Auto-Update: 2024-09-02T20:00:17.822228+00:00

This commit is contained in:
cad-safe-bot 2024-09-02 20:03:17 +00:00
parent 14ebbf5cfb
commit c09771a638
22 changed files with 1451 additions and 56 deletions

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2020-36830",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-02T18:15:20.967",
"lastModified": "2024-09-02T18:15:20.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in nescalante urlregex up to 0.5.0 and classified as problematic. This issue affects some unknown processing of the file index.js of the component Backtracking. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.5.1 is able to address this issue. The identifier of the patch is e5a085afe6abfaea1d1a78f54c45af9ef43ca1f9. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://github.com/nescalante/urlregex/commit/e5a085afe6abfaea1d1a78f54c45af9ef43ca1f9",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/nescalante/urlregex/pull/8",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/nescalante/urlregex/releases/tag/v0.5.1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276269",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276269",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2023-7279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-02T18:15:21.393",
"lastModified": "2024-09-02T18:15:21.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Secure Systems Engineering Connaisseur up to 3.3.0 and classified as problematic. This vulnerability affects unknown code of the file connaisseur/res/targets_schema.json of the component Delegation Name Handler. The manipulation leads to inefficient regular expression complexity. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 524b73ff7306707f6d3a4d1e86401479bca91b02. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "ADJACENT",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 2.1,
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 2.6,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:H/Au:S/C:N/I:N/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.4
},
"baseSeverity": "LOW",
"exploitabilityScore": 2.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://github.com/sse-secure-systems/connaisseur/commit/524b73ff7306707f6d3a4d1e86401479bca91b02",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/sse-secure-systems/connaisseur/pull/1407",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/sse-secure-systems/connaisseur/releases/tag/v3.3.1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276268",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276268",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-28100",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:22.770",
"lastModified": "2024-09-02T18:15:22.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "eLabFTW is an open source electronic lab notebook for research labs. By uploading specially crafted files, a regular user can create a circumstance where a visitor's browser runs arbitrary JavaScript code in the context of the eLabFTW application. This can be triggered by the visitor viewing a list of experiments. Viewing this allows the malicious script to act on behalf of the visitor in any way, including the creation of API keys for persistence, or other options normally available to the user. If the user viewing the page has the sysadmin role in eLabFTW, the script can act as a sysadmin (including system configuration and extensive user management roles). Users are advised to upgrade to at least version 5.0.0. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/elabftw/elabftw/security/advisories/GHSA-xp3v-w8cx-cqxc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-42471",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:35.540",
"lastModified": "2024-09-02T18:15:35.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/actions/toolkit/pull/1724",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3",
"source": "security-advisories@github.com"
},
{
"url": "https://snyk.io/research/zip-slip-vulnerability",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43792",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:35.807",
"lastModified": "2024-09-02T18:15:35.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Halo is an open source website building tool. A security vulnerability has been identified in versions prior to 2.17.0 of the Halo project. This vulnerability allows an attacker to execute malicious scripts in the user's browser through specific HTML and JavaScript code, potentially leading to a Cross-Site Scripting (XSS) attack. Users are advised to upgrade to version 2.17.0+. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/halo-dev/halo/security/advisories/GHSA-x3rj-3x75-vw4g",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-43797",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:36.073",
"lastModified": "2024-09-02T18:15:36.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "audiobookshelf is a self-hosted audiobook and podcast server. A non-admin user is not allowed to create libraries (or access only the ones they have permission to). However, the `LibraryController` is missing the check for admin user and thus allows a path traversal issue. Allowing non-admin users to write to any directory in the system can be seen as a form of path traversal. However, since it can be restricted to only admin permissions, fixing this is relatively simple and falls more into the realm of Role-Based Access Control (RBAC). This issue has been addressed in release version 2.13.0. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/advplyr/audiobookshelf-ghsa-gg56-vj58-g5mc/pull/1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/advplyr/audiobookshelf/blob/1c0d6e9c670ebb1b6f1e427a4c4d9250a7fb9b80/server/controllers/LibraryController.js#L43-L47",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-gg56-vj58-g5mc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43801",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:36.320",
"lastModified": "2024-09-02T18:15:36.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jellyfin is an open source self hosted media server. The Jellyfin user profile image upload accepts SVG files, allowing for a stored XSS attack against an admin user via a specially crafted malicious SVG file. When viewed by an admin outside of the Jellyfin Web UI (e.g. via \"view image\" in a browser), this malicious SVG file could interact with the browser's LocalStorage and retrieve an AccessToken, which in turn can be used in an API call to elevate the target user to a Jellyfin administrator. The actual attack vector is unlikely to be exploited, as it requires specific actions by the administrator to view the SVG image outside of Jellyfin's WebUI, i.e. it is not a passive attack. The underlying exploit mechanism is solved by PR #12490, which forces attached images (including the potential malicious SVG) to be treated as attachments and thus downloaded by browsers, rather than viewed. This prevents exploitation of the LocalStorage of the browser. This PR has been merged and the relevant code changes are included in release version 10.9.10. All users are advised to upgrade."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/jellyfin/jellyfin/pull/12490",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-vcmh-9wx9-rfqh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-44947",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-02T18:15:36.577",
"lastModified": "2024-09-02T18:15:36.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: Initialize beyond-EOF page contents before setting uptodate\n\nfuse_notify_store(), unlike fuse_do_readpage(), does not enable page\nzeroing (because it can be used to change partial page contents).\n\nSo fuse_notify_store() must be more careful to fully initialize page\ncontents (including parts of the page that are beyond end-of-file)\nbefore marking the page uptodate.\n\nThe current code can leave beyond-EOF page contents uninitialized, which\nmakes these uninitialized page contents visible to userspace via mmap().\n\nThis is an information leak, but only affects systems which do not\nenable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the\ncorresponding kernel command line parameter)."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/18a067240817bee8a9360539af5d79a4bf5398a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3c0da3d163eb32f1f91891efaade027fa9b245b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/831433527773e665bdb635ab5783d0b95d1246f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ac42e0f0eb66af966015ee33fd355bc6f5d80cd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-45305",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:36.657",
"lastModified": "2024-09-02T18:15:36.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gix-path is a crate of the gitoxide project dealing with git paths and their conversions. `gix-path` executes `git` to find the path of a configuration file that belongs to the `git` installation itself, but mistakenly treats the local repository's configuration as system-wide if no higher scoped configuration is found. In rare cases, this causes a less trusted repository to be treated as more trusted, or leaks sensitive information from one repository to another, such as sending credentials to another repository's remote. In `gix_path::env`, the underlying implementation of the `installation_config` and `installation_config_prefix` functions calls `git config -l --show-origin` and parses the first line of the output to extract the path to the configuration file holding the configuration variable of highest scope. It is believed to be very difficult to exploit this vulnerability deliberately, due to the need either to anticipate a situation in which higher-scoped configuration variables would be absent, or to arrange for this to happen. Although any operating system may be affected, users running Apple Git on macOS are much less likely to be affected. This issue has been addressed in release version 0.10.10. All users are advised to upgrade."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"references": [
{
"url": "https://git-scm.com/docs/git-config#SCOPES",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Byron/gitoxide/blob/12251eb052df30105538fa831e641eea557f13d8/gix-path/src/env/git/mod.rs#L112",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Byron/gitoxide/blob/12251eb052df30105538fa831e641eea557f13d8/gix-path/src/env/git/mod.rs#L91",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Byron/gitoxide/security/advisories/GHSA-v26r-4c9c-h3j6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45306",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:36.920",
"lastModified": "2024-09-02T18:15:36.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vim is an open source, command line text editor. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by pointing beyond the end of\na line. Back then we assumed this loop is unnecessary. However, this change made it possible that the cursor position stays invalid and points beyond the end of a line, which would eventually cause a heap-buffer-overflow when trying to access the line pointer at\nthe specified cursor position. It's not quite clear yet, what can lead to this situation that the cursor points to an invalid position. That's why patch v9.1.0707 does not include a test case. The only observed impact has been a program crash. This issue has been addressed in with the patch v9.1.0707. All users are advised to upgrade."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://github.com/vim/vim/commit/396fd1ec2956307755392a1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vim/vim/releases/tag/v9.1.0038",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vim/vim/security/advisories/GHSA-wxf9-c5gx-qrwr",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45308",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:37.150",
"lastModified": "2024-09-02T18:15:37.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HedgeDoc is an open source, real-time, collaborative, markdown notes application. When using HedgeDoc 1 with MySQL or MariaDB, it is possible to create notes with an alias matching the ID of existing notes. The affected existing note can then not be accessed anymore and is effectively hidden by the new one. When the freeURL feature is enabled (by setting the `allowFreeURL` config option or the `CMD_ALLOW_FREEURL` environment variable to `true`), any user with the appropriate permissions can create a note with an arbitrary alias, e.g. by accessing it in the browser. When MySQL or MariaDB are used, it is possible to create a new note with an alias that matches the lower-cased ID of a different note. HedgeDoc then always presents the new note to users, as these databases perform case-insensitive matching and the lower-cased alias is found first. This issue only affects HedgeDoc instances that use MySQL or MariaDB. Depending on the permission settings of the HedgeDoc instance, the issue can be exploited only by logged-in users or by all (including non-logged-in) users. The exploit requires knowledge of the ID of the target note. Attackers could use this issue to present a manipulated copy of the original note to the user, e.g. by replacing the links with malicious ones. Attackers can also use this issue to prevent access to the original note, causing a denial of service. No data is lost, as the original content of the affected notes is still present in the database. Users are advised to upgrade to version 1.10.0 which addresses this issue. Users unable to upgrade may disable freeURL mode which prevents the exploitation of this issue. The impact can also be limited by restricting freeURL note creation to trusted, logged-in users by enabling `requireFreeURLAuthentication`/`CMD_REQUIRE_FREEURL_AUTHENTICATION`."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1289"
}
]
}
],
"references": [
{
"url": "https://github.com/hedgedoc/hedgedoc/commit/380587b7fd65bc1eb71eef51a3aab324f9877650",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pjf2-269h-cx7p",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45311",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:37.373",
"lastModified": "2024-09-02T18:15:37.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. As of quinn-proto 0.11, it is possible for a server to `accept()`, `retry()`, `refuse()`, or `ignore()` an `Incoming` connection. However, calling `retry()` on an unvalidated connection exposes the server to a likely panic in the following situations: 1. Calling `refuse` or `ignore` on the resulting validated connection, if a duplicate initial packet is received. This issue can go undetected until a server's `refuse()`/`ignore()` code path is exercised, such as to stop a denial of service attack. 2. Accepting when the initial packet for the resulting validated connection fails to decrypt or exhausts connection IDs, if a similar initial packet that successfully decrypts and doesn't exhaust connection IDs is received. This issue can go undetected if clients are well-behaved. The former situation was observed in a real application, while the latter is only theoretical."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-670"
}
]
}
],
"references": [
{
"url": "https://github.com/quinn-rs/quinn/blob/bb02a12a8435a7732a1d762783eeacbb7e50418e/quinn-proto/src/endpoint.rs#L213",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/quinn-rs/quinn/commit/e01609ccd8738bd438d86fa7185a0f85598cb58f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/quinn-rs/quinn/security/advisories/GHSA-vr26-jcq5-fjj8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-45312",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:37.580",
"lastModified": "2024-09-02T18:15:37.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overleaf is a web-based collaborative LaTeX editor. Overleaf Community Edition and Server Pro prior to version 5.0.7 (or 4.2.7 for the 4.x series) contain a vulnerability that allows an arbitrary language parameter in client spelling requests to be passed to the `aspell` executable running on the server. This causes `aspell` to attempt to load a dictionary file with an arbitrary filename. File access is limited to the scope of the overleaf server. The problem is patched in versions 5.0.7 and 4.2.7. Previous versions can be upgraded using the Overleaf toolkit `bin/upgrade` command. Users unable to upgrade may block POST requests to `/spelling/check` via a Web Application Firewall will prevent access to the vulnerable spell check feature. However, upgrading is advised."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-641"
}
]
}
],
"references": [
{
"url": "https://github.com/overleaf/overleaf/commit/b5e5d39c3ad4e7763d42b837738955f8ded4dcd3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/overleaf/overleaf/security/advisories/GHSA-pxm4-p454-vppg",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/overleaf/toolkit",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-45313",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:37.850",
"lastModified": "2024-09-02T18:15:37.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overleaf is a web-based collaborative LaTeX editor. When installing Server Pro using the Overleaf Toolkit from before 2024-07-17 or legacy docker-compose.yml from before 2024-08-28, the configuration for LaTeX compiles was insecure by default, requiring the administrator to enable the security features via a configuration setting (`SIBLING_CONTAINERS_ENABLED` in Toolkit, `SANDBOXED_COMPILES` in legacy docker-compose/custom deployments). If these security features are not enabled then users have access to the `sharelatex` container resources (filesystem, network, environment variables) when running compiles, leading to multiple file access vulnerabilities, either directly or via symlinks created during compiles. The setting has now been changed to be secure by default for new installs in the Toolkit and legacy docker-compose deployment. The Overleaf Toolkit has been updated to set `SIBLING_CONTAINERS_ENABLED=true` by default for new installs. It is recommended that any existing installations using the previous default setting migrate to using sibling containers. Existing installations can set `SIBLING_CONTAINERS_ENABLED=true` in `config/overleaf.rc` as a mitigation. In legacy docker-compose/custom deployments `SANDBOXED_COMPILES=true` should be used."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/overleaf/overleaf/security/advisories/GHSA-m95q-g8qg-wgj4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/overleaf/overleaf/wiki/Server-Pro:-Sandboxed-Compiles",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/overleaf/toolkit/blob/master/doc/sandboxed-compiles.md#enabling-sibling-containers",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/overleaf/toolkit/commit/7a8401897b24777b47338452ff8d12e2fb6dd5ff",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-45388",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:38.063",
"lastModified": "2024-09-02T18:15:38.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The `/api/v2/simulation` POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server. Note that, although the code prevents absolute paths from being specified, an attacker can escape out of the `hf.Cfg.ResponsesBodyFilesPath` base path by using `../` segments and reach any arbitrary files. This issue was found using the Uncontrolled data used in path expression CodeQL query for python. Users are advised to make sure the final path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, filePath)`) is contained within the expected base path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, \"/\")`). This issue is also tracked as GHSL-2023-274."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://codeql.github.com/codeql-query-help/go/go-path-injection",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/SpectoLabs/hoverfly/releases/tag/v1.10.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/SpectoLabs/hoverfly/security/advisories/GHSA-6xx4-x46f-f897",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/spectolabs/hoverfly/blob/15d6ee9ea4e0de67aec5a41c28d21dc147243da0/core/handlers/v2/simulation_handler.go#L87",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-45621",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-02T19:15:13.073",
"lastModified": "2024-09-02T19:15:13.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Electron desktop application of Rocket.Chat through 6.3.4 allows stored XSS via links in an uploaded file, related to failure to use a separate browser upon encountering third-party external actions from PDF documents."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/RocketChat/Rocket.Chat/releases/tag/6.3.4",
"source": "cve@mitre.org"
},
{
"url": "https://hackerone.com/reports/1967109",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45622",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-02T19:15:13.170",
"lastModified": "2024-09-02T19:15:13.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ASIS (aka Aplikasi Sistem Sekolah using CodeIgniter 3) 3.0.0 through 3.2.0 allows index.php username SQL injection for Authentication Bypass."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/atoz-chevara/cve/blob/main/2024/ASIS_AplikasiSistemSekolah_Using_CodeIgniter3-SQL_Injection_Authentication_Bypass.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,85 @@
{
"id": "CVE-2024-6919",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-02T18:15:38.290",
"lastModified": "2024-09-02T18:15:38.290",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "iletisim@usom.gov.tr",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NAC Telecommunication Systems Inc. NACPremium allows Blind SQL Injection.This issue affects NACPremium: through 01082024."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "LOW",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1376",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,85 @@
{
"id": "CVE-2024-6920",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-02T18:15:38.477",
"lastModified": "2024-09-02T18:15:38.477",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "iletisim@usom.gov.tr",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NAC Telecommunication Systems Inc. NACPremium allows Stored XSS.This issue affects NACPremium: through 01082024."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NO",
"recovery": "USER",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1376",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,85 @@
{
"id": "CVE-2024-6921",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-02T18:15:38.617",
"lastModified": "2024-09-02T18:15:38.617",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "iletisim@usom.gov.tr",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cleartext Storage of Sensitive Information vulnerability in NAC Telecommunication Systems Inc. NACPremium allows Retrieve Embedded Sensitive Data.This issue affects NACPremium: through 01082024."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1376",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-02T14:00:17.150199+00:00
2024-09-02T20:00:17.822228+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-02T12:15:20.723000+00:00
2024-09-02T19:15:13.170000+00:00
```
### Last Data Feed Release
@ -33,38 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261699
261719
```
### CVEs added in the last Commit
Recently added CVEs: `27`
Recently added CVEs: `20`
- [CVE-2024-23362](CVE-2024/CVE-2024-233xx/CVE-2024-23362.json) (`2024-09-02T12:15:15.117`)
- [CVE-2024-23364](CVE-2024/CVE-2024-233xx/CVE-2024-23364.json) (`2024-09-02T12:15:15.360`)
- [CVE-2024-23365](CVE-2024/CVE-2024-233xx/CVE-2024-23365.json) (`2024-09-02T12:15:15.570`)
- [CVE-2024-33016](CVE-2024/CVE-2024-330xx/CVE-2024-33016.json) (`2024-09-02T12:15:15.793`)
- [CVE-2024-33035](CVE-2024/CVE-2024-330xx/CVE-2024-33035.json) (`2024-09-02T12:15:16.053`)
- [CVE-2024-33038](CVE-2024/CVE-2024-330xx/CVE-2024-33038.json) (`2024-09-02T12:15:16.267`)
- [CVE-2024-33042](CVE-2024/CVE-2024-330xx/CVE-2024-33042.json) (`2024-09-02T12:15:16.483`)
- [CVE-2024-33043](CVE-2024/CVE-2024-330xx/CVE-2024-33043.json) (`2024-09-02T12:15:16.713`)
- [CVE-2024-33045](CVE-2024/CVE-2024-330xx/CVE-2024-33045.json) (`2024-09-02T12:15:16.933`)
- [CVE-2024-33047](CVE-2024/CVE-2024-330xx/CVE-2024-33047.json) (`2024-09-02T12:15:17.173`)
- [CVE-2024-33048](CVE-2024/CVE-2024-330xx/CVE-2024-33048.json) (`2024-09-02T12:15:17.377`)
- [CVE-2024-33050](CVE-2024/CVE-2024-330xx/CVE-2024-33050.json) (`2024-09-02T12:15:17.593`)
- [CVE-2024-33051](CVE-2024/CVE-2024-330xx/CVE-2024-33051.json) (`2024-09-02T12:15:17.823`)
- [CVE-2024-33052](CVE-2024/CVE-2024-330xx/CVE-2024-33052.json) (`2024-09-02T12:15:18.060`)
- [CVE-2024-33054](CVE-2024/CVE-2024-330xx/CVE-2024-33054.json) (`2024-09-02T12:15:18.280`)
- [CVE-2024-33057](CVE-2024/CVE-2024-330xx/CVE-2024-33057.json) (`2024-09-02T12:15:18.503`)
- [CVE-2024-33060](CVE-2024/CVE-2024-330xx/CVE-2024-33060.json) (`2024-09-02T12:15:18.710`)
- [CVE-2024-38401](CVE-2024/CVE-2024-384xx/CVE-2024-38401.json) (`2024-09-02T12:15:18.933`)
- [CVE-2024-38402](CVE-2024/CVE-2024-384xx/CVE-2024-38402.json) (`2024-09-02T12:15:19.143`)
- [CVE-2024-38858](CVE-2024/CVE-2024-388xx/CVE-2024-38858.json) (`2024-09-02T12:15:19.370`)
- [CVE-2024-5148](CVE-2024/CVE-2024-51xx/CVE-2024-5148.json) (`2024-09-02T12:15:19.910`)
- [CVE-2024-7932](CVE-2024/CVE-2024-79xx/CVE-2024-7932.json) (`2024-09-02T12:15:20.130`)
- [CVE-2024-7938](CVE-2024/CVE-2024-79xx/CVE-2024-7938.json) (`2024-09-02T12:15:20.333`)
- [CVE-2024-7939](CVE-2024/CVE-2024-79xx/CVE-2024-7939.json) (`2024-09-02T12:15:20.530`)
- [CVE-2024-8004](CVE-2024/CVE-2024-80xx/CVE-2024-8004.json) (`2024-09-02T12:15:20.723`)
- [CVE-2020-36830](CVE-2020/CVE-2020-368xx/CVE-2020-36830.json) (`2024-09-02T18:15:20.967`)
- [CVE-2023-7279](CVE-2023/CVE-2023-72xx/CVE-2023-7279.json) (`2024-09-02T18:15:21.393`)
- [CVE-2024-28100](CVE-2024/CVE-2024-281xx/CVE-2024-28100.json) (`2024-09-02T18:15:22.770`)
- [CVE-2024-42471](CVE-2024/CVE-2024-424xx/CVE-2024-42471.json) (`2024-09-02T18:15:35.540`)
- [CVE-2024-43792](CVE-2024/CVE-2024-437xx/CVE-2024-43792.json) (`2024-09-02T18:15:35.807`)
- [CVE-2024-43797](CVE-2024/CVE-2024-437xx/CVE-2024-43797.json) (`2024-09-02T18:15:36.073`)
- [CVE-2024-43801](CVE-2024/CVE-2024-438xx/CVE-2024-43801.json) (`2024-09-02T18:15:36.320`)
- [CVE-2024-44947](CVE-2024/CVE-2024-449xx/CVE-2024-44947.json) (`2024-09-02T18:15:36.577`)
- [CVE-2024-45305](CVE-2024/CVE-2024-453xx/CVE-2024-45305.json) (`2024-09-02T18:15:36.657`)
- [CVE-2024-45306](CVE-2024/CVE-2024-453xx/CVE-2024-45306.json) (`2024-09-02T18:15:36.920`)
- [CVE-2024-45308](CVE-2024/CVE-2024-453xx/CVE-2024-45308.json) (`2024-09-02T18:15:37.150`)
- [CVE-2024-45311](CVE-2024/CVE-2024-453xx/CVE-2024-45311.json) (`2024-09-02T18:15:37.373`)
- [CVE-2024-45312](CVE-2024/CVE-2024-453xx/CVE-2024-45312.json) (`2024-09-02T18:15:37.580`)
- [CVE-2024-45313](CVE-2024/CVE-2024-453xx/CVE-2024-45313.json) (`2024-09-02T18:15:37.850`)
- [CVE-2024-45388](CVE-2024/CVE-2024-453xx/CVE-2024-45388.json) (`2024-09-02T18:15:38.063`)
- [CVE-2024-45621](CVE-2024/CVE-2024-456xx/CVE-2024-45621.json) (`2024-09-02T19:15:13.073`)
- [CVE-2024-45622](CVE-2024/CVE-2024-456xx/CVE-2024-45622.json) (`2024-09-02T19:15:13.170`)
- [CVE-2024-6919](CVE-2024/CVE-2024-69xx/CVE-2024-6919.json) (`2024-09-02T18:15:38.290`)
- [CVE-2024-6920](CVE-2024/CVE-2024-69xx/CVE-2024-6920.json) (`2024-09-02T18:15:38.477`)
- [CVE-2024-6921](CVE-2024/CVE-2024-69xx/CVE-2024-6921.json) (`2024-09-02T18:15:38.617`)
### CVEs modified in the last Commit

View File

@ -159314,6 +159314,7 @@ CVE-2020-36826,0,0,388179afbf6f414e3db2d75f0de0f20ea6cdaee7bbc177937364c633e228a
CVE-2020-36827,0,0,8898188aa97819ee831b61208ffecb850d1c02e65600a28bd33473d687839e22,2024-03-25T01:51:01.223000
CVE-2020-36828,0,0,a1b676217510ef46edc1fede0a4eb0bea0bc2e564c4e02f200c27ced72100dc7,2024-05-17T01:48:58.900000
CVE-2020-36829,0,0,fa56184e79fbe280b2933bbbe602a49d53f63fd12f0982a754bc29d86839a810,2024-08-26T20:35:00.633000
CVE-2020-36830,1,1,0396a8ecdc85e0812af85432314d686c90e6f2193f3b6027eeff626142790bb5,2024-09-02T18:15:20.967000
CVE-2020-3684,0,0,44aa34ae599eab5a673c5cc3034025c1f764a98b61a69b113aa70c68c71a7c49,2020-11-06T16:29:14.480000
CVE-2020-3685,0,0,01cf0158d1e280265cb87314ab78bb48a4960098d5e1ed486f7d5066d87b5a92,2021-01-29T23:46:03.037000
CVE-2020-3686,0,0,236df0d6a9e5b4a5d3130dbb24dece9578efd8fc6235301a045f147575f94cf1,2021-01-30T00:10:19.887000
@ -241113,6 +241114,7 @@ CVE-2023-7269,0,0,110b6fee8b2eb3cb456f239293a3205ab38d8cdb9856a830f8977329472aa4
CVE-2023-7270,0,0,c4a95bbd7a0e223852dd2f2d2c06a04667d14324aaf73c1dbbc09c6df6d4237c,2024-08-01T13:45:53.123000
CVE-2023-7271,0,0,d3dfbc895014f6fee39494b1979fe9a27f5d54abe140606ba373f42540f5c875,2024-07-26T18:19:28
CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000
CVE-2023-7279,1,1,6a1b7094d235cba05064aba41cd3331de6f56b9047ff08394a8ed81b4da89862,2024-09-02T18:15:21.393000
CVE-2024-0006,0,0,ad936d6110273ab63552e81bb6d0ac8ad8706e8706811fa2ef455d43c6091213,2024-07-22T13:00:53.287000
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
CVE-2024-0008,0,0,899bae3dea0b6932a6d046356f47764b32f025595d0eef60d8e0e433b2b04007,2024-02-15T06:23:39.303000
@ -245211,14 +245213,14 @@ CVE-2024-23354,0,0,d3fd9daa791ee33342cb497a5681a0dd81bdad9861bd30e5715b0971cd859
CVE-2024-23355,0,0,443538048515581c7c475c2aed244c6721076e6a6e9cbc6b2cf64aedf0bc1ace,2024-08-06T16:30:24.547000
CVE-2024-23356,0,0,3a6bdca58a93471eb18ce0d60730a2400b80ec470a2e8504b718b15defdb6120,2024-08-06T16:30:24.547000
CVE-2024-23357,0,0,9ef55596ed3e0f79df044f1dcf92a155fedcf3c82a69d3837fa7b14070a1b1a6,2024-08-06T16:30:24.547000
CVE-2024-23358,1,1,7e99aa47fe1e8457115e6e4191891d2ae4d5907e0ad7a7aafd9800ee1c87f3c9,2024-09-02T12:15:14.207000
CVE-2024-23359,1,1,4926dedde69c7eca46b251014e3f7c92a30b9668b96c45a4f2f5d0bfdd63be98,2024-09-02T12:15:14.890000
CVE-2024-23358,0,0,7e99aa47fe1e8457115e6e4191891d2ae4d5907e0ad7a7aafd9800ee1c87f3c9,2024-09-02T12:15:14.207000
CVE-2024-23359,0,0,4926dedde69c7eca46b251014e3f7c92a30b9668b96c45a4f2f5d0bfdd63be98,2024-09-02T12:15:14.890000
CVE-2024-2336,0,0,ee2ed99bdbb77ed98426fec739627a0e0294ad75ca24e044dbbf3ddb7c699139,2024-04-10T13:23:38.787000
CVE-2024-23360,0,0,4a7bbca8a03b30cf4df988e0f08196d33c6bd581b3c7bc61fba22b18c171830b,2024-06-03T14:46:24.250000
CVE-2024-23362,1,1,e2397b1e0a3168f806ec1126ed911deec703491f3036cd6562b5dfe75918d5de,2024-09-02T12:15:15.117000
CVE-2024-23362,0,0,e2397b1e0a3168f806ec1126ed911deec703491f3036cd6562b5dfe75918d5de,2024-09-02T12:15:15.117000
CVE-2024-23363,0,0,f3bca7930119a168b01a4f3c6a543138a5f31bd5e8f14fd6e950dfaab71bf1eb,2024-06-03T14:46:24.250000
CVE-2024-23364,1,1,df9b8c241d99c5f72f2fc2b68e9660df03bb20b63d603799d1b86ac2ce55d3a4,2024-09-02T12:15:15.360000
CVE-2024-23365,1,1,c68df2f3aff8a09b2be54c012d472f28591a3a9c03980fc5699013b00e885c94,2024-09-02T12:15:15.570000
CVE-2024-23364,0,0,df9b8c241d99c5f72f2fc2b68e9660df03bb20b63d603799d1b86ac2ce55d3a4,2024-09-02T12:15:15.360000
CVE-2024-23365,0,0,c68df2f3aff8a09b2be54c012d472f28591a3a9c03980fc5699013b00e885c94,2024-09-02T12:15:15.570000
CVE-2024-23368,0,0,5726397ddc8ddada7ad85b481081c827980e0b31f00843d9c4a575a1cdcf7c17,2024-07-02T17:51:25.690000
CVE-2024-2337,0,0,07544cbaaf25f2cf04c699ba032dfae130492c60bdcce260485571b3859c104c,2024-07-22T13:00:53.287000
CVE-2024-23372,0,0,23b270a28eac6f2e33d3cc96090d40d8bd34b2e6172d17ba5be5b87ce6bb3571,2024-07-02T17:51:04.530000
@ -248643,6 +248645,7 @@ CVE-2024-28097,0,0,1e714ff081f75be1b3ee22b5d36486d5d25c1e1c2a12f4c3670fc60e11795
CVE-2024-28098,0,0,a3390b45f79ac863f2a20b2c3ada499f63a8ad935bf5543c4181b41c5c888248,2024-05-01T17:15:30.747000
CVE-2024-28099,0,0,8f1689aeaa10ea090718a334cb7e59baeb2881501c10cf07896051b5dcb601cc,2024-08-08T20:35:06.277000
CVE-2024-2810,0,0,a6138bc48d0ad782bdb60e8557544808b5ef91a2fc4ce0cda3b3c53204635cd7,2024-05-17T02:38:31.447000
CVE-2024-28100,1,1,ccdcacc6d95d3b4964be45cda970ef0bb3ffdc018843f36380b37cdc8ec11e6e,2024-09-02T18:15:22.770000
CVE-2024-28101,0,0,a1f8d89ff6e2fe4f9ee7b88d676867a71496a3d21b3393b755ab9f1348fee98d,2024-03-21T12:58:51.093000
CVE-2024-28102,0,0,2e25e475353b428725cda7fe0e916bc49ec4c129ea0b8f2f75fa8309f53bf0d3,2024-03-21T12:58:51.093000
CVE-2024-28103,0,0,8a9e6ff0bb9d54d8ac1c9163b05fb11e82067abc5fdfd4f8ff53c9880ea54597,2024-06-11T15:27:55
@ -252079,7 +252082,7 @@ CVE-2024-33012,0,0,6bec8e2e1bfba647981f052ab5c17724366fe226fadeb1b28b5e23a459625
CVE-2024-33013,0,0,dd12ee1987fa9e354cf56279587964e6191c2ac070bc29b752ce01385c40c2cd,2024-08-06T16:30:24.547000
CVE-2024-33014,0,0,f04bf5d8881f6dc676b681fe5a9a694102271f49c6bc9dc75ec5e4fb1c32d204,2024-08-06T16:30:24.547000
CVE-2024-33015,0,0,7b39f79b4812600df1a1ec543e302b066f8a92420b20fb12d518ed3a60b97b73,2024-08-06T16:30:24.547000
CVE-2024-33016,1,1,79acf8c644081d6864a48372a023bb5f891a91896ac1f7a2e9cfee4a91a13c8e,2024-09-02T12:15:15.793000
CVE-2024-33016,0,0,79acf8c644081d6864a48372a023bb5f891a91896ac1f7a2e9cfee4a91a13c8e,2024-09-02T12:15:15.793000
CVE-2024-33018,0,0,ccfb7a544b9b0b42b0331f12d7c7dc04c90f2dfd439536a8591a89c433935ba7,2024-08-06T16:30:24.547000
CVE-2024-33019,0,0,669fb5b72a198dac6abe177477c90ddf74f79380a455b0e656fd8b19d9150195,2024-08-06T16:30:24.547000
CVE-2024-3302,0,0,10a0a5360346a347e0e1404168c46ba9e22d839c53347c2b379db8443b59f174,2024-07-03T02:06:08.953000
@ -252093,19 +252096,19 @@ CVE-2024-33026,0,0,3671e942d2aeb41bfb7f62fd29e325ae60ce9baa2cf48f9be146a90264333
CVE-2024-33027,0,0,bd2c06e6e5460d0c2b3cbc98be298fdb0c7f1aedeea8f228cd2bf5b28824f6f4,2024-08-06T16:30:24.547000
CVE-2024-33028,0,0,22aed6de0f27361dc8e70a55b1b3dd44b1f0ef9bde61d7da281ae82bdce6093c,2024-08-06T16:30:24.547000
CVE-2024-33034,0,0,57f83e586154e561ed8bcfec80a444eed413f76bf7b39e00ede5e61942c83044,2024-08-06T16:30:24.547000
CVE-2024-33035,1,1,60dd09eb6dc39e580aa83fd6749421bb2a8a9e63c08a6d2dab078e5ff35d5fa9,2024-09-02T12:15:16.053000
CVE-2024-33038,1,1,ce6cc9762b3fd310c359fbf62296748d96bf5c5f27693f3a73262b6d30d829ed,2024-09-02T12:15:16.267000
CVE-2024-33042,1,1,04d7c065c7c4fbc566da7d6bc39cf6d32a5313d969957e1c13febcd0460c54d9,2024-09-02T12:15:16.483000
CVE-2024-33043,1,1,6f4c537e8bbf9dcb7057a050a9235f3250edc496f985704313047919a89f27d1,2024-09-02T12:15:16.713000
CVE-2024-33045,1,1,af190c19e8ba1eb9269594bf3472fb9ea0b48411242c5a2cb68cc1a1f5900bb5,2024-09-02T12:15:16.933000
CVE-2024-33047,1,1,83e6b7a66d40a4803b6062cfe284f1553d2ec4e966ad023d0fb016e8f722fff5,2024-09-02T12:15:17.173000
CVE-2024-33048,1,1,a536089beb45b3bba1c50268e31fb4a05d236568c389e541df9c191af1f4c71a,2024-09-02T12:15:17.377000
CVE-2024-33050,1,1,31502fd0c63d85e1309e98e63c25cc066f7fbe6927e0a94332132c5e237e654a,2024-09-02T12:15:17.593000
CVE-2024-33051,1,1,7e4e090cb2e33c382256dd94c90bea1bc7310f2f96b07cc07ddac4e65530a822,2024-09-02T12:15:17.823000
CVE-2024-33052,1,1,71b714deb2e554a1aa82944e74a8e489ed4709ee72ff276b2ac5a3b07856c738,2024-09-02T12:15:18.060000
CVE-2024-33054,1,1,87a82e82310b537ffdb4f80179337d772450404d54db28ede87d940b05f87692,2024-09-02T12:15:18.280000
CVE-2024-33057,1,1,7d94e665707cfabbd2683b1b538fb38d021d3f319b291f505e080b5642b247b1,2024-09-02T12:15:18.503000
CVE-2024-33060,1,1,5de60a8d4e555891abebf5a53516910464512e316ef1f8f696416403bc00a2eb,2024-09-02T12:15:18.710000
CVE-2024-33035,0,0,60dd09eb6dc39e580aa83fd6749421bb2a8a9e63c08a6d2dab078e5ff35d5fa9,2024-09-02T12:15:16.053000
CVE-2024-33038,0,0,ce6cc9762b3fd310c359fbf62296748d96bf5c5f27693f3a73262b6d30d829ed,2024-09-02T12:15:16.267000
CVE-2024-33042,0,0,04d7c065c7c4fbc566da7d6bc39cf6d32a5313d969957e1c13febcd0460c54d9,2024-09-02T12:15:16.483000
CVE-2024-33043,0,0,6f4c537e8bbf9dcb7057a050a9235f3250edc496f985704313047919a89f27d1,2024-09-02T12:15:16.713000
CVE-2024-33045,0,0,af190c19e8ba1eb9269594bf3472fb9ea0b48411242c5a2cb68cc1a1f5900bb5,2024-09-02T12:15:16.933000
CVE-2024-33047,0,0,83e6b7a66d40a4803b6062cfe284f1553d2ec4e966ad023d0fb016e8f722fff5,2024-09-02T12:15:17.173000
CVE-2024-33048,0,0,a536089beb45b3bba1c50268e31fb4a05d236568c389e541df9c191af1f4c71a,2024-09-02T12:15:17.377000
CVE-2024-33050,0,0,31502fd0c63d85e1309e98e63c25cc066f7fbe6927e0a94332132c5e237e654a,2024-09-02T12:15:17.593000
CVE-2024-33051,0,0,7e4e090cb2e33c382256dd94c90bea1bc7310f2f96b07cc07ddac4e65530a822,2024-09-02T12:15:17.823000
CVE-2024-33052,0,0,71b714deb2e554a1aa82944e74a8e489ed4709ee72ff276b2ac5a3b07856c738,2024-09-02T12:15:18.060000
CVE-2024-33054,0,0,87a82e82310b537ffdb4f80179337d772450404d54db28ede87d940b05f87692,2024-09-02T12:15:18.280000
CVE-2024-33057,0,0,7d94e665707cfabbd2683b1b538fb38d021d3f319b291f505e080b5642b247b1,2024-09-02T12:15:18.503000
CVE-2024-33060,0,0,5de60a8d4e555891abebf5a53516910464512e316ef1f8f696416403bc00a2eb,2024-09-02T12:15:18.710000
CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000
CVE-2024-33078,0,0,32899b4391f10b7cbfcaee5abff907eff95c8894218149b7342d82053a7e337b,2024-08-01T13:51:41.723000
CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610fc,2024-05-02T18:00:37.360000
@ -255630,8 +255633,8 @@ CVE-2024-38394,0,0,4144cb185c34fe25a28109cad04fb4f27c8fbde291d856b148c8ebd597877
CVE-2024-38395,0,0,200f7eb17515a405ff37cc6fccc1c826c560846e0c0625cd687aedb08987a6c9,2024-07-03T02:04:58.833000
CVE-2024-38396,0,0,5f72717de89283d9d02d4a6b5fda996e5c7ff361cf439906862ebb83e84bfcdf,2024-07-03T02:04:59.670000
CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000
CVE-2024-38401,1,1,d316f61b9a1dcf6ecb5975f6a5ea75c8f47a289689902f0827cd9939c22ab4a4,2024-09-02T12:15:18.933000
CVE-2024-38402,1,1,185c861e39517f5ac0cf17024efb4b0c384b43507415124c11b02cbd7b4240bd,2024-09-02T12:15:19.143000
CVE-2024-38401,0,0,d316f61b9a1dcf6ecb5975f6a5ea75c8f47a289689902f0827cd9939c22ab4a4,2024-09-02T12:15:18.933000
CVE-2024-38402,0,0,185c861e39517f5ac0cf17024efb4b0c384b43507415124c11b02cbd7b4240bd,2024-09-02T12:15:19.143000
CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
CVE-2024-38428,0,0,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000
@ -255965,7 +255968,7 @@ CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045f
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38858,1,1,4e0534ac82ef8e0b5afe32ea3a54b46c55354eb370332046ff647549e2f8a12f,2024-09-02T12:15:19.370000
CVE-2024-38858,0,0,4e0534ac82ef8e0b5afe32ea3a54b46c55354eb370332046ff647549e2f8a12f,2024-09-02T12:15:19.370000
CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000
CVE-2024-3886,0,0,32ede4456a4ddb6db7c3453d25beda4c9751e9335da840bc98f3ff533375804e,2024-08-31T05:15:13.353000
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
@ -257947,6 +257950,7 @@ CVE-2024-42468,0,0,20ab5d9f17a6b01a0da06bad1509e9a4dc8119cebd6158ac0abf8cefec4df
CVE-2024-42469,0,0,30cb7e23c62f8ac5ce9bc45ebb27cbde0a399d6ba51c92609f7c3b2c2f4965cc,2024-08-12T13:41:36.517000
CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000
CVE-2024-42470,0,0,ba1121ba4123cc21b3c9eb920545b590c6cd45b604c8e84823a57bd68abf8f95,2024-08-12T13:41:36.517000
CVE-2024-42471,1,1,7bba5960d70a825bacb4da75f2e0d1144d2d7b28a085b8a510cf398242e38a62,2024-09-02T18:15:35.540000
CVE-2024-42472,0,0,7ab57564efdc72933310d3a5f9856c0205ef1bb0a8b6f4b7c4270b076011eb97,2024-08-19T13:00:23.117000
CVE-2024-42473,0,0,4c7c671ee00009c6a5c03d538a956eb7febcd1530231ce4a9c79893c5aea342c,2024-08-12T13:41:36.517000
CVE-2024-42474,0,0,8bdabf0a099aefc7c5946b1cf60e652841fbf036714db582cc2880ddd6217050,2024-08-12T18:57:17.383000
@ -258503,8 +258507,11 @@ CVE-2024-43788,0,0,6f75ff333beaf8829a6a1bc6651ce3043a53e6a3c4b202b90d5574c9a5264
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000
CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8e37,2024-08-23T16:18:28.547000
CVE-2024-43792,1,1,614a30bcf7d93b0b23800f4531b4aeb766795c1a3ba836f30bb07a66ae7e3058,2024-09-02T18:15:35.807000
CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59df9c,2024-08-23T18:46:31.730000
CVE-2024-43797,1,1,5ca7c12262beb782fe4328c890f7f5918658f1105ce66cf043f7c6be3229963f,2024-09-02T18:15:36.073000
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
CVE-2024-43801,1,1,68d7c3a8081d8418725e9109baf4b31f4373682725915194a5f33963b680ab59,2024-09-02T18:15:36.320000
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
CVE-2024-43804,0,0,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000
CVE-2024-43805,0,0,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000
@ -258815,6 +258822,7 @@ CVE-2024-44943,0,0,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2
CVE-2024-44944,0,0,2311e8e140052a8ffceda234565ab592ce1eef31ad86de13e1707e1e1dd9a467,2024-08-30T13:00:05.390000
CVE-2024-44945,0,0,b9925d61818b0f13538430fa3fa098f09fe3d38e458b14d49416d01436c660e9,2024-08-31T07:15:03.760000
CVE-2024-44946,0,0,d9f2fb39169b8e252339022a2c24ef3f9dbe59fc8bb83ae8d86d1e665239a7b9,2024-08-31T14:15:04.320000
CVE-2024-44947,1,1,f5636152ad93891c30c4207303534f4f67a9b11f9864ee9e9d66bd5508c686ed,2024-09-02T18:15:36.577000
CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000
CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000
CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000
@ -258898,7 +258906,13 @@ CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000
CVE-2024-45304,0,0,2811e9f38bc7892eb0fc0965a89204afc4f442c1be052bb6f0dd2af1553279a3,2024-08-31T00:15:05.493000
CVE-2024-45305,1,1,e8f59091af16393188d19efaf5540326c0efebed1b278d05a15ed8ac3a995d5f,2024-09-02T18:15:36.657000
CVE-2024-45306,1,1,e6bcd0f6dee63be34e96efa485829d90af222f6a6dda7b3d7ee8b1aa5b1f830e,2024-09-02T18:15:36.920000
CVE-2024-45308,1,1,c4d706d4535b85344baae62bf3918946d70e8b57bbeb9803369b76d24fac77ff,2024-09-02T18:15:37.150000
CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000
CVE-2024-45311,1,1,31d50b504410232587872454676a92a1646e6df8f87f7dbd2212c7f664e9d6fe,2024-09-02T18:15:37.373000
CVE-2024-45312,1,1,17f43b91321a08383bf76e3f2518bfb48084b4359e0dae38a950263150b3db45,2024-09-02T18:15:37.580000
CVE-2024-45313,1,1,958ec9c3f70cf60690fb50669e4b5f7c5a10d28d35a74e165672dad42d8ea179,2024-09-02T18:15:37.850000
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
@ -258908,6 +258922,7 @@ CVE-2024-4535,0,0,87b4b5e0787ea182ddd9c6fa8e26c59b6c616e4e57e592ee0d6f169678ff9b
CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d1723500,2024-05-07T13:39:32.710000
CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000
CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000
CVE-2024-45388,1,1,13cc049417fde93175b45fb2c169078e5adf964a03166ef2e8d6951c3aa20a96,2024-09-02T18:15:38.063000
CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
@ -258943,6 +258958,8 @@ CVE-2024-4559,0,0,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa045
CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000
CVE-2024-45621,1,1,0b120d0ed61ccec663a0d1e80b0f5c072f370ac2ff33012ab2b7a02d0113b491,2024-09-02T19:15:13.073000
CVE-2024-45622,1,1,a9b592efeff8e6f8d35d152c5fc6c7a2397aad7d98377f2200f908ad9781c741,2024-09-02T19:15:13.170000
CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000
CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000
CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000
@ -259456,7 +259473,7 @@ CVE-2024-5143,0,0,e21a987518c06589a6da36e0d35257f005aa787fff502677dfeaefae4b228c
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000
CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000
CVE-2024-5148,1,1,75a8d9519de340e0ba0a288093d0449a09066fc4d932b1b1ad9aa7acc369ac95,2024-09-02T12:15:19.910000
CVE-2024-5148,0,0,75a8d9519de340e0ba0a288093d0449a09066fc4d932b1b1ad9aa7acc369ac95,2024-09-02T12:15:19.910000
CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000
CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000
CVE-2024-5151,0,0,b696148b4b4d31279fb07ba468cbee496fd48b395a603a703c253d2f424d78b8,2024-08-01T13:59:41.310000
@ -260849,6 +260866,9 @@ CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f767
CVE-2024-6916,0,0,c704088f9dee3dcd44639fed9c5b3af47a62dc7a88e4f3c99631e528254d2a2b,2024-08-23T13:44:38.453000
CVE-2024-6917,0,0,4e02075ee95758cd510fbf6b3750273e9262615bb77e37c7873232af68d2c294,2024-08-13T17:14:51.100000
CVE-2024-6918,0,0,12d78a0add3426ad16ea6912a9097e8912d0223c4f1b31c268f35e0cd50f94e8,2024-08-20T15:44:20.567000
CVE-2024-6919,1,1,8a995eef232a9963fb5edfcab7d39a2efaf6e370b3906e4516ccecc857741a4d,2024-09-02T18:15:38.290000
CVE-2024-6920,1,1,f9874927c823658f6714dc8e317b4ec0f7612a5bbf013ecb23e94c4f4828e3c5,2024-09-02T18:15:38.477000
CVE-2024-6921,1,1,87fb7e409032abc88f5055b14723b4caae9108ad366ee9fd8ce18222d7a81ceb,2024-09-02T18:15:38.617000
CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000
CVE-2024-6923,0,0,5f80c19d7aba57d9ca3502e05808684f0f6d62047a1b2b6de15ae6be51d0a228,2024-08-07T15:15:56.337000
CVE-2024-6927,0,0,c6c32d7d70ee084dae2db926c974bf0a3365e62a1e0657f5800453d990661577,2024-08-29T20:37:07.310000
@ -261499,14 +261519,14 @@ CVE-2024-7928,0,0,671a039a8258001c6ef11e23ca79fcb6be7f38f136ccb6e85345eff1e57a63
CVE-2024-7929,0,0,a805877edcd3cdd34f9befcb94d499b15f392a2db9c65471420306feafc6b5f3,2024-08-21T14:10:01.937000
CVE-2024-7930,0,0,100658e5f06d4675f601c6d01184159576ab92141783db14fc9e9c2655e99e3e,2024-08-21T14:09:28.830000
CVE-2024-7931,0,0,863f45f588d3a95c5820542bfd54aa0c5198b18b9403ddeaa589881d711878b9,2024-08-21T14:08:54.820000
CVE-2024-7932,1,1,e02395816e4f1d8fb0369ac8b1d705dff823e48cd847f0b91394813c30e333cc,2024-09-02T12:15:20.130000
CVE-2024-7932,0,0,e02395816e4f1d8fb0369ac8b1d705dff823e48cd847f0b91394813c30e333cc,2024-09-02T12:15:20.130000
CVE-2024-7933,0,0,4c4d1784cb4756567970ab7962609b658773d623a89ad02de59731f72704024d,2024-08-23T19:53:54.260000
CVE-2024-7934,0,0,378bcc55a3df62e429d1f101d54479de592e8336c09692e7e3a6942b8872bbc5,2024-08-23T19:54:37.790000
CVE-2024-7935,0,0,de5faf49db18a7840e6f8ddda5ba5a34ca6452592345acf93a6a1be43f2a05c7,2024-08-23T19:52:06.570000
CVE-2024-7936,0,0,cf4365fe1d0752346fd362041feab4848729c5ce67cb542c05b95010d5242c1e,2024-08-20T15:44:20.567000
CVE-2024-7937,0,0,bfd626110b4738097d3eecc17d410635b5492a7f6c8b4af76523530d264a7d87,2024-08-20T15:44:20.567000
CVE-2024-7938,1,1,a4e7bf5ac198ee0f44bacfeac28d560cfba192ead41a9c6495a7f23b70c1e5e6,2024-09-02T12:15:20.333000
CVE-2024-7939,1,1,e2615ba867aa9061dd594c74cce521bd05df2b0d8233fb124fce2560327f3913,2024-09-02T12:15:20.530000
CVE-2024-7938,0,0,a4e7bf5ac198ee0f44bacfeac28d560cfba192ead41a9c6495a7f23b70c1e5e6,2024-09-02T12:15:20.333000
CVE-2024-7939,0,0,e2615ba867aa9061dd594c74cce521bd05df2b0d8233fb124fce2560327f3913,2024-09-02T12:15:20.530000
CVE-2024-7940,0,0,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
CVE-2024-7941,0,0,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
CVE-2024-7942,0,0,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b06,2024-08-20T15:44:20.567000
@ -261542,7 +261562,7 @@ CVE-2024-7988,0,0,31ba418bb216f0cdf4aa0ee92a25e534a5433a935c38bab3a1d21f5262b5de
CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
CVE-2024-8004,1,1,92222b04091d3c0e48db7d16de9a613fe3855806afc71fa15a406f8a0fc14725,2024-09-02T12:15:20.723000
CVE-2024-8004,0,0,92222b04091d3c0e48db7d16de9a613fe3855806afc71fa15a406f8a0fc14725,2024-09-02T12:15:20.723000
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
CVE-2024-8006,0,0,6569577c342c07777a5e576339299d37ad8f48048f7b5cee69bf3eca358e397f,2024-08-31T00:15:05.743000
CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68f8,2024-08-23T17:06:04.643000

Can't render this file because it is too large.