58a4f07c4e116d28b939883ff4bdc69f1ec690b1b96432,2024-07-09T18:18:38.713000
CVE-2024-37332,0,0,9ed2dfd85a68da0aa569b271139c9738e069d0467634a97a027c81cd5181f291,2024-07-09T18:18:38.713000
CVE-2024-37333,0,0,ca6a17cc22b1d717772d796bf0aa2546b83275671146f095987901bb082c32cc,2024-07-09T18:18:38.713000
CVE-2024-37334,0,0,3931d383be66577632f115e0c9d908ee2bcb3dc588be0b175f4163124a70c529,2024-07-09T18:18:38.713000
CVE-2024-37336,0,0,90e602973017f76462997dc997dd1aa43f526ec48ab9dba1852b6ff97aa50fb9,2024-07-09T18:18:38.713000
CVE-2024-37330,0,1,43ad8b020e1e2e7b836653135e5107ad1d0f4a4422f58044f21423488370fde0,2024-08-08T18:43:52.897000
CVE-2024-37331,0,1,9acb6285e6150f47119d04fb2b425d99c3b0a44d48638f0dc5531dfd938d127c,2024-08-08T18:44:18.053000
CVE-2024-37332,0,1,dfaca3f139be3bf36b4d761904308c7fabbd1ce73099f361a0efe436652e8d13,2024-08-08T18:44:37.320000
CVE-2024-37333,0,1,709816ae2e1d3bfc31eeaf82e258fdd783bc74b18447a1f705ce3e32db349c74,2024-08-08T18:44:55.343000
CVE-2024-37334,0,1,563aef6e59d9745d29b9695dc6399e28c0dd7d331b805dd1482225a5b250d3ef,2024-08-08T18:51:42.747000
CVE-2024-37336,0,1,410dea8adcf769dbf6c99783ee79e4122996ff2be4f030bf685fe648f50e8121,2024-08-08T18:45:37.537000
CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000
CVE-2024-37343,0,0,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
CVE-2024-37344,0,0,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
@ -254492,6 +254499,7 @@ CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c
CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000
CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000
CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000
CVE-2024-37382,1,1,4fb35da60d5c84677f2ea0ba29f938ae1e309782d7366c3b4fe2f8096dd387ae,2024-08-08T18:55:19.180000
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
CVE-2024-37385,0,0,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000
@ -254747,11 +254755,11 @@ CVE-2024-37880,0,0,e6a073a13f4d5d80acb782a97b27605fba3820cc74e70d67b997f08c66f11
CVE-2024-37881,0,0,e093bcdbd16679bd51273f21b0d2d0887a3da8aeb5e0bdca0911ec7d57d9cff9,2024-08-01T13:54:28.750000
CVE-2024-37882,0,0,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000
CVE-2024-37883,0,0,7626a3367857543c450838d843023961ad58fb44ff2499e7c7931fd5ab11dafa,2024-06-17T12:42:04.623000
CVE-2024-37884,0,1,4e6fff0a6361455ad7e37911dc54427d765d3f4a4c4bb46beeffcddf37eecd25,2024-08-08T16:39:59.217000
CVE-2024-37884,0,0,4e6fff0a6361455ad7e37911dc54427d765d3f4a4c4bb46beeffcddf37eecd25,2024-08-08T16:39:59.217000
CVE-2024-37885,0,0,17f5559a85e6e9db6ebd185b566af3c7ce60a0f396cf403a1166b89dd6d49182,2024-06-17T12:42:04.623000
CVE-2024-37886,0,0,37a2c4f4d6005992267e24a61cfd186fd6016e8e0dba151502269eb8999be1da,2024-06-17T12:42:04.623000
CVE-2024-37887,0,1,dd1db8e47a04efe406ac991a9022a48114c0903c568235a94787de1fe87758b4,2024-08-08T16:33:31.063000
CVE-2024-37888,0,0,089dd35cce5dcae3cb152eacc7c740a003a3d7c1b73414660b2199c1fb6b7c31,2024-06-17T12:42:04.623000
CVE-2024-37887,0,0,dd1db8e47a04efe406ac991a9022a48114c0903c568235a94787de1fe87758b4,2024-08-08T16:33:31.063000
CVE-2024-37888,0,1,85802cd547dfbbe611f91638c3cc445da6232c116464d4f183fc32c96cfddf76,2024-08-08T18:01:19.233000
CVE-2024-37889,0,0,ee014bfb18a496c8142601928a13908bee5aa40300b8bda82e59b1c0a2e0b1e3,2024-08-08T15:31:53.683000
CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f99848d,2024-05-14T16:11:39.510000
CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000
@ -254900,8 +254908,8 @@ CVE-2024-38082,0,0,23c6f123e64a1a12cf5b02d5d58cddce4aac695b84d4f46ea5b094849b0d1
CVE-2024-38083,0,0,3c2469ed2c873a64c64841f8f046f5b40612bd2c08b8213d90aa91d1b11e6c5b,2024-08-07T16:39:28.940000
CVE-2024-38085,0,0,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000
CVE-2024-38086,0,0,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000
CVE-2024-38087,0,0,9aedc1a56c783404631df75080f4299e332d0e54e3340c961c1b9240f3ba24ed,2024-07-09T18:18:38.713000
CVE-2024-38088,0,0,b10352538c542ba9869e6472f77463fb015dd7dbc3d0abb38bb041e0cb6a5636,2024-07-09T18:18:38.713000
CVE-2024-38087,0,1,e9389c577c197af0a86410125a64446456d804142f17e0af9a55d82f41522df2,2024-08-08T18:45:56.203000
CVE-2024-38088,0,1,75112efcb71a9f477730c0c9a37a767c54ff44dcc9d07440920c4abad9f3faa6,2024-08-08T18:31:54.827000
CVE-2024-38089,0,0,f43516e20a67775fdb300c6589bec8c27ea499a370a6240ad0d19a7cb49660e2,2024-07-12T15:42:39.127000
CVE-2024-3809,0,0,e9699ccf97d1a77cdd5a51c26652206ae829b76e33be88373519642da681c26d,2024-05-14T16:11:39.510000
CVE-2024-38091,0,0,a9751e3868c0a113eedbccdcd34b91f06a8adaf90dbd1405bbcc8c2a2900f94c,2024-07-12T15:35:41.100000
@ -254965,7 +254973,7 @@ CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c9815
CVE-2024-38293,0,0,2af5660de21ea537f089380c69d608dd10ea2321053bca42c4352602d7ee9678,2024-08-01T13:54:46.393000
CVE-2024-38294,0,0,f88948441f6418893f991fd0ef34dfd45f0e02ebcb8e39fd787f2f64385d53d8,2024-08-02T18:11:19.757000
CVE-2024-38295,0,0,c8378492e2d02be00aeda8d1da5a5ec5803f1a3bcf3481a4ca52e9e0e7261335,2024-08-02T18:10:46.607000
CVE-2024-38301,0,1,0aaba53899fa63c6f65cba4d5faa4104f18194e9cd1a78452f451bbbdb780cd8,2024-08-08T17:01:45.347000
CVE-2024-38301,0,0,0aaba53899fa63c6f65cba4d5faa4104f18194e9cd1a78452f451bbbdb780cd8,2024-08-08T17:01:45.347000
CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
@ -255503,6 +255511,7 @@ CVE-2024-39274,0,0,e6293a55fc2e07d4badaf0b6ab097c48e8ef50320910d51d55d3f365db2ff
CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000
CVE-2024-39277,0,0,da44e9f6b14f33e5d22339f98a1af8621d431ecd39b0e0bcdb259c56dded4baa,2024-06-24T19:17:48.380000
CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000
CVE-2024-39287,1,1,5f35ee0c388ca5e0e49a970ea379523932f8098bd51482abd25c3f315609fea4,2024-08-08T18:55:19.180000
CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000
CVE-2024-39291,0,0,557945eb3fbb1a8814c89e2fc458e5ea39dd1732dd1cb9036e754a14bd8e417d,2024-06-26T14:03:13.437000
CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32cc4,2024-07-15T07:15:14.940000
@ -256182,7 +256191,7 @@ CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede6
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000
CVE-2024-40898,0,1,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
@ -256332,8 +256341,8 @@ CVE-2024-41033,0,0,7183dfda87a717a7043cb53f856518b54b6ea87a88747e15104fc76ba2e9f
CVE-2024-41034,0,0,8ef7155ce0eaa8275171b9ac0813864d0797967a61f622f33157a8a24fce3047,2024-07-29T16:21:52.517000
CVE-2024-41035,0,0,cf48df2d338e0ed99938b6805f348531b3d0c639b71dd85f792b634a7cad4d55,2024-07-29T16:21:52.517000
CVE-2024-41036,0,0,3eb36f0b966eb35cff9222acfdc54aaaf4f85427f44e523908ded2d0342001b2,2024-07-29T16:21:52.517000
CVE-2024-41037,0,1,ee0b06bc77973c4027d48245d79fc7d87f47e59f3c8717e8720a6850fc7cec0b,2024-08-08T17:53:57.487000
CVE-2024-41038,0,1,2aabacb99b432cb8d9836c68ea21fc07218bc88764ab1e896c1d79793004d876,2024-08-08T17:54:28.177000
CVE-2024-41037,0,0,ee0b06bc77973c4027d48245d79fc7d87f47e59f3c8717e8720a6850fc7cec0b,2024-08-08T17:53:57.487000
CVE-2024-41038,0,0,2aabacb99b432cb8d9836c68ea21fc07218bc88764ab1e896c1d79793004d876,2024-08-08T17:54:28.177000
CVE-2024-41039,0,0,3cf037a7b77611f693ccd2b6ab5e6ffc513017022cda8dfe8747fcd8d565d21f,2024-07-29T16:21:52.517000
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
CVE-2024-41040,0,0,7c4f1d43a75af85b97ad82a0f079e37e8691141bbc74b9a4b3f13879c7076fe9,2024-07-29T16:21:52.517000
@ -256386,18 +256395,18 @@ CVE-2024-41083,0,0,dff5dc6a7165d8b682758090410b05b21412e86ab2996b0805e7e8a0c1a5e
CVE-2024-41084,0,0,f925e6b8af988fbff4009df696776564d1566b9bec0a2d08e615514886466a2d,2024-07-29T16:21:52.517000
CVE-2024-41085,0,0,2a01a626749195e58b8c5d7793aaaf03330b26d8f731e06b491ff19b65d15e11,2024-07-29T16:21:52.517000
CVE-2024-41086,0,0,def1e72f4af73afb05473009bf28654fb55be728733d04a1cb558efe55809b1e,2024-07-29T16:21:52.517000
CVE-2024-41087,0,1,58c38c74c158e439afdb46cfb9959ea78813107a1e241ba0d714928a41f4075e,2024-08-08T18:00:03.977000
CVE-2024-41087,0,0,58c38c74c158e439afdb46cfb9959ea78813107a1e241ba0d714928a41f4075e,2024-08-08T18:00:03.977000
CVE-2024-41088,0,0,77b266b2f37d59fc76108613da24291390035f20c7c9f472230f677ce48b8790,2024-07-29T16:21:52.517000
CVE-2024-41089,0,1,38c98937ddcf0489f642c6e9ec7fba9f1ecb4dca47f05ab2326eea2df7749aea,2024-08-08T17:50:48.727000
CVE-2024-41089,0,0,38c98937ddcf0489f642c6e9ec7fba9f1ecb4dca47f05ab2326eea2df7749aea,2024-08-08T17:50:48.727000
CVE-2024-41090,0,0,6fcac80b2a14c2c34689e44731def02717dedfe18dda82ddf5737822dbb56b40,2024-07-29T14:12:08.783000
CVE-2024-41091,0,0,3fc4e261f19779ac0e56a4e977593baaf33599d021e440beef3dc9dadc5be94c,2024-07-29T14:12:08.783000
CVE-2024-41092,0,1,3c39b044ea5e355675d6fc317f55f869cf719acff5bdab05fd9abf02bf44d9f2,2024-08-08T17:51:11.700000
CVE-2024-41093,0,1,4ea05a79a95d172d19f70ea731b5f27982d494680f43de6cd04d5939fa17a543,2024-08-08T17:40:31.917000
CVE-2024-41092,0,0,3c39b044ea5e355675d6fc317f55f869cf719acff5bdab05fd9abf02bf44d9f2,2024-08-08T17:51:11.700000
CVE-2024-41093,0,0,4ea05a79a95d172d19f70ea731b5f27982d494680f43de6cd04d5939fa17a543,2024-08-08T17:40:31.917000
CVE-2024-41094,0,0,278c76ef5ca1238c19b2adc813e6cb3415611fd6af79d964f6f40f1f04f60911,2024-07-29T16:21:52.517000
CVE-2024-41095,0,1,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a567d,2024-08-08T17:40:57.760000
CVE-2024-41096,0,1,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0395,2024-08-08T17:26:54.243000
CVE-2024-41095,0,0,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a567d,2024-08-08T17:40:57.760000
CVE-2024-41096,0,0,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0395,2024-08-08T17:26:54.243000
CVE-2024-41097,0,0,c920409ed43bd61ce66fbb67a2bc2f7c465a9ae9767076af29e351ce5c3e00a0,2024-07-29T16:21:52.517000
CVE-2024-41098,0,1,4658b1a664747249856491a8decc3561c2036eed8e14f4d01a4226586d09138c,2024-08-08T17:27:55.600000
CVE-2024-41098,0,0,4658b1a664747249856491a8decc3561c2036eed8e14f4d01a4226586d09138c,2024-08-08T17:27:55.600000
CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000
CVE-2024-41108,0,0,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000
CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000
@ -256435,6 +256444,7 @@ CVE-2024-41143,0,0,86895945f47e1361478000a71a2798af8709b921e75a70b1e72755ffb197a
CVE-2024-41144,0,0,beef6d47444f75a70cc53f4dcdee75e777176599a5e18a0e5bf9ea36f35cb6ca,2024-08-01T16:45:25.400000
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
CVE-2024-41161,1,1,d93295a8e71669d3253a3da3085d39953cfdb029c39c49fe6d49270829646664,2024-08-08T18:55:19.180000
CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000
@ -256449,8 +256459,8 @@ CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd2
CVE-2024-41226,0,0,f5381931de23c5c05f7ee8bfe76927ab8a3b6cc5523ba53e93ac6154cb968434,2024-08-08T14:35:06.727000
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
CVE-2024-41237,0,0,6c3bbfd67a2c38c6147b8483ba279472257fc740c0d1572c5fa4e63c27c892fc,2024-08-08T14:35:07.647000
CVE-2024-41238,1,1,cf96282fa1415cd67f054f797fb68068695ecd470c073cb302f195cae77e40bc,2024-08-08T17:35:05.697000
CVE-2024-41239,0,1,4739a4322a16e9b592b27bce368fa148c39d464b16681353d1da057fafdab0e5,2024-08-08T16:15:09.190000
CVE-2024-41238,0,1,68ce49440a6a78d81a154e0f36122f89b41ebddb213355e43d24480236625afc,2024-08-08T18:55:28.493000
CVE-2024-41239,0,1,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
CVE-2024-41240,0,0,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
@ -256664,7 +256674,7 @@ CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f
CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000
CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd502c,2024-08-07T19:35:11.473000
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
CVE-2024-41910,0,0,e2cd81d24447e4d89c8ac09bae9292e65e7f5ac19eb040a94f73395e4ca32d36,2024-08-06T16:30:24.547000
CVE-2024-41910,0,1,05e8a8305f60931af1e7f6df78a4476b8482c489e829a2c9df8e95a89a5ad19c,2024-08-08T18:15:10.897000
CVE-2024-41911,0,0,ea799ed6f6f9ce65028cdbe045f892be03084ec1245d47535ccbe7b5bf6048c3,2024-08-06T16:30:24.547000
CVE-2024-41912,0,0,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000
CVE-2024-41913,0,0,c5a05750f27b10355d3f766241d60c814ca86a61249995cbd8064da18910e8f7,2024-08-06T16:30:24.547000
@ -256676,7 +256686,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
CVE-2024-41942,0,0,d3803f07ce0e65ed29e1e70dc90caac5025f888fb0a18433d54e269ebd38e920,2024-08-08T15:15:17.527000
CVE-2024-41942,0,1,8ed58986637e5db506e212c5a75f4c8c5072af189b8a9bd438a4287ea1fa84e4,2024-08-08T18:55:28.493000
CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000
@ -256904,14 +256914,14 @@ CVE-2024-42349,0,0,d97bc517c9e69f035ec995db0492468328dd387e0dc6614b4ad8bd471c06d
CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000
CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000
CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000
CVE-2024-42354,0,0,3d7595135ce94793d71e84673f836d90ebff18be5f4f6e094ccb4747459b4723,2024-08-08T15:15:17.793000
CVE-2024-42355,0,0,18cdeda7877af65f170277b41a145f3c35a4438f3a3190478b69fcca0b47db9f,2024-08-08T15:15:18.013000
CVE-2024-42356,0,0,98e8fd4c7edac05c8c94e1e93ad8136456c4b4a84fc6ae709b38a989943e3a4f,2024-08-08T15:15:18.247000
CVE-2024-42357,0,0,17a3203dc9637fb73af25dd0413d02cecc35254bb9f6894cc80f19b3085c5a0b,2024-08-08T15:15:18.460000
CVE-2024-42354,0,1,3f1bfba047fb141567757046bdb6192ec422b00b04118c65ab3125dd3402be23,2024-08-08T18:55:28.493000
CVE-2024-42355,0,1,d5381f7fc2dc7c5986b9752ad69f035ea726ee2baf03e319c68a54f11a9d63ce,2024-08-08T18:55:28.493000
CVE-2024-42356,0,1,c2e242be1d6748bf4f15cbfb551102f73c9cacaee1889c01c74d636ae8073ac7,2024-08-08T18:55:28.493000
CVE-2024-42357,0,1,44c59f521ab962bdb1c0d177d9946b9376c594c5c4074d3cc84883e0698a3e7e,2024-08-08T18:55:28.493000
CVE-2024-42358,0,0,bfdfea3765abe743074eccf4e4988e900f51d95c87e996dc4c204d5e5db7c300,2024-08-07T15:17:46.717000
CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000
CVE-2024-42365,1,1,d3a57ff46171e16a07c5d4a9ce8d6a97fac3c2d8c14d2533d5e2b227cc435cea,2024-08-08T17:15:19.340000
CVE-2024-42366,1,1,c6ae642720c4b2dbd302d4317caf1ed1792180069099f5fdd4ecd87302025526,2024-08-08T17:15:19.590000
CVE-2024-42365,0,1,2e54df0fe9685a274eda5184f59e86b5df98f2e7c76b4e62d4a2c6ed6be068ba,2024-08-08T18:55:19.180000
CVE-2024-42366,0,1,2466463b7f9cca1a29b76bc206fe3dc33faa11a0127772beee97a730e70608c2,2024-08-08T18:55:19.180000
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
@ -256925,6 +256935,7 @@ CVE-2024-42398,0,0,1bd47f35d1750f7fdf43bf764c0abf3e2c80a4806a8e0014d8bb69479613f
CVE-2024-42399,0,0,a3b1a8c12625bf78004309ad3c67c4b2399a3faf9af89f47117356fbe01bf659,2024-08-07T15:17:46.717000
CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000
CVE-2024-42400,0,0,92a8d348f7d91e4aa17062b372e7ee2acb9c68b6a9eda447b8043cdc6c95df6b,2024-08-07T15:17:46.717000
CVE-2024-42408,1,1,e5d2c20e9880f479571f79feaba8cbd48087331a874716bf56571e7ba2932fca,2024-08-08T18:55:19.180000
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000
@ -256939,6 +256950,7 @@ CVE-2024-42461,0,0,ccfc4466bb15f077fb8e5d551bb285d827a249febd58170e6accc3c96449b
CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000
CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
CVE-2024-42493,1,1,0b24cb1deed3a57898c8f3524a80c98e86eb3779aa3ca96d4b3513ecdc687514,2024-08-08T18:55:19.180000
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
@ -258451,9 +258463,9 @@ CVE-2024-6061,0,0,9fbdc13d40c52cd3201ba4dbc85806265bcae7fe430997057864a0abc50a97
CVE-2024-6062,0,0,93dbd09d82a9c090799896e27a01f38efff42cdeec70d50228105cef0f88fcb4,2024-06-20T12:44:22.977000
CVE-2024-6063,0,0,bc31baa414c7130817af75aefc4c93d5c50e0d49a263847622e8e121134c5d33,2024-06-20T12:44:22.977000
CVE-2024-6064,0,0,3370149dffce37c68b93ba4d92c68f6dbfa595c6fecab2312ed9b990710fd435,2024-06-20T12:44:22.977000
CVE-2024-6065,0,1,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000
CVE-2024-6066,0,1,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000
CVE-2024-6067,0,1,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000
CVE-2024-6065,0,0,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000
CVE-2024-6066,0,0,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000
CVE-2024-6067,0,0,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000
CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000
CVE-2024-6070,0,0,1949da6de042279176b79576f8e73bfd6878b90ce3cb716b8378384d024fe5eb,2024-08-01T14:00:09.647000
CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000
@ -258465,7 +258477,7 @@ CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f7
CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000
CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000
CVE-2024-6083,0,0,a8e42b758c673e09d4e24ea193e5640feaaf3b5eee44f78d141a0b2276184907,2024-06-20T12:44:01.637000
CVE-2024-6084,0,1,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
@ -258482,7 +258494,7 @@ CVE-2024-6103,0,0,5e29bc37d9d7a304c867024ebdb6c9635d505e152b36dfc1b31a9280adb1e2
CVE-2024-6104,0,0,108534f982ecedc8e18a75e604642b0e40fef80fdd2c5d6c473bb0683c303507,2024-06-26T17:19:40.850000
CVE-2024-6108,0,0,8dcf8c978ffd08a68470779b67afcba2ef4b72c9a7a6acbd6d0451b159e2f4f9,2024-06-25T18:15:11.730000
CVE-2024-6109,0,0,bb0e3455a169d6bebc9d8b88e9df5fdfc40e2e3982d9fbc581f71bdf8363e7cb,2024-06-20T12:44:01.637000
CVE-2024-6110,0,1,b63b3d86bda62f504e857148e856fae2084982d1fba5e9f950f2c7804e723853,2024-08-08T16:12:55.633000
CVE-2024-6110,0,0,b63b3d86bda62f504e857148e856fae2084982d1fba5e9f950f2c7804e723853,2024-08-08T16:12:55.633000
CVE-2024-6111,0,0,98763a9958bd86a666bf14e0feaaf6fc585400a69f10e2d292b840aca2e315e8,2024-06-20T12:44:01.637000
CVE-2024-6112,0,0,b1e6c0864e0ebee4a0a8c4638d7eeba1ec17f68eaa1c8ef1caada2a1fabb05a0,2024-06-20T12:44:01.637000
CVE-2024-6113,0,0,5b70a902f6bae2f98582af8aea358fa74ce77c6f620f786f6fe02fb8c741aebc,2024-06-20T12:43:25.663000
@ -258862,7 +258874,7 @@ CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73e
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000
CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555ee,2024-08-06T16:30:24.547000
CVE-2024-6652,0,1,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
@ -258886,7 +258898,7 @@ CVE-2024-6699,0,0,9d9db768b9c88d760728ad43f917f22b5e5ff8a9965264fbc4d242d1015fef
CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000
CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000
CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000
CVE-2024-6706,0,0,d1d145b947ad97f8eaf2f091ef3b977ed89dbed4347b44402611d132f13059bb,2024-08-08T14:35:14.497000
CVE-2024-6706,0,1,368fe1c3fab739e74a8a813ffbef4887e8ddb48011a739592f2aed7de5e469c4,2024-08-08T19:05:03.057000
CVE-2024-6707,0,0,c792dc80f91b7e4b45ea7a1b1487bfed6fdc5bec0250d28885774ca401b7c4d5,2024-08-08T14:35:14.743000
CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b602,2024-08-05T12:41:45.957000
CVE-2024-6710,0,0,4e918da09846cceb474e5a8b11ef31c34f74c44e6fb5c62544fbedf363b9f5e1,2024-08-07T21:35:11.673000
@ -258965,7 +258977,7 @@ CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
CVE-2024-6881,0,0,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1ed,2024-07-29T14:12:08.783000
CVE-2024-6884,0,0,1ab82a5f63c30a2091b7b058cafc8d62a5f67aa78df5b8c418a856100b70a5fa,2024-08-08T13:04:18.753000
CVE-2024-6884,0,1,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000
CVE-2024-6890,0,0,b493f7bd70bdeb873cbdf2524979e878cc1ca0743f8358dd3fc37c7addf41719,2024-08-08T14:35:15.090000
@ -259087,14 +259099,14 @@ CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d5
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
CVE-2024-7106,0,0,4f79551bb831c41c367c51b2f81bdf75eb9c94a2549b6a3ae035069141d77523,2024-07-26T12:38:41.683000
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
CVE-2024-7115,0,0,819d5cce5a1e2afdff1be642b38d32a950da76b4219022024da1eb7f580c864f,2024-07-26T12:38:41.683000
CVE-2024-7116,0,0,d606950e780706743ffa240e54bab9ff9a5a27e768f8fb90c18e7f69203f2bc4,2024-07-26T12:38:41.683000
CVE-2024-7117,0,0,1e4afcc6cca6c4e7beb85fac1a7fed4a23e63b6654ed7d583e0579875d0c654e,2024-07-26T12:38:41.683000
CVE-2024-7118,0,0,6ddf36fc8a10a330c27e6abbf544962e1f8806ebf38d58bb308a1fa31785fd26,2024-07-26T12:38:41.683000
CVE-2024-7119,0,0,0d4c04861267ba0260c186040cffb33b88f1cb2cf783b33962c97c266a3b660d,2024-07-26T12:38:41.683000
CVE-2024-7115,0,1,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
CVE-2024-7116,0,1,b2ab9f3dee8f843c737ebbc08aa3d5031cd0525c38c25d9a8f184157df5d144a,2024-08-08T19:08:18.813000
CVE-2024-7117,0,1,0370972c92aa7f9872300d9752d76cebd60622a0fa3aff5d2fb9461dacdb7e43,2024-08-08T19:11:30.467000
CVE-2024-7118,0,1,1f0a957064f55aa50018b5743e93b26ea81b9fa6087c0d5ec8ed17e492201aa2,2024-08-08T19:02:12.083000
CVE-2024-7119,0,1,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be4440,2024-08-08T19:01:17.340000
CVE-2024-7120,0,0,61740476c5bf721de3ec3243fb937e4e04eb802316b459df4612d60639785741,2024-07-26T12:38:41.683000
CVE-2024-7121,1,1,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
CVE-2024-7123,1,1,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
CVE-2024-7127,0,0,2d5095b19bb58c78333178ffe1af1d8a0764d078ec0f076ba87011d70eec91c9,2024-07-30T13:32:45.943000
CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000
CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000
@ -259240,7 +259252,7 @@ CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
CVE-2024-7342,0,0,b2aae5a9033c72e024dcd6167950e24730a1a54d1040d58948e1e0708313f38d,2024-08-01T12:42:36.933000
CVE-2024-7343,0,0,81acd094d4fc0681dfbdfb7143ed5e48e10c433b5dcce0c0a370d97e4141e1d6,2024-08-01T12:42:36.933000
CVE-2024-7348,0,0,5ca9526ad20bc138a06c68a8e97c44a143c674bf56abfce73a881ed42401af92,2024-08-08T13:15:14.007000
CVE-2024-7348,0,1,5e8f627012fccd63e6afc5ceec0844305a80767b52005b87e6aec1f57eda5a6f,2024-08-08T18:55:28.493000
CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
CVE-2024-7353,0,0,3261e094ba804f70c4c538de9d35bf008a53b0271751e64c6aecf340751dd360,2024-08-07T15:17:46.717000
CVE-2024-7355,0,0,77eb32dc1810199d8dfd56b790a0cc073bb577f44b08cc26474823d677f5cfc6,2024-08-07T15:17:46.717000
@ -259269,7 +259281,7 @@ CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e
CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
CVE-2024-7394,1,1,aa547388be77617afc1aa944157a4aef3ae297017c9a6a716edae6da822967e6,2024-08-08T17:15:20.023000
CVE-2024-7394,0,1,e251d76b1d6cc83c1cfdea51bdbc268e0da61a740aadd1fc89615c49cceeae2c,2024-08-08T18:55:19.180000
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
@ -259305,12 +259317,12 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56
CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
CVE-2024-7477,1,1,9658812f50f693193f3789c680003d82b8e649f1acdf9e61a5fec82a5b61d372,2024-08-08T16:15:09.363000
CVE-2024-7480,1,1,c0703a6875a48d6b92b73b5bc819e0fe258554602ee77b1d655c728deab1735b,2024-08-08T16:15:09.567000
CVE-2024-7477,0,1,5c2470fac7ebadf2ae3cf56b0fe88a8a814b9834bce7545ba252021bfdc4655d,2024-08-08T18:55:28.493000
CVE-2024-7480,0,1,64d465ba825549caaac1f5f0831794e9226d53a768fa9ec822023f1af28e7934,2024-08-08T18:55:19.180000
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
CVE-2024-7490,0,1,5e9c56a2b83cf7efea01311fcfb0bebbdeb54c4fc1c14fe0c7fe52afb8561c53,2024-08-08T17:15:20.163000
CVE-2024-7490,0,1,aa59d4ffe54d5b669323c4183f09d592d26845d8e726a2862796ad13803cf019,2024-08-08T18:55:28.493000
CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
CVE-2024-7494,0,0,03118698edd12e94cf1110a03a023e325330cda1b40488ab50e531b2e6ace73f,2024-08-06T16:30:24.547000
CVE-2024-7495,0,0,1d4e0bc3bd3cd1f2a04f242134024d84adf5fd40eab5c711a130f9e16780f0f1,2024-08-06T16:30:24.547000
@ -259326,7 +259338,7 @@ CVE-2024-7518,0,0,c1e659d59fab5a21f46030485c8364ef9c7b859fae166f3d9aaf16371f61ae
CVE-2024-7519,0,0,24768d8764f4f28adc1fbfcbb529254838657a3f1d1db417909b6d021fab1d2f,2024-08-07T21:35:12.903000
CVE-2024-7520,0,0,9d3ddc13e8867f7cb7b24f4793529c9a0d25e1f46dbf94c7eeb8a1b835d8a2d8,2024-08-06T23:15:59.803000
CVE-2024-7521,0,0,aa36585855cd5bcdfb01758853aa628523870b5b6ffb7787fa3857543ac3a56f,2024-08-06T23:15:59.877000
CVE-2024-7522,0,1,84fe71da8cf075dcd103677abb54562bdd9f546fb1c9071f317f44135906c9bd,2024-08-08T16:35:14.220000
CVE-2024-7522,0,0,84fe71da8cf075dcd103677abb54562bdd9f546fb1c9071f317f44135906c9bd,2024-08-08T16:35:14.220000
CVE-2024-7523,0,0,3f3f003d656a1184662cec79c06d3948dd3038503ae3513bf0fe3c1956b37613,2024-08-06T16:30:24.547000
CVE-2024-7524,0,0,07a71bf262380d8c7908b6af8aedab2300b78cb30b40198df3e8d289589265d2,2024-08-06T16:30:24.547000
CVE-2024-7525,0,0,5fd9dfbbd9f6275593c22928d26dda0f3c930c37af4b3bb59cc2fdc6afd8c61a,2024-08-06T23:16:00.030000
@ -259334,7 +259346,7 @@ CVE-2024-7526,0,0,b7dc1769424faeb68068ce309d6d3523a91a1d4fb4a85465f17d0f1c4d8fc8
CVE-2024-7527,0,0,5726c5c54faa1bf1781147fed2e22e549db6ab22b4878ce6040da6bad2504c69,2024-08-06T23:16:00.177000
CVE-2024-7528,0,0,b6e9413f9a86c458f79f2237a9adb5674eec1ad41e68eb793e2d9ec404600ca8,2024-08-06T23:16:00.250000
CVE-2024-7529,0,0,b88dacd4622bcc7a40dd32b4177b18e58f7bcd9368595fc01c5e421f17f8855a,2024-08-06T23:16:00.317000
CVE-2024-7530,0,0,4a936de0be15e0090e209a9f7be3fd28bb9e4007bdf12c2dc7ac01d70a572d27,2024-08-06T16:30:24.547000
CVE-2024-7530,0,1,b8218ebe8f8f7d0c60c64f6951f7d0958715ecc66bafe38a6940afb55d245bb6,2024-08-08T18:35:06.897000
CVE-2024-7531,0,0,a6ff05a5a66ff77c501f3337329e6ee8c78879bff77c09716ca0c6a78826c209,2024-08-06T16:30:24.547000
CVE-2024-7532,0,0,e1061fe3725daaf1e213ad4672dbc9d62732c1e415da1ada3444386388111f36,2024-08-07T16:35:22.457000
CVE-2024-7533,0,0,8fd2495ed682530a29e2fedc5921e8f1169344af7cbdf7157b07c88a7eb69c64,2024-08-07T20:35:27.510000

Can't render this file because it is too large.