diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40277.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40277.json index 0d0b618c0bf..2d2dba56990 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40277.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40277.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40277", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T01:15:44.850", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-19T20:35:00.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en OpenClinic GA 5.247.01. Se ha descubierto una vulnerabilidad de Cross-Site Scripting (XSS) Reflejado en el par\u00e1metro de mensaje login.jsp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/BugBountyHunterCVE/CVE-2023-40277/blob/main/CVE-2023-40277_Reflected-XSS_OpenClinic-GA_5.247.01_Report.md", diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46914.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46914.json index 1eb784638d3..3a03359cb83 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46914.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46914.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46914", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T09:15:15.633", - "lastModified": "2024-02-14T19:27:09.817", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T20:35:01.527", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52889.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52889.json index 134d9810ad1..134e8b8801a 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52889.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52889.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52889", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:07.073", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T21:19:16.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: apparmor: corrige la deref del puntero nulo al recibir skb durante la creaci\u00f3n del calcet\u00edn. El siguiente p\u00e1nico se observa al recibir paquetes ICMP con la marca de seguridad configurada mientras se crea un socket ICMP sin formato. SK_CTX(sk)->label se actualiza en apparmor_socket_post_create(), pero el paquete se entrega al socket antes de eso, lo que provoca la desreferencia del puntero nulo. Descarte el paquete si el contexto de la etiqueta no est\u00e1 establecido. ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 000000000000004c #PF: acceso de lectura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0000) - p\u00e1gina no presente PGD 0 P4D 0 Ups: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 407 Comm: a.out No contaminado 6.4.12-arch1-1 #1 3e6fa2753a2d75925c34ecb78e22e85a65d083df Nombre del hardware: VMware, Inc. Plataforma virtual VMware/Plataforma de referencia de escritorio 440BX, BIOS 6.00 28/05/2020 RIP 0010:aa_label_ siguiente_confinado+0xb/0x40 C\u00f3digo: 00 00 48 89 ef e8 d5 25 0c 00 e9 66 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 89 f0 > 77 4c 39 c6 7e 1f 48 63 d0 48 8d 14 d7 eb 0b 83 c0 01 48 83 c2 RSP: 0018:ffffa92940003b08 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 000 RCX: 000000000000000e RDX: ffffa92940003be8 RSI: 0000000000000000 RDI: 00000000000000000 RBP: ffff8b57471e7800 R08: ffff8b574c642400 R09: 0000000000000002 R10: ffffffffbd820eeb R11: ffffffffbeb7ff00 R12: ffff8b574c642400 R13: 00000000000000001 R14: 0000000000000001 R15: 00000000000 FS: 00007fb092ea7640(0000) GS:ffff8b577bc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 000000000000004c CR3: 00000001020f2005 CR4: 00000000007706f0 PKRU: 55555554 Seguimiento de llamadas: ? __morir+0x23/0x70 ? page_fault_oops+0x171/0x4e0? exc_page_fault+0x7f/0x180? asm_exc_page_fault+0x26/0x30? aa_label_next_confined+0xb/0x40 apparmor_secmark_check+0xec/0x330 seguridad_sock_rcv_skb+0x35/0x50 sk_filter_trim_cap+0x47/0x250 sock_queue_rcv_skb_reason+0x20/0x60 raw_rcv+0x13c/0x210 local_deliver+0x1f3/0x250 ip_protocol_deliver_rcu+0x4f/0x2f0 ip_local_deliver_finish+0x76/0xa0 __netif_receive_skb_one_core+0x89/0xa0 netif_receive_skb+0x119/0x170? __netdev_alloc_skb+0x3d/0x140 vmxnet3_rq_rx_complete+0xb23/0x1010 [vmxnet3 56a84f9c97178c57a43a24ec073b45a9d6f01f3a] vmxnet3_poll_rx_only+0x36/0xb0 [vmxnet3 56 a84f9c97178c57a43a24ec073b45a9d6f01f3a] __napi_poll+0x28/0x1b0 net_rx_action+0x2a4/0x380 __do_softirq+0xd1/0x2c8 __irq_exit_rcu+0xbb/0xf0 common_interrupt+0x86/0xa0 asm_common_interrupt+0x26/0x40 RIP: 0010:apparmor_socket_post_create+0xb/0x200 C\u00f3digo: 08 48 85 ff 75 a1 eb b1 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 <55> 48 89 fd 53 45 85 c0 0f 84 b2 00 00 00 48 8b 1d 80 56 3f 02 48 RSP: 0018:ffffa92940ce7e50 EFLAGS: 00000286 RAX: ffffffffbc756440 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000003 RSI: 0000000000000002 RDI: ffff8b574eaab740 RBP: 0000000000000001 R08: 000000000000 R09: 0000000000000000 R10: ffff8b57444cec70 R11: 0000000000000000 R12: 00000000000000003 R13: 0000000000000002 R14: 74eaab740 R15: fffffffbd8e4748 ? __pfx_apparmor_socket_post_create+0x10/0x10 security_socket_post_create+0x4b/0x80 __sock_create+0x176/0x1f0 __sys_socket+0x89/0x100 __x64_sys_socket+0x17/0x20 do_syscall_64+0x5d/0x 90? do_syscall_64+0x6c/0x90? do_syscall_64+0x6c/0x90? do_syscall_64+0x6c/0x90 entrada_SYSCALL_64_after_hwframe+0x72/0xdc" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0abe35bc48d4ec80424b1f4b3560c0e082cbd5c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/290a6b88e8c19b6636ed1acc733d1458206f7697", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/347dcb84a4874b5fb375092c08d8cc4069b94f81", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46c17ead5b7389e22e7dc9903fd0ba865d05bda2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c920754f62cefc63fccdc38a062c7c3452e2961", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ead2ad1d9f045f26fdce3ef1644913b3a6cd38f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fce09ea314505a52f2436397608fa0a5d0934fb1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json index db5771c2a87..7a6c6730984 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24004", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T00:15:56.550", - "lastModified": "2024-02-09T02:10:07.263", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T21:35:02.860", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24024.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24024.json index 9cf48549575..acd019fbcde 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24024.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24024", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T01:15:27.113", - "lastModified": "2024-02-10T04:00:58.077", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T20:35:02.680", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24156.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24156.json index 42e54911886..4c3a86eaf72 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24156.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24156.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24156", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-16T06:15:13.547", - "lastModified": "2024-03-17T22:38:29.433", + "lastModified": "2024-08-19T20:35:03.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en Gnuboard g6 antes de el commit de Github 58c737a263ac0c523592fd87ff71b9e3c07d7cf5, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro wr_content." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/gnuboard/g6/issues/316", diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24202.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24202.json index 6ce83ed1a66..7d576356149 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24202.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24202", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T05:15:08.593", - "lastModified": "2024-02-15T15:24:30.247", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T20:35:04.473", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24213.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24213.json index 7e33d051a33..a7efc31cb59 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24213.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24213.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24213", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T18:15:08.237", - "lastModified": "2024-08-02T00:15:16.890", + "lastModified": "2024-08-19T20:35:05.230", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24386.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24386.json index 2c1fe158d06..9a0ec75e96d 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24386.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24386.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24386", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-15T08:15:46.497", - "lastModified": "2024-02-15T14:28:31.380", + "lastModified": "2024-08-19T21:35:04.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en VitalPBX v.3.2.4-5 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en la carpeta /var/lib/vitalpbx/scripts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://erickduarte.notion.site/VitalPBX-3-2-4-5-ee402173241c493687aa22ec60160c67?pvs=4", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25190.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25190.json index 1f7dc1bdcbf..5e069f515bd 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25190.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25190.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25190", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T17:15:11.013", - "lastModified": "2024-02-15T05:03:08.533", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T20:35:06.090", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25466.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25466.json index c26b9232659..4490ad423bf 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25466.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25466.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25466", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-16T09:15:08.663", - "lastModified": "2024-02-16T13:37:51.433", + "lastModified": "2024-08-19T20:35:06.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Directory Traversal en React Native Document Picker anterior a v.9.1.1 y corregida en v.9.1.1 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el componente de librer\u00eda de Android." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-26" + } + ] + } + ], "references": [ { "url": "https://github.com/FixedOctocat/CVE-2024-25466/tree/main", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25503.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25503.json index 9d90432cf01..e1d7048ed39 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25503.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25503.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25503", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T08:15:06.747", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-08-19T20:35:07.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en Advanced REST Client v.17.0.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el par\u00e1metro de edici\u00f3n de detalles de la funci\u00f3n New Project." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/EQSTLab/PoC/tree/main/2024/XSS/CVE-2024-25503", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25828.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25828.json index fe0e39f7004..3740b8f95aa 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25828.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25828", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T16:15:54.100", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-19T21:35:05.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "cmseasy V7.7.7.9 tiene una vulnerabilidad de eliminaci\u00f3n de archivos arbitrarios en lib/admin/template_admin.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-27" + } + ] + } + ], "references": [ { "url": "https://github.com/sec-Kode/cve", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25858.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25858.json index 486bd847396..69b725a1a08 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25858.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25858.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25858", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T21:15:09.030", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-08-19T21:35:05.770", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En Foxit PDF Reader anterior a 2024.1 y PDF Editor anterior a 2024.1, la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de JavaScript podr\u00eda ocurrir debido a un mensaje emergente no optimizado para que los usuarios revisen los par\u00e1metros de los comandos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://www.foxit.com/support/security-bulletins.html", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27569.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27569.json index 9e630cfaa67..e5ca22ee27a 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27569.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27569.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27569", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.213", - "lastModified": "2024-03-01T15:23:36.177", + "lastModified": "2024-08-19T20:35:08.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro ApCliSsid en la funci\u00f3n init_nvram. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/init_nvram.md", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28089.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28089.json index 92162f21dec..7f03e3cc872 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28089.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28089.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28089", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-09T07:15:09.577", - "lastModified": "2024-03-11T01:32:29.610", + "lastModified": "2024-08-19T20:35:09.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los dispositivos Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 permiten a un atacante remoto dentro de la proximidad de Wi-Fi (que tiene acceso al panel de administraci\u00f3n del router) realizar un ataque XSS almacenado basado en DOM que puede recuperar recursos remotos. El payload se ejecuta en index.html#advanced_location (tambi\u00e9n conocida como la p\u00e1gina Ubicaci\u00f3n del dispositivo). Esto puede provocar una denegaci\u00f3n de servicio o dar lugar a la divulgaci\u00f3n de informaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-28089", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28319.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28319.json index 7b12b2181d3..f1b5c43007d 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28319.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28319.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28319", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T15:15:09.020", - "lastModified": "2024-03-15T16:26:49.320", + "lastModified": "2024-08-19T20:35:09.997", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/issues/2763", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29386.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29386.json index 6afa60a3b8d..e60934f6c6d 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29386.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29386.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29386", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T20:15:08.837", - "lastModified": "2024-04-05T12:40:52.763", + "lastModified": "2024-08-19T20:35:10.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que projeqtor hasta 11.2.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente /view/criticalResourceExport.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://cve.anas-cherni.me/2024/04/04/cve-2024-29386/", diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29515.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29515.json index 6ccfdf214df..c9011a888be 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29515.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29515.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29515", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T19:15:59.190", - "lastModified": "2024-03-26T12:55:05.010", + "lastModified": "2024-08-19T20:35:11.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de carga de archivos en lepton v.7.1.0 permite a atacantes remotos autenticados ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado en los componentes save.php y config.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/zzq66/cve7/", diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30420.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30420.json index c2b17ebc53f..6ef2f8783c0 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30420.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30420.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30420", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-22T05:15:52.983", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-08-19T20:35:12.223", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12 y en las versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32. Si se explota esta vulnerabilidad, un usuario con privilegios de administrador o superiores que pueda iniciar sesi\u00f3n en el producto puede obtener archivos arbitrarios en el servidor e informaci\u00f3n en el servidor interno que no se divulga al p\u00fablico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json index c1d89258766..7e35222b4c5 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30570", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T13:16:02.563", - "lastModified": "2024-08-01T13:50:10.667", + "lastModified": "2024-08-19T20:35:12.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una fuga de informaci\u00f3n en debuginfo.htm de Netgear R6850 v1.1.0.88 permite a los atacantes obtener informaci\u00f3n confidencial sin necesidad de autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30603.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30603.json index b4963fc085e..560416f5bb1 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30603.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30603.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30603", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T15:15:46.787", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-19T20:35:13.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro URL de la funci\u00f3n saveParentControlInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30621.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30621.json index 28c29a39f97..8ace293e797 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30621.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30621.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30621", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T14:15:08.213", - "lastModified": "2024-04-08T22:48:53.950", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T20:35:13.943", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30629.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30629.json index 53ce5adda8a..0eba4fa850e 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30629.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30629.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30629", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T13:15:16.223", - "lastModified": "2024-03-29T13:28:22.880", + "lastModified": "2024-08-19T20:35:14.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro list1 de la funci\u00f3n fromDhcpListClient." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_list1.md", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30891.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30891.json index 81b260b66ed..67955185ad9 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30891.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30891.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30891", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-05T08:15:07.800", - "lastModified": "2024-04-05T12:40:52.763", + "lastModified": "2024-08-19T20:35:15.447", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en /goform/exeCommand en Tenda AC18 v15.03.05.05, que permite a los atacantes construir par\u00e1metros cmdinput para la ejecuci\u00f3n de comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/Lantern-r/IoT-vuln/blob/main/Tenda/AC18/formexeCommand.md", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31503.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31503.json index f3a804e68fc..e350d50da17 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31503.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31503.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31503", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T00:15:07.220", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-08-19T21:35:06.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en las versiones 19.0.0 y anteriores de Dolibarr ERP CRM permite a atacantes autenticados robar cookies de sesi\u00f3n de los usuarios v\u00edctimas y tokens de protecci\u00f3n CSRF a trav\u00e9s de la interacci\u00f3n del usuario con una p\u00e1gina web manipulada, lo que lleva a la apropiaci\u00f3n de cuentas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-31503.md", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34743.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34743.json index 166a58bd208..0d311aa48e4 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34743.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34743.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34743", "sourceIdentifier": "security@android.com", "published": "2024-08-15T22:15:06.957", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-08-19T20:35:16.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En setTransactionState de SurfaceFlinger.cpp, existe una forma posible de realizar tapjacking debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/native/+/3f85323b27d95a57bfa87cbf68dd4a143f9f88ad", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json new file mode 100644 index 00000000000..eab91118e0d --- /dev/null +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-35538", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-19T21:15:09.850", + "lastModified": "2024-08-19T21:15:09.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Typecho v1.3.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as value of X-Forwarded-For or Client-Ip headers while performing HTTP requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/", + "source": "cve@mitre.org" + }, + { + "url": "https://typecho.org", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35539.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35539.json new file mode 100644 index 00000000000..561ced25b89 --- /dev/null +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35539.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-35539", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-19T21:15:09.913", + "lastModified": "2024-08-19T21:15:09.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Typecho v1.3.0 was discovered to contain a race condition vulnerability in the post commenting function. This vulnerability allows attackers to post several comments before the spam protection checks if the comments are posted too frequently." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/", + "source": "cve@mitre.org" + }, + { + "url": "https://typecho.org", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json index a5cf71ba877..f2deffe4773 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39241", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.447", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T21:06:05.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en skycaiji 2.8 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de /admin/tool/preview." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:skycaiji:skycaiji:2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "F13E24D0-29A8-4E07-8959-FEDC7DB77128" + } + ] + } + ] + } + ], "references": [ { "url": "https://fushuling.com/index.php/2024/06/19/test3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39242.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39242.json index 604a07f7fdf..1134fc8488b 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39242.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39242.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39242", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.527", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T21:06:24.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": " Una vulnerabilidad de Cross Site Scripting (XSS) en skycaiji v2.8 permite a los atacantes ejecutar scripts web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado utilizando eval(String.fromCharCode())." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:skycaiji:skycaiji:2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "F13E24D0-29A8-4E07-8959-FEDC7DB77128" + } + ] + } + ] + } + ], "references": [ { "url": "https://fushuling.com/index.php/2024/06/13/test2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39463.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39463.json index 5cc60ffec37..e37b59055c6 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39463.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39463", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:14.760", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T21:01:55.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,108 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: 9p: agregar bloqueo faltante al tomar la lista de fid de dentry. Se corrigi\u00f3 un use-after-free en la lista de fid d_fsdata de dentry cuando un subproceso busca un fid a trav\u00e9s de dentry mientras otro subproceso lo desvincula: UAF hilo: refcount_t: suma en 0; use-after-free. p9_fid_get linux/./include/net/9p/client.h:262 v9fs_fid_find+0x236/0x280 linux/fs/9p/fid.c:129 v9fs_fid_lookup_with_uid linux/fs/9p/fid.c:181 v9fs_fid_lookup+0xbf/0xc20 Linux /fs/9p/fid.c:314 v9fs_vfs_getattr_dotl+0xf9/0x360 linux/fs/9p/vfs_inode_dotl.c:400 vfs_statx+0xdd/0x4d0 linux/fs/stat.c:248 Liberado por: p9_fid_destroy (en l\u00ednea) desconocido+0xb0 /0xe0 linux/net/9p/client.c:1456 p9_fid_put linux/./include/net/9p/client.h:278 v9fs_dentry_release+0xb5/0x140 linux/fs/9p/vfs_dentry.c:55 v9fs_remove+0x38f/0x620 linux/fs/9p/vfs_inode.c:518 vfs_unlink+0x29a/0x810 linux/fs/namei.c:4335 El problema es que no se accedi\u00f3 a d_fsdata bajo d_lock, porque normalmente d_release() solo se llama una vez que dentry no est\u00e1 disponible. ya no es accesible, pero como tambi\u00e9n lo llamamos expl\u00edcitamente en v9fs_remove, ese bloqueo es necesario: mueva la hlist fuera del dentry bajo bloqueo y luego elimine la referencia de sus fids una vez que ya no sean accesibles." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "6.1.94", + "matchCriteriaId": "0F1BDCB0-B227-4406-81D0-90429CAF5F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/c898afdc15645efb555acb6d85b484eb40a45409", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb299cdba09f46f090b843d78ba26b667d50a456", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0c5c944c6d8614c19e6e9a97fd2011dcd30e8f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe17ebf22feb4ad7094d597526d558a49aac92b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39464.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39464.json index c39ea7aab26..7672b86f578 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39464.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39464", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:14.953", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T21:02:16.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: v4l: async: correcci\u00f3n de la entrada de la lista de notificadores init struct v4l2_async_notifier tiene varios miembros list_head, pero solo se inicializan la lista de espera y la lista de hechos. notifier_entry se mantuvo 'puesto a cero', lo que gener\u00f3 un list_head no inicializado. Esto da como resultado una desreferencia del puntero NULL si csi2_async_register() falla, por ejemplo, el nodo para el endpoint remoto est\u00e1 deshabilitado y devuelve -ENOTCONN. Las siguientes llamadas a v4l2_async_nf_unregister() dan como resultado una desreferencia del puntero NULL. Agregue el inicializador de encabezado de lista que falta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "AC0C6E24-8240-425A-BD1A-F78E6D3A67FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/44f6d619c30f0c65fcdd2b6eba70fdb4460d87ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d8acd02c4c6a8f917eefac1de2e035521ca119d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a80d1da923f671c1e6a14e8417cd2f117b27a442", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39465.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39465.json index b26d1dace6a..941f319a137 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39465.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39465", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:15.037", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T21:04:27.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,85 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: mgb4: Fix double debugfs remove Corrige un error donde se llama a debugfs_remove_recursive() primero en un directorio principal y luego nuevamente en un hijo, lo que provoca un p\u00e1nico en el kernel. [hverkuil: se agregaron correcciones/etiquetas CC]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/252204b634efffd8b167d77413c93d0192aaf5f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/825fc49497957310e421454fe3fb8b8d8d8e2dd2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39466.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39466.json index bdb1520efaa..b43950a704a 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39466.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39466", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:15.117", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T20:59:54.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Thermal/drivers/qcom/lmh: Verificar la disponibilidad de SCM en la sonda Hasta ahora, no se ha realizado la verificaci\u00f3n de disponibilidad de SCM necesaria, lo que lleva a posibles desreferencias de puntero nulo (lo que me pas\u00f3 en RB1). Arregla eso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "E2AB5A01-EFFD-4A24-8CCB-4A016C8C4BB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.94", + "matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a47ba94ec3d8f782b33e3d970cfcb769b962464", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2226b145afa5e13cb60dbe77fb20fb0666a1caf3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/560d69c975072974c11434ca6953891e74c1a665", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aa1a0807b4a76b44fb6b58a7e9087cd4b18ab41b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d9d3490c48df572edefc0b64655259eefdcbb9be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39470.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39470.json index 091c1ea7373..e5e6c145f08 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39470.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39470", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:15.417", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T20:58:03.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: eventfs: se corrige una posible desreferencia de puntero nulo en eventfs_find_events() En la funci\u00f3n eventfs_find_events, existe un posible puntero nulo que puede deberse a la llamada a update_events_attr que realizar\u00e1 algunas operaciones en los miembros de la estructura ei cuando ei es NULL. Por lo tanto, cuando se establece ei->is_freed, se devuelve NULL directamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.18", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "2F943865-D05D-4337-A71C-88AC81AA7E29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8B3D6E66-FEFD-4991-BA30-CE0850746435" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5ade5fbdbbb1f023bb70730ba4d74146c8bc7eb9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7a1b2d138189375ed1dcd7d0851118230221bd1d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4e9a968738bf66d3bb852dd5588d4c7afd6d7f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42262.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42262.json index 406cd2d1bad..bd00be13618 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42262.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42262", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:07.680", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T20:05:15.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,80 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/v3d: corrige una posible p\u00e9rdida de memoria en la extensi\u00f3n de rendimiento. Si falla la recuperaci\u00f3n de la memoria del espacio de usuario durante el bucle principal, todos los objetos de sincronizaci\u00f3n de drm buscados hasta ese punto se filtrar\u00e1n debido a la falta drm_syncobj_put. Solucionarlo exportando y utilizando un asistente de limpieza com\u00fan. (cereza escogida del commit 484de39fa5f5b7bd0c5f2e2c5265167250ef7501)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.4", + "matchCriteriaId": "F8B935B3-1FAC-4502-A5BA-A3C286A20469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32df4abc44f24dbec239d43e2b26d5768c5d1a78", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad5fdc48f7a63b8a98493c667505fe4d3864ae21", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42263.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42263.json index b0cda433a43..dc000ec7642 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42263.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42263.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42263", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:07.770", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T20:41:11.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,80 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/v3d: corrige una posible p\u00e9rdida de memoria en la extensi\u00f3n de marca de tiempo. Si falla la recuperaci\u00f3n de la memoria del espacio de usuario durante el bucle principal, todos los objetos de sincronizaci\u00f3n de drm buscados hasta ese punto se filtrar\u00e1n debido a la falta drm_syncobj_put. Solucionarlo exportando y utilizando un asistente de limpieza com\u00fan. (cereza escogida del commit 753ce4fea62182c77e1691ab4f9022008f25b62e)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.4", + "matchCriteriaId": "F8B935B3-1FAC-4502-A5BA-A3C286A20469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e50fcc20bd87584840266e8004f9064a8985b4f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b5033ee2c5af6d1135a403df32d219ab57e55f9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42268.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42268.json index 48af494b345..7921966ed5c 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42268.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42268.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42268", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:08.110", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T20:52:49.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,108 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5: se corrigi\u00f3 el bloqueo faltante en la recarga de reinicio de sincronizaci\u00f3n. En el trabajo de recarga de reinicio de sincronizaci\u00f3n, cuando el host remoto actualiza devlink en las acciones de recarga realizadas en ese host, no toma el bloqueo de devlink antes de llamar a devlink_remote_reload_actions_performed. () lo que da como resultado la activaci\u00f3n de un bloqueo como el siguiente: ADVERTENCIA: CPU: 4 PID: 1164 en net/devlink/core.c:261 devl_assert_locked+0x3e/0x50 \u2026 CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted : GSW 6.10.0-rc2+ #116 Nombre del hardware: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 18/12/2015 Cola de trabajo: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core] RIP: devl_assert_locked+0x3e/0x50 \u2026 Seguimiento de llamadas: ? __advertir+0xa4/0x210 ? devl_assert_locked+0x3e/0x50? report_bug+0x160/0x280? handle_bug+0x3f/0x80? exc_invalid_op+0x17/0x40? asm_exc_invalid_op+0x1a/0x20? devl_assert_locked+0x3e/0x50 devlink_notify+0x88/0x2b0? mlx5_attach_device+0x20c/0x230 [mlx5_core] ? __pfx_devlink_notify+0x10/0x10? proceso_one_work+0x4b6/0xbb0 proceso_one_work+0x4b6/0xbb0 [\u2026]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.104", + "matchCriteriaId": "7CD59F09-76BC-4BEB-8B0C-B909A6F9E6BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.45", + "matchCriteriaId": "6ED8FBDF-48EE-4FEB-8B1A-CFF4FBCB27BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.4", + "matchCriteriaId": "1F9FECDC-6CB8-41E5-B32A-E46776100D9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/091268f3c27a5b6d7858a3bb2a0dbcc9cd26ddb5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/572f9caa9e7295f8c8822e4122c7ae8f1c412ff9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d07d1d40aabfd61bab21115639bd4f641db6002", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98884e89c90d077f6fe6ba18e6cf6f914642f04e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42269.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42269.json index 2c1e029c13f..0a92fa96fe4 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42269.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42269.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42269", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:08.177", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T20:53:51.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,115 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: iptables: corrige el potencial null-ptr-deref en ip6table_nat_table_init(). ip6table_nat_table_init() accede a net->gen->ptr[ip6table_nat_net_ops.id], pero la funci\u00f3n est\u00e1 expuesta al espacio del usuario antes de que la entrada se asigne a trav\u00e9s de Register_pernet_subsys(). Llamemos a Register_pernet_subsys() antes de xt_register_template()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "6.1.104", + "matchCriteriaId": "47935D4A-35BC-4583-8B6B-49D49E8D999C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.45", + "matchCriteriaId": "6ED8FBDF-48EE-4FEB-8B1A-CFF4FBCB27BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.4", + "matchCriteriaId": "1F9FECDC-6CB8-41E5-B32A-E46776100D9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/419ee6274c5153b89c4393c1946faa4c3cad4f9e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87dba44e9471b79b255d0736858a897332db9226", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91b6df6611b7edb28676c4f63f90c56c30d3e601", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c22921df777de5606f1047b1345b8d22ef1c0b34", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e85b9b6a87be4cb3710082038b677e97f2389003", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42270.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42270.json index 586c1599b5c..ae2cffa1944 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42270.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42270.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42270", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:08.240", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T20:01:09.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,115 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: netfilter: iptables: corrige null-ptr-deref en iptable_nat_table_init(). Recibimos un informe de que iptables-restore a veces activaba null-ptr-deref en el momento del arranque. [0] El problema es que iptable_nat_table_init() est\u00e1 expuesto al espacio del usuario antes de que el kernel inicialice completamente netns. En la ventana de ejecuci\u00f3n peque\u00f1a, un usuario podr\u00eda llamar a iptable_nat_table_init() que accede a net_generic(net, iptable_nat_net_id), que est\u00e1 disponible solo despu\u00e9s de registrar iptable_nat_net_ops. Llamemos a Register_pernet_subsys() antes de xt_register_template(). [0]: bpfilter: Bpfilter_umh pid 11702 iniciado bpfilter ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000013 PF: acceso de escritura del supervisor en modo kernel PF: error_code(0x0002) - p\u00e1gina no presente PGD 0 P4D 0 PREEMPT SMP NOPTI CPU: 2 PID: 11879 Comm: iptables-restor No contaminado 6.1.92-99.174.amzn2023.x86_64 #1 Nombre del hardware: Amazon EC2 c6i.4xlarge/, BIOS 1.0 16/10/2017 RIP: 0010:iptable_nat_table_init (net/ipv4/netfilter /iptable_nat.c:87 net/ipv4/netfilter/iptable_nat.c:121) iptable_nat C\u00f3digo: 10 4c 89 f6 48 89 ef e8 0b 19 bb ff 41 89 c4 85 c0 75 38 41 83 c7 01 49 83 c6 28 41 83 ff 04 75 pa 48 8b 44 24 08 48 8b 0c 24 <48> 89 08 4c 89 ef e8 a2 3b a2 cf 48 83 c4 10 44 89 e0 5b 5d 41 5c RSP: 0018:ffffbef902843cd0 EFLAGS: 00010246 RAX: 0000000000000013RBX: ffff9f4b052caa20 RCX: ffff9f4b20988d80 RDX: 0000000000000000 RSI: 0000000000000064 RDI: ffffffffc04201c0 RBP: ffff9f4b29394000 R08: ffff9f4b07f77 258 R09: ffff9f4b07f77240 R10: 00000000000000000 R11: ffff9f4b09635388 R12: 0000000000000000 R13: ffff9f4b1a3c6c00 R14: ffff9f4b20988e20 : 0000000000000004 FS: 00007f6284340000(0000) GS:ffff9f51fe280000( 0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000013 CR3: 00000001d10a6005 CR4: 00000000007 706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000000000000 DR6: 00000000ffe0ff0 DR7: 0000000000000400 PK RU: 55555554 Seguimiento de llamadas: ? show_trace_log_lvl (arch/x86/kernel/dumpstack.c:259)? show_trace_log_lvl (arch/x86/kernel/dumpstack.c:259)? xt_find_table_lock (net/netfilter/x_tables.c:1259)? __die_body.cold (arch/x86/kernel/dumpstack.c:478 arch/x86/kernel/dumpstack.c:420)? page_fault_oops (arch/x86/mm/fault.c:727)? exc_page_fault (./arch/x86/include/asm/irqflags.h:40 ./arch/x86/include/asm/irqflags.h:75 arch/x86/mm/fault.c:1470 arch/x86/mm/fault .c:1518)? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:570)? iptable_nat_table_init (net/ipv4/netfilter/iptable_nat.c:87 net/ipv4/netfilter/iptable_nat.c:121) iptable_nat xt_find_table_lock (net/netfilter/x_tables.c:1259) xt_request_find_table_lock (net/netfilter/x_tables.c:1287) get_info (net/ipv4/netfilter/ip_tables.c:965)? security_capable (seguridad/seguridad.c:809 (discriminador 13))? ns_capable (kernel/capability.c:376 kernel/capability.c:397)? do_ipt_get_ctl (net/ipv4/netfilter/ip_tables.c:1656)? bpfilter_send_req (net/bpfilter/bpfilter_kern.c:52) bpfilter nf_getsockopt (net/netfilter/nf_sockopt.c:116) ip_getsockopt (net/ipv4/ip_sockglue.c:1827) __sys_getsockopt (net/socket.c:2327) _sys_getsockopt (neto /socket.c:2342 net/socket.c:2339 net/socket.c:2339) do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:81) Entry_SYSCALL_64_after_hwframe (arch/ x86/entry/entry_64.S:121) RIP: 0033:0x7f62844685ee C\u00f3digo: 48 8b 0d 45 28 0f 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f 3 0f 1e fa 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 09 RSP: 002b:00007ffd1f83d638 EFLAGS: 46 ORIG_RAX: 0000000000000037 RAX: ffffffffffffffda RBX: 00007ffd1f83d680 RCX: 00007f62844685ee RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00000000000000004 R08: 00007ffd1f83d670 : 0000558798ffa2a0 R10: 00007ffd1f83d680 R11: 0000000000000246 R12: 00007ffd1f83e3b2 R13: 00007f6284 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "6.1.104", + "matchCriteriaId": "47935D4A-35BC-4583-8B6B-49D49E8D999C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.45", + "matchCriteriaId": "6ED8FBDF-48EE-4FEB-8B1A-CFF4FBCB27BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.4", + "matchCriteriaId": "1F9FECDC-6CB8-41E5-B32A-E46776100D9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08ed888b69a22647153fe2bec55b7cd0a46102cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5830aa863981d43560748aa93589c0695191d95d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/70014b73d7539fcbb6b4ff5f37368d7241d8e626", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95590a4929027769af35b153645c0ab6fd22b29b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b98ddb65fa1674b0e6b52de8af9103b63f51b643", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42271.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42271.json index 7fa0dbc6262..1b905b67c5c 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42271.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42271.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42271", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:08.307", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T20:03:31.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,164 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/iucv: corrige el use after free en iucv_sock_close() iucv_sever_path() se llama desde el contexto del proceso y desde el contexto bh. iucv->path se utiliza como indicador de si alguien m\u00e1s se est\u00e1 encargando de cortar la ruta (o si ya se elimin\u00f3 o nunca existi\u00f3). Esto debe hacerse con comparaci\u00f3n e intercambio at\u00f3mico; de lo contrario, hay una peque\u00f1a ventana donde iucv_sock_close() intentar\u00e1 trabajar con una ruta que ya ha sido cortada y liberada por iucv_callback_connrej() llamada por iucv_tasklet_fn(). Ejemplo: [452744.123844] Seguimiento de llamadas: [452744.123845] ([<0000001e87f03880>] 0x1e87f03880) [452744.123966] [<00000000d593001e>] iucv_path_sever+0x96/0x13 8 [452744.124330] [<000003ff801ddbca>] iucv_sever_path+0xc2/0xd0 [af_iucv] [452744.124336 ] [<000003ff801e01b6>] iucv_sock_close+0xa6/0x310 [af_iucv] [452744.124341] [<000003ff801e08cc>] iucv_sock_release+0x3c/0xd0 [af_iucv] [452744.124345] 000000d574794e>] __sock_release+0x5e/0xe8 [452744.124815] [<00000000d5747a0c> ] sock_close+0x34/0x48 [452744.124820] [<00000000d5421642>] __fput+0xba/0x268 [452744.124826] [<00000000d51b382c>] task_work_run+0xbc/0xf0 [452744.1 24832] [<00000000d5145710>] do_notify_resume+0x88/0x90 [452744.124841] [< 00000000d5978096>] system_call+0xe2/0x2c8 [452744.125319] \u00daltima direcci\u00f3n del evento de \u00faltima hora: [452744.125321] [<00000000d5930018>] iucv_path_sever+0x90/0x138 [452744.125 324] [452744.125325] P\u00e1nico del kernel: no se sincroniza: excepci\u00f3n fatal en la interrupci\u00f3n. Tenga en cuenta que bh_lock_sock () no serializa el contexto del tasklet con respecto al contexto del proceso, porque falta la verificaci\u00f3n de sock_owned_by_user() y el manejo correspondiente. Ideas para un futuro parche de limpieza: A) Uso correcto de bh_lock_sock() en el contexto del tasklet, como se describe en Volver a poner en cola, si es necesario. Esto puede requerir agregar valores de retorno a las funciones del tasklet y, por lo tanto, cambios para todos los usuarios de iucv. B) Cambie el tasklet iucv a trabajador y use solo lock_sock() en af_iucv." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4", + "versionEndExcluding": "4.19.320", + "matchCriteriaId": "D4F8C11A-E708-4EBE-97BC-D7F6041074D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.104", + "matchCriteriaId": "20DB9042-F89E-4024-B005-ACBBA99CA659" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.45", + "matchCriteriaId": "6ED8FBDF-48EE-4FEB-8B1A-CFF4FBCB27BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.4", + "matchCriteriaId": "1F9FECDC-6CB8-41E5-B32A-E46776100D9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01437282fd3904810603f3dc98d2cac6b8b6fc84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/37652fbef9809411cea55ea5fa1a170e299efcd0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/69620522c48ce8215e5eb55ffbab8cafee8f407d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84f40b46787ecb67c7ad08a5bb1376141fa10c01", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b424c9e44111c5a76f41c6b741f8d4c4179d876", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac758e1f663fe9bc64f6b47212a2aa18697524f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c65f72eec60a34ace031426e04e9aff8e5f04895", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f558120cd709682b739207b48cf7479fd9568431", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json new file mode 100644 index 00000000000..efc0d86810c --- /dev/null +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42812", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-19T20:15:07.070", + "lastModified": "2024-08-19T20:15:07.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In D-Link DIR-860L v2.03, there is a buffer overflow vulnerability due to the lack of length verification for the SID field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/XiaoCurry/574ed9c2b0d12cd0b45399116d82121c", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42813.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42813.json new file mode 100644 index 00000000000..a29efb422c1 --- /dev/null +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42813.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42813", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-19T20:15:07.147", + "lastModified": "2024-08-19T21:35:07.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json new file mode 100644 index 00000000000..a169728f0c3 --- /dev/null +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42815", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-19T20:15:07.193", + "lastModified": "2024-08-19T20:15:07.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the TP-Link RE365 V1_180213, there is a buffer overflow vulnerability due to the lack of length verification for the USER_AGENT field in /usr/bin/httpd. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/XiaoCurry/14d46e0becd79d9bb9907f2fbe147cfe", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42977.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42977.json index 93b99189f52..2da705cdb5c 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42977.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42977", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:20.860", - "lastModified": "2024-08-16T13:31:11.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T20:35:17.330", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42986.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42986.json index 3234f104730..958d96316ab 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42986.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42986", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:21.717", - "lastModified": "2024-08-16T13:26:43.100", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T21:35:07.937", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43311.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43311.json new file mode 100644 index 00000000000..f4644689cf0 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43311.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43311", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T20:15:07.283", + "lastModified": "2024-08-19T20:15:07.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Privilege Management vulnerability in Geek Code Lab Login As Users allows Privilege Escalation.This issue affects Login As Users: from n/a through 1.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/login-as-users/wordpress-login-as-users-plugin-1-4-2-broken-authentication-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json new file mode 100644 index 00000000000..e50c5e2c834 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43317", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T20:15:07.480", + "lastModified": "2024-08-19T20:15:07.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Metagauss User Registration Team RegistrationMagic allows Cross-Site Scripting (XSS).This issue affects RegistrationMagic: from n/a through 6.0.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-6-0-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43326.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43326.json new file mode 100644 index 00000000000..f5a984613fa --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43326.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43326", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T20:15:07.667", + "lastModified": "2024-08-19T20:15:07.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Jamie Bergen Plugin Notes Plus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Plugin Notes Plus: from n/a through 1.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/plugin-notes-plus/wordpress-plugin-notes-plus-plugin-1-2-7-arbitrary-content-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json new file mode 100644 index 00000000000..9231e6da109 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43328", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T20:15:07.853", + "lastModified": "2024-08-19T20:15:07.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPDeveloper EmbedPress allows PHP Local File Inclusion.This issue affects EmbedPress: from n/a through 4.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/embedpress/wordpress-embedpress-plugin-4-0-9-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43345.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43345.json new file mode 100644 index 00000000000..051505f32b5 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43345.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43345", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T20:15:08.047", + "lastModified": "2024-08-19T20:15:08.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PluginOps Landing Page Builder allows PHP Local File Inclusion.This issue affects Landing Page Builder: from n/a through 1.5.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/page-builder-add/wordpress-landing-page-builder-plugin-1-5-2-0-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43354.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43354.json new file mode 100644 index 00000000000..683b955ab3b --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43354.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43354", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T20:15:08.233", + "lastModified": "2024-08-19T20:15:08.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in myCred allows Object Injection.This issue affects myCred: from n/a through 2.7.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mycred/wordpress-mycred-plugin-2-7-2-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43807.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43807.json index cf026294031..abe606eab61 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43807.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43807", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-08-16T15:15:29.197", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T21:09:42.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.1", + "matchCriteriaId": "68722EA9-3239-42A3-9A3E-20CFF2E0209F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43808.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43808.json index 916e3ed9a51..bd33ff2f6b8 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43808.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43808", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-08-16T15:15:29.417", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T21:10:14.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.1", + "matchCriteriaId": "68722EA9-3239-42A3-9A3E-20CFF2E0209F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43809.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43809.json index e6cc0c8bd2a..345bfa3f177 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43809.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43809.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43809", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-08-16T15:15:29.597", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T21:11:28.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.1", + "matchCriteriaId": "68722EA9-3239-42A3-9A3E-20CFF2E0209F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43810.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43810.json index 1c7e8d90400..d00ff993227 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43810.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43810.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43810", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-08-16T15:15:29.790", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T21:11:45.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.1", + "matchCriteriaId": "68722EA9-3239-42A3-9A3E-20CFF2E0209F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json index e9c497ca7ae..bcacdf3711e 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json @@ -2,13 +2,13 @@ "id": "CVE-2024-4350", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-08-12T13:38:36.460", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-08-19T21:15:10.053", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer\u00a0when user input is stored and later embedded into responses. A\u00a0rogue administrator could inject malicious code into fields due to insufficient input validation.\u00a0The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.0 with a vector of AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \u00a0and a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N \u00a0Thanks, m3dium for reporting." + "value": "Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.0 with a vector of AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator and a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, m3dium for\u00a0reporting." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json index 5a308d56370..ce48a631537 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5933", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:17.840", - "lastModified": "2024-06-27T19:25:12.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T21:07:56.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_webui:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDA7C0A-5EEC-4F3F-BA31-A87414C9217E" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/51a2e370-3b64-45cd-9afc-0e4856ab5517", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5935.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5935.json index 18d2f96aafb..f7319a3d3a2 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5935.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5935.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5935", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:18.073", - "lastModified": "2024-06-27T19:25:12.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T21:08:52.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zylon:privategpt:0.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A301D502-A9C9-4020-AC8E-AFD473C58839" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/b374f1c9-fa25-4b52-a34d-5153afd5a295", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7544.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7544.json index 9ec3d9bea35..e35cb6652b4 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7544.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7544.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7544", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:36.050", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T20:00:24.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3C23EE-8748-4C6E-B445-A9A9A9B3AF85" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1084/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7545.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7545.json index 6c141be2b89..c57a22d8ad6 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7545.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7545.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7545", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:36.247", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T20:00:57.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3C23EE-8748-4C6E-B445-A9A9A9B3AF85" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1085/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7547.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7547.json index 7ccab2632c8..f713a60841a 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7547.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7547", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:36.637", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T20:03:12.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3C23EE-8748-4C6E-B445-A9A9A9B3AF85" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1087/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7839.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7839.json index 278031bb37f..e73d2da10c6 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7839.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7839.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7839", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T21:15:18.237", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T21:18:14.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:billing_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6AB542E-F5A5-4637-8D8D-E45F0ED68384" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/a/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274743", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.274743", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.391531", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7901.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7901.json index 0f71077f490..050f6fbb168 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7901.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7901.json @@ -2,13 +2,13 @@ "id": "CVE-2024-7901", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-17T21:15:03.773", - "lastModified": "2024-08-19T12:59:59.177", + "lastModified": "2024-08-19T21:15:10.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been found in Scada-LTS 2.7.8 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /Scada-LTS/app.shtm#/alarms/Scada of the component Message Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability has been found in Scada-LTS 2.7.8 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /Scada-LTS/app.shtm#/alarms/Scada of the component Message Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: A fix is planned for the upcoming release at the end of September 2024." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7926.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7926.json new file mode 100644 index 00000000000..f646f637e86 --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7926.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7926", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-19T20:15:08.447", + "lastModified": "2024-08-19T20:15:08.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in ZZCMS 2023. Affected is an unknown function of the file /admin/about_edit.php?action=modify. The manipulation of the argument skin leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/A0kooo/cve_article/blob/master/zzcms/Directory_traversal2/zzcms%20siteinfo.php%20Directory%20traversal.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275112", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275112", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.392181", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7927.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7927.json new file mode 100644 index 00000000000..4b6023a1a33 --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7927.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7927", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-19T20:15:08.680", + "lastModified": "2024-08-19T20:15:08.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in ZZCMS 2023. Affected by this vulnerability is an unknown functionality of the file /admin/class.php?dowhat=modifyclass. The manipulation of the argument skin[] leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/A0kooo/cve_article/blob/master/zzcms/Directory_traversal3/zzcms%20class.php%20Directory%20traversal.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275113", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275113", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.392186", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7958.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7958.json new file mode 100644 index 00000000000..f73c9f8b24d --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7958.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-7958", + "sourceIdentifier": "cna@python.org", + "published": "2024-08-19T20:15:08.907", + "lastModified": "2024-08-19T20:15:08.907", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/README.md b/README.md index af016039042..aaafbfef06b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-19T20:00:19.099372+00:00 +2024-08-19T22:00:18.094906+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-19T19:59:55.340000+00:00 +2024-08-19T21:35:07.937000+00:00 ``` ### Last Data Feed Release @@ -33,61 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260511 +260525 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `14` -- [CVE-2024-23729](CVE-2024/CVE-2024-237xx/CVE-2024-23729.json) (`2024-08-19T19:15:07.867`) -- [CVE-2024-43242](CVE-2024/CVE-2024-432xx/CVE-2024-43242.json) (`2024-08-19T18:15:10.463`) -- [CVE-2024-43245](CVE-2024/CVE-2024-432xx/CVE-2024-43245.json) (`2024-08-19T18:15:10.660`) -- [CVE-2024-43247](CVE-2024/CVE-2024-432xx/CVE-2024-43247.json) (`2024-08-19T18:15:10.843`) -- [CVE-2024-43248](CVE-2024/CVE-2024-432xx/CVE-2024-43248.json) (`2024-08-19T18:15:11.030`) -- [CVE-2024-43249](CVE-2024/CVE-2024-432xx/CVE-2024-43249.json) (`2024-08-19T18:15:11.217`) -- [CVE-2024-43250](CVE-2024/CVE-2024-432xx/CVE-2024-43250.json) (`2024-08-19T18:15:11.420`) -- [CVE-2024-43252](CVE-2024/CVE-2024-432xx/CVE-2024-43252.json) (`2024-08-19T18:15:11.607`) -- [CVE-2024-43256](CVE-2024/CVE-2024-432xx/CVE-2024-43256.json) (`2024-08-19T18:15:11.787`) -- [CVE-2024-43261](CVE-2024/CVE-2024-432xx/CVE-2024-43261.json) (`2024-08-19T18:15:11.970`) -- [CVE-2024-43271](CVE-2024/CVE-2024-432xx/CVE-2024-43271.json) (`2024-08-19T18:15:12.157`) -- [CVE-2024-43272](CVE-2024/CVE-2024-432xx/CVE-2024-43272.json) (`2024-08-19T18:15:12.333`) -- [CVE-2024-43280](CVE-2024/CVE-2024-432xx/CVE-2024-43280.json) (`2024-08-19T18:15:12.527`) -- [CVE-2024-43281](CVE-2024/CVE-2024-432xx/CVE-2024-43281.json) (`2024-08-19T18:15:12.707`) -- [CVE-2024-7592](CVE-2024/CVE-2024-75xx/CVE-2024-7592.json) (`2024-08-19T19:15:08.180`) -- [CVE-2024-7924](CVE-2024/CVE-2024-79xx/CVE-2024-7924.json) (`2024-08-19T18:15:13.050`) -- [CVE-2024-7925](CVE-2024/CVE-2024-79xx/CVE-2024-7925.json) (`2024-08-19T18:15:13.287`) +- [CVE-2024-35538](CVE-2024/CVE-2024-355xx/CVE-2024-35538.json) (`2024-08-19T21:15:09.850`) +- [CVE-2024-35539](CVE-2024/CVE-2024-355xx/CVE-2024-35539.json) (`2024-08-19T21:15:09.913`) +- [CVE-2024-42812](CVE-2024/CVE-2024-428xx/CVE-2024-42812.json) (`2024-08-19T20:15:07.070`) +- [CVE-2024-42813](CVE-2024/CVE-2024-428xx/CVE-2024-42813.json) (`2024-08-19T20:15:07.147`) +- [CVE-2024-42815](CVE-2024/CVE-2024-428xx/CVE-2024-42815.json) (`2024-08-19T20:15:07.193`) +- [CVE-2024-43311](CVE-2024/CVE-2024-433xx/CVE-2024-43311.json) (`2024-08-19T20:15:07.283`) +- [CVE-2024-43317](CVE-2024/CVE-2024-433xx/CVE-2024-43317.json) (`2024-08-19T20:15:07.480`) +- [CVE-2024-43326](CVE-2024/CVE-2024-433xx/CVE-2024-43326.json) (`2024-08-19T20:15:07.667`) +- [CVE-2024-43328](CVE-2024/CVE-2024-433xx/CVE-2024-43328.json) (`2024-08-19T20:15:07.853`) +- [CVE-2024-43345](CVE-2024/CVE-2024-433xx/CVE-2024-43345.json) (`2024-08-19T20:15:08.047`) +- [CVE-2024-43354](CVE-2024/CVE-2024-433xx/CVE-2024-43354.json) (`2024-08-19T20:15:08.233`) +- [CVE-2024-7926](CVE-2024/CVE-2024-79xx/CVE-2024-7926.json) (`2024-08-19T20:15:08.447`) +- [CVE-2024-7927](CVE-2024/CVE-2024-79xx/CVE-2024-7927.json) (`2024-08-19T20:15:08.680`) +- [CVE-2024-7958](CVE-2024/CVE-2024-79xx/CVE-2024-7958.json) (`2024-08-19T20:15:08.907`) ### CVEs modified in the last Commit -Recently modified CVEs: `106` +Recently modified CVEs: `54` -- [CVE-2024-6039](CVE-2024/CVE-2024-60xx/CVE-2024-6039.json) (`2024-08-19T19:26:48.043`) -- [CVE-2024-6181](CVE-2024/CVE-2024-61xx/CVE-2024-6181.json) (`2024-08-19T18:45:06.147`) -- [CVE-2024-6182](CVE-2024/CVE-2024-61xx/CVE-2024-6182.json) (`2024-08-19T18:46:05.410`) -- [CVE-2024-6348](CVE-2024/CVE-2024-63xx/CVE-2024-6348.json) (`2024-08-19T18:36:20.123`) -- [CVE-2024-6533](CVE-2024/CVE-2024-65xx/CVE-2024-6533.json) (`2024-08-19T18:13:59.457`) -- [CVE-2024-6534](CVE-2024/CVE-2024-65xx/CVE-2024-6534.json) (`2024-08-19T18:17:15.110`) -- [CVE-2024-7543](CVE-2024/CVE-2024-75xx/CVE-2024-7543.json) (`2024-08-19T19:59:55.340`) -- [CVE-2024-7808](CVE-2024/CVE-2024-78xx/CVE-2024-7808.json) (`2024-08-19T18:07:44.270`) -- [CVE-2024-7809](CVE-2024/CVE-2024-78xx/CVE-2024-7809.json) (`2024-08-19T18:11:18.537`) -- [CVE-2024-7810](CVE-2024/CVE-2024-78xx/CVE-2024-7810.json) (`2024-08-19T18:12:14.090`) -- [CVE-2024-7811](CVE-2024/CVE-2024-78xx/CVE-2024-7811.json) (`2024-08-19T18:15:40.487`) -- [CVE-2024-7812](CVE-2024/CVE-2024-78xx/CVE-2024-7812.json) (`2024-08-19T18:16:21.283`) -- [CVE-2024-7813](CVE-2024/CVE-2024-78xx/CVE-2024-7813.json) (`2024-08-19T18:16:48.327`) -- [CVE-2024-7814](CVE-2024/CVE-2024-78xx/CVE-2024-7814.json) (`2024-08-19T18:31:16.473`) -- [CVE-2024-7815](CVE-2024/CVE-2024-78xx/CVE-2024-7815.json) (`2024-08-19T18:32:00.617`) -- [CVE-2024-7828](CVE-2024/CVE-2024-78xx/CVE-2024-7828.json) (`2024-08-19T18:33:17.583`) -- [CVE-2024-7829](CVE-2024/CVE-2024-78xx/CVE-2024-7829.json) (`2024-08-19T18:34:00.040`) -- [CVE-2024-7830](CVE-2024/CVE-2024-78xx/CVE-2024-7830.json) (`2024-08-19T18:34:36.987`) -- [CVE-2024-7831](CVE-2024/CVE-2024-78xx/CVE-2024-7831.json) (`2024-08-19T18:35:25.813`) -- [CVE-2024-7907](CVE-2024/CVE-2024-79xx/CVE-2024-7907.json) (`2024-08-19T18:53:05.753`) -- [CVE-2024-7908](CVE-2024/CVE-2024-79xx/CVE-2024-7908.json) (`2024-08-19T18:51:45.210`) -- [CVE-2024-7909](CVE-2024/CVE-2024-79xx/CVE-2024-7909.json) (`2024-08-19T18:51:07.600`) -- [CVE-2024-7910](CVE-2024/CVE-2024-79xx/CVE-2024-7910.json) (`2024-08-19T18:49:49.110`) -- [CVE-2024-7911](CVE-2024/CVE-2024-79xx/CVE-2024-7911.json) (`2024-08-19T18:48:06.527`) -- [CVE-2024-7922](CVE-2024/CVE-2024-79xx/CVE-2024-7922.json) (`2024-08-19T18:36:20.123`) +- [CVE-2024-39463](CVE-2024/CVE-2024-394xx/CVE-2024-39463.json) (`2024-08-19T21:01:55.557`) +- [CVE-2024-39464](CVE-2024/CVE-2024-394xx/CVE-2024-39464.json) (`2024-08-19T21:02:16.113`) +- [CVE-2024-39465](CVE-2024/CVE-2024-394xx/CVE-2024-39465.json) (`2024-08-19T21:04:27.467`) +- [CVE-2024-39466](CVE-2024/CVE-2024-394xx/CVE-2024-39466.json) (`2024-08-19T20:59:54.867`) +- [CVE-2024-39470](CVE-2024/CVE-2024-394xx/CVE-2024-39470.json) (`2024-08-19T20:58:03.040`) +- [CVE-2024-42262](CVE-2024/CVE-2024-422xx/CVE-2024-42262.json) (`2024-08-19T20:05:15.407`) +- [CVE-2024-42263](CVE-2024/CVE-2024-422xx/CVE-2024-42263.json) (`2024-08-19T20:41:11.240`) +- [CVE-2024-42268](CVE-2024/CVE-2024-422xx/CVE-2024-42268.json) (`2024-08-19T20:52:49.323`) +- [CVE-2024-42269](CVE-2024/CVE-2024-422xx/CVE-2024-42269.json) (`2024-08-19T20:53:51.717`) +- [CVE-2024-42270](CVE-2024/CVE-2024-422xx/CVE-2024-42270.json) (`2024-08-19T20:01:09.520`) +- [CVE-2024-42271](CVE-2024/CVE-2024-422xx/CVE-2024-42271.json) (`2024-08-19T20:03:31.840`) +- [CVE-2024-42977](CVE-2024/CVE-2024-429xx/CVE-2024-42977.json) (`2024-08-19T20:35:17.330`) +- [CVE-2024-42986](CVE-2024/CVE-2024-429xx/CVE-2024-42986.json) (`2024-08-19T21:35:07.937`) +- [CVE-2024-4350](CVE-2024/CVE-2024-43xx/CVE-2024-4350.json) (`2024-08-19T21:15:10.053`) +- [CVE-2024-43807](CVE-2024/CVE-2024-438xx/CVE-2024-43807.json) (`2024-08-19T21:09:42.313`) +- [CVE-2024-43808](CVE-2024/CVE-2024-438xx/CVE-2024-43808.json) (`2024-08-19T21:10:14.093`) +- [CVE-2024-43809](CVE-2024/CVE-2024-438xx/CVE-2024-43809.json) (`2024-08-19T21:11:28.327`) +- [CVE-2024-43810](CVE-2024/CVE-2024-438xx/CVE-2024-43810.json) (`2024-08-19T21:11:45.823`) +- [CVE-2024-5933](CVE-2024/CVE-2024-59xx/CVE-2024-5933.json) (`2024-08-19T21:07:56.627`) +- [CVE-2024-5935](CVE-2024/CVE-2024-59xx/CVE-2024-5935.json) (`2024-08-19T21:08:52.097`) +- [CVE-2024-7544](CVE-2024/CVE-2024-75xx/CVE-2024-7544.json) (`2024-08-19T20:00:24.957`) +- [CVE-2024-7545](CVE-2024/CVE-2024-75xx/CVE-2024-7545.json) (`2024-08-19T20:00:57.433`) +- [CVE-2024-7547](CVE-2024/CVE-2024-75xx/CVE-2024-7547.json) (`2024-08-19T20:03:12.377`) +- [CVE-2024-7839](CVE-2024/CVE-2024-78xx/CVE-2024-7839.json) (`2024-08-19T21:18:14.097`) +- [CVE-2024-7901](CVE-2024/CVE-2024-79xx/CVE-2024-7901.json) (`2024-08-19T21:15:10.157`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b4411902e1e..173a4af373c 100644 --- a/_state.csv +++ b/_state.csv @@ -111708,7 +111708,7 @@ CVE-2018-10627,0,0,c76f046ad964b19e3cf494e01dd6123bb68172313490458ef8c2f9da54f3b CVE-2018-10628,0,0,e0e60fc7532e4e3550a5556278a0f580c094c5b0a97a26eeb07878d2d406940a,2023-11-07T02:51:31.013000 CVE-2018-1063,0,0,2c9dba3ea9eb5da14504cc5700c024ada44bcfc9dd4528bd8da468ad7e4178f9,2023-11-07T02:55:48.110000 CVE-2018-10630,0,0,cf5f5963a104355c275d01fd9d9f9dd8bcee07b9aa528cd8388c91a9fe501f94,2019-10-09T23:32:57.383000 -CVE-2018-10631,0,1,2a637e319ae7243aed0025bf66f80efd4cbba6295ee879df8d4ca4c34b9e256b,2024-08-19T19:35:00.700000 +CVE-2018-10631,0,0,2a637e319ae7243aed0025bf66f80efd4cbba6295ee879df8d4ca4c34b9e256b,2024-08-19T19:35:00.700000 CVE-2018-10632,0,0,043c8cad3b96c5503994df137f92ee4e4a3a8b4825be251c1c4e6e10bae96de7,2019-10-09T23:32:57.853000 CVE-2018-10633,0,0,4391d9c2fd2bdb5cab61aea1dff18b5547ecca10b5241089faaf38b5bbdeae87,2019-10-09T23:32:58.023000 CVE-2018-10634,0,0,dbf91e3a43c4a21fe71aa8101832ac784079b0a7b3ef862eb4679a3c2b89877a,2019-10-09T23:32:58.150000 @@ -137531,7 +137531,7 @@ CVE-2019-20630,0,0,dab2ad4e6a925ae80e11dd7e6603c0dd4f11559350fc0c953ec95e0fe3b90 CVE-2019-20631,0,0,c71855aeac060c920b1352f0cfd1ec956ad53b765f21de8c8733c337891d7f43,2020-03-25T13:54:14.857000 CVE-2019-20632,0,0,3ffb0d2b1147273915caf0fc7b385fa9217dae9e36ba04928734a123f3c130d1,2020-03-25T13:54:19.450000 CVE-2019-20633,0,0,7c9f60dc28c23890a0f8158673243e87c717dd910883660f2c4404e396cb7555,2020-11-05T14:54:57.643000 -CVE-2019-20634,0,1,fec84566e83fcb49fa77f88af177270e9be046f605f0a7a97542788bfa0053b5,2024-08-19T18:15:09.837000 +CVE-2019-20634,0,0,fec84566e83fcb49fa77f88af177270e9be046f605f0a7a97542788bfa0053b5,2024-08-19T18:15:09.837000 CVE-2019-20635,0,0,39eb51ed0631da25fe80299da31306848ce735422315f020d08e4106f2240029,2020-08-24T17:37:01.140000 CVE-2019-20636,0,0,21c98cc4804a1a28669f4ab5fbdf616ad07942e8adbae364ccfaa032cdf02c2a,2023-11-09T13:57:20.637000 CVE-2019-20637,0,0,cbab22fdfd25776b6dc44d4b1073259cf92b027113b0b980d492d2987280eb45,2022-08-02T19:03:41.127000 @@ -187429,8 +187429,8 @@ CVE-2021-47580,0,0,e0ba4a70a306169a72b59c906d22256e1e9ec63a836b279525125573202bd CVE-2021-47581,0,0,8787010fa1b837c9433128d0d20bbbc5cc367d055ada39f1bbe864fed14da829,2024-06-20T09:15:11.057000 CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af77d,2024-06-20T12:43:25.663000 CVE-2021-47583,0,0,31fa0416a87d3ac15f0275ea6141b29b416ea02761d8c7a0b7bebf09c972c897,2024-06-20T12:43:25.663000 -CVE-2021-47584,0,1,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000 -CVE-2021-47585,0,1,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000 +CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000 +CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000 CVE-2021-47586,0,0,43a350738cd92215883dae2d0f75b2537927b72a55c6c8b78e203743018315a0,2024-07-03T01:38:11.913000 CVE-2021-47587,0,0,b30550a10bae30fdaddfdf1118241fdecdb0aac764064035e93107f946fad012,2024-06-20T12:43:25.663000 CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000 @@ -187441,8 +187441,8 @@ CVE-2021-47592,0,0,3e6a900f856612ffa91a686567e21f4c94ed7d6a279efc65d48294ed49768 CVE-2021-47593,0,0,d7a43d01ab4a125b4e19b7cc66507d59f9c795640b357b5f69d8e118285d751e,2024-06-20T12:43:25.663000 CVE-2021-47594,0,0,39ee68b0bea20520811a251d6cea7a263960b1fe82747511fa8952fffe9e3729,2024-06-20T12:43:25.663000 CVE-2021-47595,0,0,a5c7de083f6b9294a72a621ab5d4d3b5d2e23f529c737eb80cb272e2bd0ff631,2024-06-20T12:43:25.663000 -CVE-2021-47596,0,1,1907e3f165fb4e5b48753df6fccdd2af7df1251b38a69b71dafcd90b678b1e72,2024-08-19T18:22:13.667000 -CVE-2021-47597,0,1,17331943a100612a59f274fb29e9b045b8ef7bffba10c35fde978c62c3806ef0,2024-08-19T18:15:30.577000 +CVE-2021-47596,0,0,1907e3f165fb4e5b48753df6fccdd2af7df1251b38a69b71dafcd90b678b1e72,2024-08-19T18:22:13.667000 +CVE-2021-47597,0,0,17331943a100612a59f274fb29e9b045b8ef7bffba10c35fde978c62c3806ef0,2024-08-19T18:15:30.577000 CVE-2021-47598,0,0,a11d1fd0dd392d97c78d49ebb7cdc7720f2bc74b0ee3faf4bda5c5c7371150dc,2024-06-20T12:43:25.663000 CVE-2021-47599,0,0,08ed62254e7ecb9b8e7d1adde943234640f9a513c87ff0831ce11a99dd48bc77,2024-06-20T12:43:25.663000 CVE-2021-47600,0,0,cb53f69ff006a57c9bde8868814a2c7504095444dc2ff563775eea7bdd373c21,2024-06-20T12:43:25.663000 @@ -194036,7 +194036,7 @@ CVE-2022-25028,0,0,8d46d339c4c5524f8a2c9f2d56af645be4c25c19bbd1aab9baf79b3fdde9d CVE-2022-25029,0,0,4f5ebeabd557699e2691548f246212aabc28faeeb68ba1ce26e296cf83025c35,2023-11-07T03:44:43.777000 CVE-2022-2503,0,0,e5d7de9bb954e10ce8ff1af61305cc8d604d34179c029b7c85941e33c8645199,2023-02-14T13:15:10.920000 CVE-2022-25031,0,0,11831fe23c98bb2f83d36e26fa6d73b5b7ef122b13991d3c195134577b498c6d,2022-03-09T20:09:58.927000 -CVE-2022-25037,0,1,b2ed585030daabbb7d96476f093899a863967f803d3459702d41efdc72314dc6,2024-08-19T19:35:02.193000 +CVE-2022-25037,0,0,b2ed585030daabbb7d96476f093899a863967f803d3459702d41efdc72314dc6,2024-08-19T19:35:02.193000 CVE-2022-25038,0,0,d4ef5d26ced29c463b76ab9e49c88e159235454bb783bae2b05d2fe11de9ef7a,2024-05-31T19:14:47.793000 CVE-2022-2504,0,0,fc0576f3b04bc0215c64e8eac32767b7e3e92fc531faaaa3da38a353d2a8f3bc,2023-11-07T03:46:37.600000 CVE-2022-25041,0,0,c7230f4463dec3a15269bd0ce972ed91cee22d14918683d272cd1954c5e8fc4e,2022-03-29T13:50:33.407000 @@ -212058,7 +212058,7 @@ CVE-2022-4857,0,0,d3d7195d47e3222f9de69f0033f78ca09484aabcea340c176cc03125420a41 CVE-2022-48570,0,0,db87434b4c0fe6d6524e72393a7b479edec1ba6b542654db52e0352708bf9f94,2023-08-26T02:21:54.680000 CVE-2022-48571,0,0,8c7b1ac787ddf1d6a16f1e133112b367842b4fac62aa1cfd5a86680aa81cbb91,2023-09-08T01:15:07.393000 CVE-2022-48577,0,0,cfbe75862327245c072ce5c172b7ef02b77ac4154d075f57893f5eb8d2edae40,2024-01-17T17:59:46.343000 -CVE-2022-48578,0,1,a845c231353cdca07d74c49f3b6a11f7965a967f3271f1be7a7c23530bc6a615,2024-08-19T19:35:03.153000 +CVE-2022-48578,0,0,a845c231353cdca07d74c49f3b6a11f7965a967f3271f1be7a7c23530bc6a615,2024-08-19T19:35:03.153000 CVE-2022-48579,0,0,c8c8cb08baf6eb8cbe4aba91c8a7c56372c2bbdfd971b2fbd59995e2aeebde3a,2023-08-17T19:15:09.937000 CVE-2022-4858,0,0,e0ab0e7bb8857624f6d61e10c12153fffbe4eebcb4b66788481e5d3ef5041ff3,2023-01-06T20:37:55.853000 CVE-2022-48580,0,0,664a1c84f2e154c232999533b71cbc2bb99e38f547b934ddab2d305e4cbcfb89,2023-08-11T17:39:26.760000 @@ -217792,9 +217792,9 @@ CVE-2023-24058,0,0,16a1b8d2c8f6e9521afc5ad7d9e751bc2a2f51cc265db69a156ca23c3660b CVE-2023-24059,0,0,85c8b3c7e51d4493812abc1130db36e5e554ca89f20febe06dc7c3c22cd7b3bb,2023-02-07T14:19:00.787000 CVE-2023-2406,0,0,93360eeb7d23c99f5e3d8592b06b8d380a992d1764480465d68abc46a85ae39a,2023-11-07T04:12:36.890000 CVE-2023-24060,0,0,237020e686b9d1fc77a983ae9b232c7b16e133620015d99d897981c2e94f39f4,2023-02-07T19:13:09.287000 -CVE-2023-24062,0,1,7349391aa1b91dc2f7dd35a217ddf473498cadeb29f5897b6dc518a785304759,2024-08-19T19:05:06.027000 -CVE-2023-24063,0,1,c7aaa53e06b05b465c4c303b4d1d80d1b86df5b05165165b121a99c122768787,2024-08-19T19:04:47.293000 -CVE-2023-24064,0,1,ea608bd85f328e25ad346566e820e40989eae34a1962a7913afeb3fd2bab99c5,2024-08-19T19:04:26.627000 +CVE-2023-24062,0,0,7349391aa1b91dc2f7dd35a217ddf473498cadeb29f5897b6dc518a785304759,2024-08-19T19:05:06.027000 +CVE-2023-24063,0,0,c7aaa53e06b05b465c4c303b4d1d80d1b86df5b05165165b121a99c122768787,2024-08-19T19:04:47.293000 +CVE-2023-24064,0,0,ea608bd85f328e25ad346566e820e40989eae34a1962a7913afeb3fd2bab99c5,2024-08-19T19:04:26.627000 CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000 CVE-2023-24068,0,0,b2dd8c07d421160046d625a68ed657194371f600a0afa0ab50e87ec10b29f09d,2024-08-02T11:16:10.173000 CVE-2023-24069,0,0,31c87c9ec1a1f4e0e7ca7308f0b22f9d6b11a20fcdca63dde72ea3afa1217817,2024-08-02T11:16:10.287000 @@ -221702,7 +221702,7 @@ CVE-2023-2886,0,0,477489445a6f471cd3651b117fbf09416c16a3d7a4e7e46e8dd7486e10c87d CVE-2023-28862,0,0,1af0d4a2a1f54e0c65748ae11dcf6c8d306e7ce5050f714cb8bd21304ffd2ff4,2023-07-14T13:15:09.167000 CVE-2023-28863,0,0,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000 CVE-2023-28864,0,0,324e76b8a1dbbfe673722acba31555a0a11e3e449df86950e1771c91d26b1827,2023-07-27T03:47:50.647000 -CVE-2023-28865,0,1,59f5aced1e9a27fe6de504aed10505799d2bbf17503d0ef304c45bed22fc30c9,2024-08-19T19:04:14.230000 +CVE-2023-28865,0,0,59f5aced1e9a27fe6de504aed10505799d2bbf17503d0ef304c45bed22fc30c9,2024-08-19T19:04:14.230000 CVE-2023-28866,0,0,943391c7b240adde0202bacb48afef5edfa2b7d2d32f1761a9ddbf651b944ce4,2023-11-07T04:10:55.740000 CVE-2023-28867,0,0,318a66eaa8452f89942f53703d11d40849d2cc65087bebb0348dcf4f3572c7cb,2023-04-03T14:01:07.433000 CVE-2023-28868,0,0,e275a03d8640a97b2d96fd845bc40f2c87b07888c0c512aa8d3aec81f7c1a577,2023-12-12T22:35:26.717000 @@ -222457,7 +222457,7 @@ CVE-2023-29863,0,0,b6bd6db6fe2aa7aa1a7d0ef7f07320fd9e38d1757d797078c9c9d4ac89842 CVE-2023-29867,0,0,30bdd4671fa6ae8d6d7fe7ab8c6abbc099ab141455a1d91de242099deb5b9a58,2023-05-10T17:26:40.840000 CVE-2023-29868,0,0,b913231836e85a95731d1a9f12ce4a8ef604e06b122d2d10140103e01bb2e99f,2023-05-10T18:45:38.753000 CVE-2023-2987,0,0,d15bf4014a51894f8c9ff162f2ff39355cece540b744a609503a1e837b355e50,2023-11-07T04:13:38.867000 -CVE-2023-29881,0,1,3fc30b0a8f12aa0ac550ace90faf269831400078ee885524aede4cd15e16b48a,2024-08-19T19:35:04.057000 +CVE-2023-29881,0,0,3fc30b0a8f12aa0ac550ace90faf269831400078ee885524aede4cd15e16b48a,2024-08-19T19:35:04.057000 CVE-2023-29887,0,0,5f6b06d8da9e96c6f44003a0f462b5937b093b6455d6dc3c8b859c8adea2a5c8,2023-04-27T17:15:31.560000 CVE-2023-2989,0,0,130389ac3f15e894f9cec47ed762614f99841e8cdfeaf9811d9eaa160be1ed98,2023-06-30T19:21:06.163000 CVE-2023-2990,0,0,9ae96a18830a05f9d0e3eab19f64ddd3c8cb68e494372564a399949075dfb111,2023-06-30T18:38:30.917000 @@ -225010,7 +225010,7 @@ CVE-2023-33201,0,0,2597fe221e1f761d6b3e6cbfd030eadf4704e1547f552dc061c463420a08a CVE-2023-33202,0,0,e7e7f7c9ba650dcbf0171405662b00bcdfd5e41c4d322835f858a2d745b8a7ec,2024-01-25T14:15:25.783000 CVE-2023-33203,0,0,cf97be42175c0d354e6941d64dd260b17cae783a76d09f7b56e470976d97a999,2023-05-26T16:52:01.157000 CVE-2023-33204,0,0,6e4260f72baf73d6ea1ccb7950395df7ee85b3280176ec814ba5c18c1ed8d5f6,2023-11-07T04:14:46.243000 -CVE-2023-33206,0,1,670ad2f1fc71a5bf4d899271f0a39bdcd73d0caee633ab08fb67daade5aa74a4,2024-08-19T19:04:03.527000 +CVE-2023-33206,0,0,670ad2f1fc71a5bf4d899271f0a39bdcd73d0caee633ab08fb67daade5aa74a4,2024-08-19T19:04:03.527000 CVE-2023-33207,0,0,db833585ca058f88a52ecdd20945cb37b2537bb7bd89e56de798e340453ba00b,2023-11-16T23:42:11.750000 CVE-2023-33208,0,0,452d00abc7c8385efc2c332f0818f4d3115f3a0e717b56374cce97c1d1eaf069,2023-08-31T18:40:52.317000 CVE-2023-33209,0,0,d8369996175c8373d5bfa6cb0ed4b69f08c78793d48f6b2cda42411d5f915879,2023-12-26T21:36:15.107000 @@ -229242,7 +229242,7 @@ CVE-2023-38940,0,0,9efb76eb7ae856d8f0701f4b9801fa50e5a28e05a1b18d89f2c215ccdfe76 CVE-2023-38941,0,0,1e1bcd179f872e35a8928ee921ca22ff72d442a73f2b7af7bd6b466055edd860,2023-08-14T18:17:39.230000 CVE-2023-38942,0,0,6f005f6e840b09796632754d285cd402b68e77792b4af4d3af0fa7e97c65080e,2023-08-14T18:40:24.287000 CVE-2023-38943,0,0,1d6e8b0ca705baa11d68ef0a995ae67cd6dd1d27d4ad115cf35db0b2d10a2f29,2023-08-09T17:16:40.333000 -CVE-2023-38944,0,1,83cd17756fabb3bd2974a12241e6d8ad285f34ab1c1e3d0bfb562b70cd2a7d04,2024-08-19T18:35:01.477000 +CVE-2023-38944,0,0,83cd17756fabb3bd2974a12241e6d8ad285f34ab1c1e3d0bfb562b70cd2a7d04,2024-08-19T18:35:01.477000 CVE-2023-38945,0,0,b3443492f84cec4ac4dffb7d4608c3ecaa5fe5f2b22d0a972664663aaed158e3,2024-08-01T13:44:18.370000 CVE-2023-38946,0,0,151228275f9811254ab62028e457be29c69ef82c0b6dea78d5f804e8214b4750,2024-03-06T15:18:08.093000 CVE-2023-38947,0,0,005c7add3837054ed831ef7b615204f6da8a70df53969f423ee6e7fa00969cdc,2024-08-01T13:44:19.173000 @@ -230235,7 +230235,7 @@ CVE-2023-40254,0,0,27efb0368168d79caa00b4133031d8fb68b34ecfd132b042a5961f412575e CVE-2023-40256,0,0,b582804fa33a295156ceb4267c834e483bb86e84c99d0ec7c8c39444912512fe,2023-08-18T18:40:02.253000 CVE-2023-4026,0,0,3212945c551dc5c1719d7d6137de0348751110a933425a5bf5f780d8b6cb15ce,2023-11-07T04:22:03.850000 CVE-2023-40260,0,0,05bb0576fb08380ea903522d60f06a904bc360b72ae4772cbb05cfc33464fa32,2023-09-20T21:15:11.697000 -CVE-2023-40261,0,1,e2782dc62275309ee61018d210c639435789bcc850830eece2e723e46b82410a,2024-08-19T19:03:54.307000 +CVE-2023-40261,0,0,e2782dc62275309ee61018d210c639435789bcc850830eece2e723e46b82410a,2024-08-19T19:03:54.307000 CVE-2023-40262,0,0,d58d63bce35087dda362e1111aeac9b1b75c4bd8ea1442d999e9a4301c6860b7,2024-02-15T04:33:52.467000 CVE-2023-40263,0,0,5624dd31a999eb07813388b5a3ed101dece0ae7506f50c2ff15d5500eaaece55,2024-02-15T04:33:23.013000 CVE-2023-40264,0,0,f7a83c86b7c4bdbb55bbbd88d882459ecf055d59ca4c58a5bc50d5b8349b6af0,2024-02-16T20:56:44.780000 @@ -230250,7 +230250,7 @@ CVE-2023-40273,0,0,d1efd309979d86acc3f5a21eda89b107ca70fabd17da2ac82c7c1040e6816 CVE-2023-40274,0,0,f20f5b1641662d852a3d92ec12b3069f4904a342ddf85c169c1d25358b0bc60a,2023-08-22T17:47:49.207000 CVE-2023-40275,0,0,bb235e4d61f5beda262b4c42a88b68d3e4b0c5cc4d47ebabd44e56511d114a27,2024-08-01T13:44:29.067000 CVE-2023-40276,0,0,8b131353126c20994a155484503a1c13d031f7db2c404f8e6c7f2ef2856df41e,2024-03-19T13:26:46 -CVE-2023-40277,0,0,367dfb7488afc815bd8c4545b147e2406ff15f260fa0d2925d2bf3019e8c4d39,2024-03-19T13:26:46 +CVE-2023-40277,0,1,60eed7a29cf2ed35aec3968903bd9b68a8b50e4f0cd8bc78f4cfd207e2f7643d,2024-08-19T20:35:00.570000 CVE-2023-40278,0,0,41d387aaf3943c453b5825c77eec780252ce5d033aec5d9317b605a24ad29b16,2024-08-01T13:44:29.937000 CVE-2023-40279,0,0,e12f0163c25ba05fe97fbc761253a7ac429929955a8e1591b432eb282bd99375,2024-08-01T13:44:30.750000 CVE-2023-4028,0,0,3db9881eb13cd2c545d4062dd4b39101a44069634f91a12bd1293e0ee41a1646,2023-08-24T17:53:34.333000 @@ -234263,7 +234263,7 @@ CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000 CVE-2023-46046,0,0,3bc45ec9592baeab7ef720efeac1a7d65f4f02d8606730aa13f5baaa81584553,2024-08-02T21:15:48.963000 CVE-2023-46047,0,0,f5c37c94ca5fa594b714e2ffca7c2bdc6f46a8bdd28b18487a40447ff0803b85,2024-08-02T21:15:49.040000 -CVE-2023-46048,0,1,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000 +CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000 CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000 CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000 CVE-2023-46050,0,0,87b655fafc2924f1174e71a2efa862ed9e13b897c527143d58a0e534f2058a50,2024-01-29T09:15:42.640000 @@ -234935,7 +234935,7 @@ CVE-2023-4690,0,0,500f1e79f1823e2a407873fa6dc7c8ea88ad14d4454d4d967c05e66dedd2d1 CVE-2023-46906,0,0,1ff6b0263877a6a78ef601f28f7dbabdd405bf82256e98e7e982bca99771fb7b,2024-01-12T15:18:52.410000 CVE-2023-4691,0,0,40fe8c31646049ce1b16d652ffe2746d0b02c6ad23826b1341a85e35fd5e4763,2023-11-07T04:22:50.453000 CVE-2023-46911,0,0,5e98412d8bb7be61579166a550d12222b044cf2efd12c07fda8c46233347a718,2023-11-08T19:46:29.690000 -CVE-2023-46914,0,0,398e83410e96bdd65edc3b1f45f71f6b2dc2091aae95ac755daed3ebd4d87adc,2024-02-14T19:27:09.817000 +CVE-2023-46914,0,1,06ea53bf64d4ff048ea82d8fe3407edfb1c3ef18af67091309f1f29b19d84703,2024-08-19T20:35:01.527000 CVE-2023-46916,0,0,8ef2fea4e9dd7d1776e407204e1bee36588ff20bc447a3354d9ff4ad9509b59b,2023-12-12T17:03:51.163000 CVE-2023-46918,0,0,cd6a07efd1b21047163ed5a04e7defce33f03ddbfb8bba6e9c5fab048c00775c,2024-01-05T17:24:42.153000 CVE-2023-46919,0,0,0e166251c6564655a5dd84279d0c784af57877d697c5831e0469e8359450786d,2024-01-05T18:35:20.857000 @@ -236188,7 +236188,7 @@ CVE-2023-4864,0,0,5e4e713f4a2743c129ea5063a4b32fd9ee7eae9e195855039cc002046cb1f0 CVE-2023-48641,0,0,1280df4608a256049a7464d7537771600ec8e87866846aa2fb4a0136aea0d500,2023-12-15T14:28:15.560000 CVE-2023-48642,0,0,6f82232b5872cfe8a5f483ecc51e89fbf83ed70bb3fce6aac912fbf0e65fa058,2023-12-14T18:38:31.893000 CVE-2023-48643,0,0,436dc591bbfe7d4fe8956e77d2a22242bc9894e1b5e9d57becef353a8713de84,2024-05-17T18:36:31.297000 -CVE-2023-48644,0,1,5e5be15f1fbc02e79c5730bd0794299024e6fb4586d04faf70253bc9e2410791,2024-08-19T18:35:03.937000 +CVE-2023-48644,0,0,5e5be15f1fbc02e79c5730bd0794299024e6fb4586d04faf70253bc9e2410791,2024-08-19T18:35:03.937000 CVE-2023-48645,0,0,445aa31383b8447535cd8a3988f7064641e17b0494ae077756994bb7ce4d7c45,2024-02-13T19:49:02.557000 CVE-2023-48646,0,0,3a5f0cf1d315027926be603dd291473218201c9c601aacec84430dcecba9a7e9,2023-12-01T19:02:22.553000 CVE-2023-48648,0,0,4a328c299a7d953fe36026512a40a258a38a0ae65a9f563b40d819752bec1baf,2023-11-22T00:06:56.547000 @@ -237113,7 +237113,7 @@ CVE-2023-49967,0,0,747a56ed33b32c4d1b311fdebeb305be64d8bfa851a5ebfe9be1ea5d7affb CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6cfc3,2024-03-05T13:41:01.900000 CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000 CVE-2023-4997,0,0,4afed0de14254e77a99b729070c5643ffbf1676389fe16cc856891c73125b6a9,2023-10-05T17:04:09.880000 -CVE-2023-49970,0,1,9df65b805c69b16aaa9364a0bc6f24d112184b4ed3304e8005e33d72286d9f69,2024-08-19T18:35:05.600000 +CVE-2023-49970,0,0,9df65b805c69b16aaa9364a0bc6f24d112184b4ed3304e8005e33d72286d9f69,2024-08-19T18:35:05.600000 CVE-2023-49971,0,0,374def7d9c689df8f58cc4989e4ea0ed3c5a8e848866980b25656660a7f6c663,2024-08-06T14:35:02.513000 CVE-2023-49973,0,0,ca1ed5b6df9a46488025a136b2ec31b6790ba3cc516f6b9d8e6dd1ad7f0f7877,2024-03-06T15:18:08.093000 CVE-2023-49974,0,0,083867d392522ad7619f542837964c1e212931b3849e0d016c825b75a8d2f854,2024-08-15T21:35:00.653000 @@ -239197,7 +239197,7 @@ CVE-2023-52885,0,0,bf364685107e55e770da1015b2b20f820b2146198fe7433439069c5b8fe9f CVE-2023-52886,0,0,c0f7ffc4b4733226d4691afd6753bdd5f0e8d9d99822dcd9469cd60c70566a43,2024-07-16T13:43:58.773000 CVE-2023-52887,0,0,cb846ee4e76e369153e430accd03bef53983c1edb90492817231cbcbd98213a5,2024-07-29T16:21:52.517000 CVE-2023-52888,0,0,22b49aaad0de331d634875ed02b1dd2b64a739107c93a24ad94d1777a415da3c,2024-07-30T13:32:45.943000 -CVE-2023-52889,0,0,bf6772b9a6b09c0aa782d71426107afa4010d55458a6c82fa2dc2fd6f54bad70,2024-08-19T13:00:23.117000 +CVE-2023-52889,0,1,ad1cde02a64052b28564d8e8a7e2af925007327c5229809929326bf9b8081627,2024-08-19T21:19:16.970000 CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000 CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000 CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000 @@ -243154,9 +243154,9 @@ CVE-2024-20782,0,0,591198da9de59648b78059d67fcba2ae1e63c8a4ae642e9b553df4f8e697e CVE-2024-20783,0,0,ef4c6477d397b423923703c7f26adf752529466272be0c0857be9467ab24edc8,2024-08-02T20:17:12.873000 CVE-2024-20784,0,0,c6884bc627ed39cae939efd566f5b968239c6eaef242b82fbe3791e77cdfc6fc,2024-06-14T19:30:15.503000 CVE-2024-20785,0,0,2013df6eaaf2d2be10850161c767601a113a3dcbc6d19bf74fca25fa02ef32fb,2024-08-02T20:17:44.283000 -CVE-2024-20789,0,1,2be0d33fe7f6a2ca915ce1bc566125c1928c2c16133fd8fdef1172ad2e465f0a,2024-08-19T18:59:05.617000 +CVE-2024-20789,0,0,2be0d33fe7f6a2ca915ce1bc566125c1928c2c16133fd8fdef1172ad2e465f0a,2024-08-19T18:59:05.617000 CVE-2024-2079,0,0,f10772ba31d142dba517b938901fc1b75b6b0e63ac1ac474e47c5b00d72243ad,2024-03-14T12:52:16.723000 -CVE-2024-20790,0,1,3934bc21914c68bc7f6c87d335433310d3f22ed71eccb1f27568a92329715bb0,2024-08-19T18:58:42.660000 +CVE-2024-20790,0,0,3934bc21914c68bc7f6c87d335433310d3f22ed71eccb1f27568a92329715bb0,2024-08-19T18:58:42.660000 CVE-2024-20791,0,0,92abf004621866415738accb490ffa897670b25d1da0d09c1386df503b25c235,2024-05-16T13:03:05.353000 CVE-2024-20792,0,0,bbcbe3e347c35cdbd78689d4241ba7bbcaebaa332d073a09d58f18df55de2fb4,2024-05-16T13:03:05.353000 CVE-2024-20793,0,0,af9be83b5ef185d84e14e7f39339429b5b48170bf7e6c7a259e576409d3e12ab,2024-05-16T13:03:05.353000 @@ -244311,7 +244311,7 @@ CVE-2024-22213,0,0,d89d1bcc1024fa43e4eb255fe1da4898df98a0204835a8aab97986ad487a9 CVE-2024-22216,0,0,4d4df2ecd199aa7618581804013bbe1e953dec7e554571ec3898fac4c64e9d2a,2024-02-15T20:09:29.663000 CVE-2024-22217,0,0,efeff8a61ce5eec295d77307c66eb2e8058ec26847d7270526961b6e3c0af923,2024-08-19T13:00:23.117000 CVE-2024-22218,0,0,803acdddb5a13426e90ae4cd1826dd9ea4a7cb915a128bae351c036e85dd5ae5,2024-08-19T13:00:23.117000 -CVE-2024-22219,0,1,826686450319c86e80f677bb7cee6144e6dc3d5c8e9c3dfd411b78482003182c,2024-08-19T18:35:06.827000 +CVE-2024-22219,0,0,826686450319c86e80f677bb7cee6144e6dc3d5c8e9c3dfd411b78482003182c,2024-08-19T18:35:06.827000 CVE-2024-2222,0,0,11625875cef37d942ee187e2a94de316442ea87eebee9bbcb3de8eb5e07a3e6e,2024-04-10T13:23:38.787000 CVE-2024-22220,0,0,e0b3c07a0f10db72074be82e1806c7e64ff7ce617eafb3be6d3de0ce93866b95,2024-02-22T19:07:27.197000 CVE-2024-22221,0,0,e19edd26a1c4c3dbc422242510974e3878733456edd7e30a89f97b0340db2a37,2024-02-16T13:40:34.093000 @@ -245058,7 +245058,7 @@ CVE-2024-2344,0,0,11b204885a38ce76288439d7d97d1d84c5464a602f99eb484aa99b808d016d CVE-2024-23440,0,0,888cd3d174129643abdafcbeddc64e6f21d5ae8e2b2e370f6f7b930a90b3e30a,2024-02-13T15:16:05.223000 CVE-2024-23441,0,0,390d5d2bcc3b1398b0150c0f0c98b785cb9627d9865bfc83ae73159a1a10f10c,2024-02-05T18:41:43.547000 CVE-2024-23442,0,0,5f8a68032ea653fbe64c514e7b6426371d76626b34b59cc1abb65dea78329a83,2024-08-07T16:32:00.580000 -CVE-2024-23443,0,1,ec52c90b1bdd9302a1feb9cf7a1a344bef4f50d5729b639a22d6f8e35b652893,2024-08-19T19:33:31.207000 +CVE-2024-23443,0,0,ec52c90b1bdd9302a1feb9cf7a1a344bef4f50d5729b639a22d6f8e35b652893,2024-08-19T19:33:31.207000 CVE-2024-23444,0,0,9d04c210297b8378296ccd9e937d21ef43ab4badaaad1c5feb386881ba03d55c,2024-08-01T12:42:36.933000 CVE-2024-23445,0,0,6c527df37925bfee88abbff37b4b4e377f6526ae267b170f8c243c193159d3f0,2024-06-13T18:36:09.010000 CVE-2024-23446,0,0,4d7124defa0cb48f303fd49a5701937ff8d343d7ed35efe26f93d719e40bd716,2024-02-14T20:10:24.323000 @@ -245301,7 +245301,7 @@ CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c0 CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000 CVE-2024-23726,0,0,49bfb3e940abfa1d8c182442ad4bd7c2d671bcc24ce62cd25d7197deab52125c,2024-01-29T15:25:36.090000 CVE-2024-23727,0,0,f69939e0ef14dd6612a53b973d502454f89e1f35e963c0b541f012fdf69dd089,2024-03-29T12:45:02.937000 -CVE-2024-23729,1,1,f8f87db100d899a0846e36f48d3117d1ff3456019c14cf716da7eccddfd2fdeb,2024-08-19T19:26:46.993000 +CVE-2024-23729,0,0,f8f87db100d899a0846e36f48d3117d1ff3456019c14cf716da7eccddfd2fdeb,2024-08-19T19:26:46.993000 CVE-2024-23730,0,0,4088c5b420c8561e609e86e9e6639362f96648106817a43f2c436ecb5e3da5bc,2024-01-29T15:22:56.753000 CVE-2024-23731,0,0,9e444542e77d768ae255d5361c86689c30d0d3ff31dd7c8827b69cb99e58f1a3,2024-01-26T21:11:25.430000 CVE-2024-23732,0,0,02703c2ad5218c00fbf227a383e9ac2f87b400985304eaa4f21127fe5bfed2aa,2024-01-26T21:11:51.840000 @@ -245518,7 +245518,7 @@ CVE-2024-24000,0,0,d0de83d12aad2aabc5672cbb661c0fdffc75d5f5e1df363eb030e7cdff4bc CVE-2024-24001,0,0,eca8bdd656d27f4f67b95705b79f8b7968de0e89b44524f72d6dd68ffca458c2,2024-02-09T02:10:25.807000 CVE-2024-24002,0,0,d5830bba636a6b9a2bcadc13ffe07f067d2d633278d6d85f9dd406efe5d2eda0,2024-02-09T02:10:13.973000 CVE-2024-24003,0,0,7f4ba6db13c5a10556cc6fe3708acc3a563d26fbaadf4e0988dc3b7b23f87fd8,2024-02-10T04:00:43.837000 -CVE-2024-24004,0,0,c25fb6f51c00a147a1b6ff37c49aab3d925f9b71034dfd20a0dcfa630c39ce5e,2024-02-09T02:10:07.263000 +CVE-2024-24004,0,1,5c85467ca321bcd6c3c40ec1ba73ffa40477ac08593935980ad79cdc39aed016,2024-08-19T21:35:02.860000 CVE-2024-2401,0,0,c363a50dfd91f1dd653b2efa179df5e550e42c637cc55d653d48d0591c402480,2024-05-02T18:00:37.360000 CVE-2024-24013,0,0,e50ab935bddb712c7d096d8dae346284a9ea6118a4f4e6139e0e17ae98a94119,2024-02-10T04:05:10.963000 CVE-2024-24014,0,0,2254f915085796285b123ca5e05751b02b0d81d0dccf22977e9ea29f889e3030,2024-02-10T04:00:34.467000 @@ -245529,7 +245529,7 @@ CVE-2024-24019,0,0,f7d524e99ee9469f902506a2564eea181d03a93dd9aaf0d0017baf7a52b53 CVE-2024-2402,0,0,df08564cd50bc510e33f7e2bf771c364246af0166a116c323f50615d32c9f1bb,2024-04-24T13:39:42.883000 CVE-2024-24021,0,0,9ff2fcb0b3f701136e7c1af508590d1c0d49240ce75f0784418e54285102806a,2024-02-10T04:00:25.390000 CVE-2024-24023,0,0,8968b91dff4b50bead2e0c4cc14c4f8f79738a4ba6f10ca830b8d8c596be53aa,2024-02-10T04:01:00.617000 -CVE-2024-24024,0,0,5d7618842d27358dc9797514a8c628f19ae322d9f1ef2c0dd4d885cb4d7cf96b,2024-02-10T04:00:58.077000 +CVE-2024-24024,0,1,54797987dfab0043520f2b481266093ad88b83f5fdd601dd22b176c0ad5e0032,2024-08-19T20:35:02.680000 CVE-2024-24025,0,0,9b89c3d08fac97c1e03f0707e75e95bff43f9e9dbc2af99033dd3b0a8fa0b6e9,2024-02-10T04:00:53.677000 CVE-2024-24026,0,0,f0c7b4962bf46fd399edc3d589cea9caaa0165db3ebf0c055fe62402b98d0d7e,2024-02-10T04:00:51.220000 CVE-2024-24027,0,0,e1de0d89edec32d7960c68cefaa6dc4d7fbc32960e89d67536489aa6ad15fe7a,2024-08-13T21:35:01.230000 @@ -245589,7 +245589,7 @@ CVE-2024-24149,0,0,88ecb47947af05614cae359d076a027f161e62a67519dba09a75672f5d1ee CVE-2024-2415,0,0,c558bdc444f1b504fdb58826094fd6354f995348e8626b08c069328ff4e39fde,2024-03-13T12:33:51.697000 CVE-2024-24150,0,0,57d27c8e6078b73446ecc07e4ad11630c532b92e8ab5a1cac8386f4fab70f142,2024-03-12T14:59:55.920000 CVE-2024-24155,0,0,2c63d7924f0cfbcec05c8391f1806e0f50aabfd2ca7e4c7b5af6f390f137d171,2024-02-29T13:49:29.390000 -CVE-2024-24156,0,0,4feb5009da24929041cc5d4962d770798c1dae23cf3116b401a58b8370b3f5db,2024-03-17T22:38:29.433000 +CVE-2024-24156,0,1,4d905495fcc21ea03b392e5dcfb4049afb36c88ec6395d026fb3a826675269b3,2024-08-19T20:35:03.650000 CVE-2024-24157,0,0,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000 CVE-2024-2416,0,0,509b47b2b38dd8150594dfd075dd7f079b3bbd22e8420f2d63fb8a39e8d3ccb0,2024-03-13T12:33:51.697000 CVE-2024-24160,0,0,7c88f71ce4e0f9896f5d56feef096864825bd2b7d5a05dcd59bafcd16cdd941b,2024-02-06T20:59:08.493000 @@ -245606,9 +245606,9 @@ CVE-2024-24195,0,0,27a96813936cec6833414370d612b8d8437a2d6d783291e3d87ae5c3f18a6 CVE-2024-24198,0,0,89bf99a096d242b773b4065a04eb49ef0fbc76e97974c5cdd5f984caaf83efdd,2024-06-07T14:56:05.647000 CVE-2024-24199,0,0,7ba43404c5022da254878ea129b205d46b0f249a8f3526c8415be3cc2a20e0ce,2024-06-07T14:56:05.647000 CVE-2024-2420,0,0,13b83832dbf3c227f1bb0a786d7224f8bb2d919ddb4e3730a2d048cbbb3f3674,2024-05-30T18:18:58.870000 -CVE-2024-24202,0,0,56d93988b530aa4bc77fbdec19ad99de7829995c8ee61cfd17d6d8ef1b3a88d9,2024-02-15T15:24:30.247000 +CVE-2024-24202,0,1,668325610a66240d6d1186abf034222333d655c33a74fab67ccef821464427c8,2024-08-19T20:35:04.473000 CVE-2024-2421,0,0,d6a9f4a7ca738e43373fd351f7d51d46e3ad2798d84cdbebb07a7724c675a343,2024-05-30T18:18:58.870000 -CVE-2024-24213,0,0,035148c56a7993c2339f51fc26291b5afb7b33a8844b606799ef8148ccc0d5b2,2024-08-02T00:15:16.890000 +CVE-2024-24213,0,1,d5ccd9f708e2b9d65c48f3e32baebad9ccd6f168c64cfcf1e8034880e685b5c1,2024-08-19T20:35:05.230000 CVE-2024-24215,0,0,85b457ffd0214deceb92715f93f3b98e9ac0926a8e517f205498cdcd7f026571,2024-02-15T18:08:47.813000 CVE-2024-24216,0,0,cc96bdba0be53e21ec4f72b549cd1780854565b7b4a6c5081be7a211ccd03725,2024-02-08T13:44:21.670000 CVE-2024-2422,0,0,3cd5f28c31482f281d8aa1c4c5b76e9420ca9d6bd73cdb7ceb049f2a4aab7203,2024-05-30T18:18:58.870000 @@ -245683,7 +245683,7 @@ CVE-2024-2437,0,0,f8847cfc571efb0748e80dddf49606f1b1d23e67cbe423ea421c492b33132d CVE-2024-24375,0,0,ad5ee202e46b5b513bc90dbcc88b708556491f9e180ad6c740a3447fb679b4a5,2024-03-07T13:52:27.110000 CVE-2024-24377,0,0,70cf7fc250bbbc815442da873df687382d0c40efe9ca2c6fd6e90729be6e8272,2024-02-16T13:37:51.433000 CVE-2024-2438,0,0,9df80e59305d069e4c0bafdf7501833f48e0be776a335419dde3462ed16ce96a,2024-03-14T09:15:47.820000 -CVE-2024-24386,0,0,886dae40fc8c486ebcb35273c7350b2d934945c12d6ee6b2e716e5846f4636af,2024-02-15T14:28:31.380000 +CVE-2024-24386,0,1,f59e9a2881684d94f682a94d0cab4c40dc3881ce167eef2e9b29dcecb7f0d8d3,2024-08-19T21:35:04.070000 CVE-2024-24388,0,0,88b6377dc0d008894bdc790972ae1dd45dd984cb92c14514268a5d726c672b63,2024-02-08T20:04:04.027000 CVE-2024-24389,0,0,202e2016bde7bdd77582179d6800afd51a0658925f4907e3b0271c3ed961eb0f,2024-03-07T13:52:27.110000 CVE-2024-2439,0,0,1861df0a01e2d022f4f3ee70a1506ae400a78d818a4e934fb568d82c8a98c57b,2024-04-26T12:58:17.720000 @@ -246201,7 +246201,7 @@ CVE-2024-25153,0,0,23232740410354636be80fcc84fcc087a3c660934a01cb6cf2fe8d0b8ba9d CVE-2024-25154,0,0,287dee961cc5f3e7c6256ae0ba08349619160b48970a1430faecb89127db32f9,2024-03-13T18:16:18.563000 CVE-2024-25155,0,0,1d7983859d61945142ef2e8872f422d7a225c4f14d7bf78ef2435c14d9e9f5ea,2024-03-13T18:16:18.563000 CVE-2024-25156,0,0,5644f61e62691ed9b2ea36cf2dd30ea49f643127034e87e186f5419ac1deb692,2024-03-14T14:21:20.217000 -CVE-2024-25157,0,1,0edd55f5fb0216b44e5282ca0b586c6a1b67f292bdf6bf407dcb1f3eacde1472,2024-08-19T18:57:58.657000 +CVE-2024-25157,0,0,0edd55f5fb0216b44e5282ca0b586c6a1b67f292bdf6bf407dcb1f3eacde1472,2024-08-19T18:57:58.657000 CVE-2024-2516,0,0,14566cb1daab665f74119ef85235fd35fa3b84dccd777ba113a66fd32edf19a9,2024-05-17T02:38:16.350000 CVE-2024-25164,0,0,759bf404d5770b9163c704f082cc395dd906a306da057b7d64ff4a44c31ee872,2024-08-16T16:35:03.903000 CVE-2024-25165,0,0,b60ae9c4b2953dad1606ed76f79140fa695e9553000ce7a315e2caf4198c7634,2024-02-15T06:23:39.303000 @@ -246217,7 +246217,7 @@ CVE-2024-25180,0,0,7ba581c3caef0d3c03c0f8f2ecb5a0dce1d4af599fb0dc59bceacf92113e3 CVE-2024-25187,0,0,235931cb55f2324cb5235f058c93cb713e862085431cae896b9108cfe9eba975,2024-04-02T12:50:42.233000 CVE-2024-25189,0,0,877bbe35db73d3ea174dbc6f324dcb523b6e20a064afb2e87ac0944b71bf33dc,2024-02-26T16:27:58.813000 CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac80,2024-05-17T02:38:16.610000 -CVE-2024-25190,0,0,5e7fcee6e1d49c76382f955314af222553d106a1254553833783057b6c9de687,2024-02-15T05:03:08.533000 +CVE-2024-25190,0,1,c3a0f2b38cd0b3f7473eb6954f63f83b24d13fd5e163be63555d08acedef83ae,2024-08-19T20:35:06.090000 CVE-2024-25191,0,0,a79a6f6dac299c349e2de385c864fbf66ec48043f058d11d55221ed1f7cad150,2024-02-15T05:03:05.180000 CVE-2024-25196,0,0,4e1523df7155bcca6a8e3ac35657f04bf40ec93a62ac21976dc74cbf4e73e9ca,2024-08-15T14:35:01.030000 CVE-2024-25197,0,0,ca56aa502aafa76f9e203f1bfea1c7e7bb5407645a514e5c3184e8ae0b1b850e,2024-02-20T19:50:53.960000 @@ -246367,14 +246367,14 @@ CVE-2024-25454,0,0,8ab63453c76a5630b02c9a4acc28cd19e727677c1ac1b8b1e1b94ff8d701b CVE-2024-25458,0,0,883238ad1910abf3be131d65578a9146b081aa618c9d002b21ea014aab5330f3,2024-08-15T16:35:03.913000 CVE-2024-2546,0,0,08a8dee38ee812f84c4c40bdcc0668312236b55abd93840557efb145295c9cba,2024-05-17T02:38:18.283000 CVE-2024-25461,0,0,8db6a140bbc64b5af9f21a58ef0d9e6bf050fd6cc1f8f9c53b140972b95af9fe,2024-08-15T20:35:03.633000 -CVE-2024-25466,0,0,4f8ddadef0f0c470fac1d08a20c254a296296fab619f433d46a2ccdc8a4b306f,2024-02-16T13:37:51.433000 +CVE-2024-25466,0,1,2faf3b324b5dce58436df6bdaa090161fa7f0a0215834608518ab712a3442436,2024-08-19T20:35:06.837000 CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e72c,2024-02-20T19:50:53.960000 CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d45fc,2024-02-26T13:42:22.567000 CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000 CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000 CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000 CVE-2024-25502,0,0,ae578fb4220918f5c79c04ddf94a1dcef1514713ad368fe6ddbcf4d062b5a31d,2024-02-16T13:38:00.047000 -CVE-2024-25503,0,0,5506eecac1f37ab8170b1a0a6af4a3eab022712554cbaa86ae94867dab0793af,2024-04-04T12:48:41.700000 +CVE-2024-25503,0,1,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000 CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e463,2024-08-01T13:47:45.357000 CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 CVE-2024-25508,0,0,90339bb48fc1cfbfbe04d77c441539b4eb12357264469da7dce73e670017a9bc,2024-08-01T20:35:25.160000 @@ -246579,7 +246579,7 @@ CVE-2024-25808,0,0,56823cb1538bf83b266e824a90333c1b7a15dc68defca54aafe7f2be4923b CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000 CVE-2024-25811,0,0,19975e07ecf1fabf59b175c7c29029eca5183606ae6164f55f4361c17d565764,2024-08-04T12:35:05.137000 CVE-2024-25817,0,0,594e7944f467d2705810e71e76846a873167e65fb8715f24384d52ab7508e60a,2024-08-08T21:35:05.550000 -CVE-2024-25828,0,0,b9208d07acefc5f8bb86b1c0a1d3e2fb74dd5ed4c91b559369b12aa7bea3504d,2024-02-22T19:07:27.197000 +CVE-2024-25828,0,1,bb5f11d12010040c46347f1b01567677eceaf6416fc48feec74112280779705c,2024-08-19T21:35:05.027000 CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000 CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2bab0f,2024-08-13T19:35:05.710000 CVE-2024-25831,0,0,865d67a5eaea9aeb6dc34380b2f9339c6f4454b68228f5e0e1f349028c509484,2024-02-29T13:49:29.390000 @@ -246603,7 +246603,7 @@ CVE-2024-25850,0,0,5af0f934ea484ec3ca1490c96924ef0aab7c5c7572c450b40cf4d9d726414 CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000 CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000 CVE-2024-25854,0,0,17ea666d7172d54584074846a82d44b7b8f164d46f64195f0b1bec22a7304545,2024-03-12T12:40:13.500000 -CVE-2024-25858,0,0,f2d61142ee5b87819cb05bd45baa7574f24c4b82d7f291c2c6a0c87006d3f65f,2024-03-06T15:18:08.093000 +CVE-2024-25858,0,1,a5cba2d53e795893941edce58201624f227bda6d68ecbb5cef1d602282ede544,2024-08-19T21:35:05.770000 CVE-2024-25859,0,0,5d3416d33baad6c5419dcee926eb2da1abee7dd2d03a2d827cc53b262fcccd60,2024-02-29T13:49:47.277000 CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000 CVE-2024-25864,0,0,2a09b4ab74072b776577b1c00a1bf5c268c139c75079ed692d71dc30af731c65,2024-08-01T13:47:54.857000 @@ -248062,7 +248062,7 @@ CVE-2024-27564,0,0,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a06687195755 CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000 CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000 CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b8a0,2024-03-01T15:23:36.177000 -CVE-2024-27569,0,0,cb3b3e668821f421220bddc0f7c6c1e4ec026eeee741b1c1e7670d2f8f11ad64,2024-03-01T15:23:36.177000 +CVE-2024-27569,0,1,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000 CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000 CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000 CVE-2024-27571,0,0,ff0b0bcf3cf1fe0befdff4abfbb2b521b733f994207f9d68707861baf05a3a26,2024-03-01T15:23:36.177000 @@ -248436,7 +248436,7 @@ CVE-2024-28084,0,0,0adeb03c9958c0a142a2b711719e67fc11a910aa963939e76d45a1c626266 CVE-2024-28085,0,0,554d2434ae074519e2f585875f6b1adc962e2a4e8943b3aea63917c9326b32bb,2024-06-10T17:16:24.370000 CVE-2024-28087,0,0,0f81f2a7efbdffefa164fe86f5be9b3e313d2abe46b50b640c99a0b5ae7ebe7d,2024-05-15T18:35:11.453000 CVE-2024-28088,0,0,d733a55d08563448fb2af3f9c7eae0af238ba0d35b6bebaaed972aa3b77bead2,2024-03-13T21:16:00.380000 -CVE-2024-28089,0,0,2da0cf5bdfc33bf8760a529d5482db3f2862377ea079fb7c013e8121a584b0e0,2024-03-11T01:32:29.610000 +CVE-2024-28089,0,1,8dcfc5f0af6bda2c62c3d6583b98af8806f63e5c3b009d2d4c4b9e591fef1377,2024-08-19T20:35:09.170000 CVE-2024-2809,0,0,82a495e20989f000a99f2c2b597fd459041cdf90f3f5905ac9eb213a6d9d3a11,2024-05-17T02:38:31.340000 CVE-2024-28090,0,0,171bdf36c21f5eca0df2edcfe7464195fb5b1b8efbe9da50a6b805091a98fc56,2024-03-28T20:53:20.813000 CVE-2024-28091,0,0,5ed7c34632c1a0aa269b6a00d852ca628a0683b7be9f9882c51016680515c606,2024-03-28T20:53:20.813000 @@ -248606,7 +248606,7 @@ CVE-2024-2830,0,0,8c004c1c8fc1f8388803620250a49c9771d371ad920b272b660e7e23374997 CVE-2024-28303,0,0,a65712a928f1b4a2335837c36c349f7d018e1f7b9e70b27cb7f99f12d8cf7ee1,2024-03-20T13:00:16.367000 CVE-2024-2831,0,0,643c5a916b3e7dd2e502ec8b69ecf4eaeb51af43509d8dd9dee1849a2f658d24,2024-05-02T18:00:37.360000 CVE-2024-28318,0,0,03e5525f43f8edc03299c15b55f470f108d97b26a7d8480168df85d9eb01f856,2024-03-15T16:26:49.320000 -CVE-2024-28319,0,0,065e3109c162866b5f0bf71cd8fb9e0b0e6640f3d27ecd5190e8deac5911bc00,2024-03-15T16:26:49.320000 +CVE-2024-28319,0,1,e2ecd3b9d2b64cdb4e4a7ac8ae7f5ebb928d0580b7f60b7a323aa1f0897ead1a,2024-08-19T20:35:09.997000 CVE-2024-2832,0,0,4efea10e91cbbd88f561fe34ea6056c4c2547db8fd3fffd645360ef6957c89cf,2024-05-17T02:38:33.270000 CVE-2024-28320,0,0,a2fb23f680e2bb675a224cd66e29bf262110d5410c13985fbfcef1c249b560f1,2024-07-03T01:51:35.080000 CVE-2024-28322,0,0,57353b76141adc1a21b7e127ac12f2564b2d714c61135c271a9cb49aa77effcd,2024-07-03T01:51:35.980000 @@ -248751,7 +248751,7 @@ CVE-2024-28669,0,0,7e7c51ad09a2f0694752bdd394c9ed2f89e1b1247bb99fcc406852b79b139 CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000 CVE-2024-28670,0,0,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000 CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000 -CVE-2024-28672,0,1,538db36b26db573d0bb55cb40ad522fa7947acf5e2956b1e113432093746b4f2,2024-08-19T19:35:05.690000 +CVE-2024-28672,0,0,538db36b26db573d0bb55cb40ad522fa7947acf5e2956b1e113432093746b4f2,2024-08-19T19:35:05.690000 CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000 CVE-2024-28675,0,0,80c451d1a35a0ff52d3fba9d95128727c58bec6c40fc50594a98fbdeafd67949,2024-08-06T16:35:10.273000 CVE-2024-28676,0,0,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000 @@ -248992,8 +248992,8 @@ CVE-2024-29009,0,0,6dcd01bf0d59bf460d4cd9884b30a56bb3cb07161c6547e79b2b88789b615 CVE-2024-2901,0,0,e2df063e5347fadf4cf214e5695112bea43ff5509c25d82b3b42077531327e19,2024-05-17T02:38:36.427000 CVE-2024-29010,0,0,a9ff9c65174c33f2e792fcb56ee4004994b28661d6208ebb1e88e717582f6f0d,2024-05-01T19:50:25.633000 CVE-2024-29011,0,0,eb92887d9a2ecd248daea80b2641ebf2c57344e5f41ce9050910fcddaf740a0c,2024-05-01T19:50:25.633000 -CVE-2024-29012,0,1,7c7c32533c82aaf22406acd8a658ea95d36fb7375f5076084cc597754864b6a9,2024-08-19T19:34:59.167000 -CVE-2024-29013,0,1,67b4d9c80d914ad0bed565ffb846138fde0fb1daab078996874ed199eeb14f9e,2024-08-19T19:21:08.777000 +CVE-2024-29012,0,0,7c7c32533c82aaf22406acd8a658ea95d36fb7375f5076084cc597754864b6a9,2024-08-19T19:34:59.167000 +CVE-2024-29013,0,0,67b4d9c80d914ad0bed565ffb846138fde0fb1daab078996874ed199eeb14f9e,2024-08-19T19:21:08.777000 CVE-2024-29014,0,0,727bca255016a056117f183cd0537f37a7ac804396b0c606f5bbb22eb38674ae,2024-08-01T13:49:23.520000 CVE-2024-29015,0,0,f87c9b22620dd8e8504ff7baceae16d45f38e42f71f52e70d076cdf67c7ca83d,2024-08-14T17:49:14.177000 CVE-2024-29018,0,0,0688752b1434844c55e6cd721e2221622ec0094595898dc16074b9d8a9b658da,2024-03-21T12:58:51.093000 @@ -249252,7 +249252,7 @@ CVE-2024-29376,0,0,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db286075 CVE-2024-2938,0,0,ab88b913066937a047849ba483b0f7e9bae4b5bc13ea45b9cc5b395f17c9e679,2024-05-17T02:38:38.137000 CVE-2024-29384,0,0,b089f835091687cd6d0dcdd933552a1f796e9abc13183d08fc4c9d160e3daf39,2024-07-03T01:52:25.030000 CVE-2024-29385,0,0,062f263cce0916621cca314dc7c587134764d710200956986cfa984402a160be,2024-03-22T19:02:10.300000 -CVE-2024-29386,0,0,2f6937089cc55b8f633bd6a7ac4caa476995f462d71711c32014d7e60ba43063,2024-04-05T12:40:52.763000 +CVE-2024-29386,0,1,8dba036ff862e03cfde8b0a0207328d6c6b00a0d4a5bf9d9a10c3c8248cb6a10,2024-08-19T20:35:10.667000 CVE-2024-29387,0,0,a7de4d7b83fd64ee90e8a52b42eaf0b9beccc3b6bea7a05d204d65990fc8fba6,2024-08-16T18:35:10.137000 CVE-2024-2939,0,0,2535289099c8d33fbb19094f7fbda628b2a57cb3f5893b4424d20e832d7b98bf,2024-05-17T02:38:38.230000 CVE-2024-29390,0,0,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000 @@ -249268,7 +249268,7 @@ CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069ea CVE-2024-29417,0,0,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 CVE-2024-2942,0,0,df11b58be940727b4679e167fb2c13b9eb7e603ddfc660919e5e8d815e396a72,2024-05-17T02:38:38.500000 -CVE-2024-29421,0,1,c6dafd45a8c53dbcd9097903b14403adcbaf4c0772c34ab01e88eb134a14b126,2024-08-19T18:35:07.660000 +CVE-2024-29421,0,0,c6dafd45a8c53dbcd9097903b14403adcbaf4c0772c34ab01e88eb134a14b126,2024-08-19T18:35:07.660000 CVE-2024-2943,0,0,f4b6ad287b4a622c4b41944858fa2f89e0fbf42a503dbbb6e34a72b168b98f48,2024-05-17T02:38:38.790000 CVE-2024-29432,0,0,f1924d827bda5c2f21240d1e0d34760e21d63eb9bed07776f47d0288afb9aa18,2024-04-03T12:38:04.840000 CVE-2024-29433,0,0,1d2b8851aa0f5fe2986e1714c213ddc2e530a38e6018ee3fbc359ceb0627168a,2024-04-02T12:50:42.233000 @@ -249319,7 +249319,7 @@ CVE-2024-29510,0,0,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf CVE-2024-29511,0,0,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000 CVE-2024-29513,0,0,8cfcc3ee68a773ba517d1f3723d5fc41ae5eef49bbfc2250bce477983b34e599,2024-08-01T13:49:32.137000 CVE-2024-29514,0,0,eb115f41feffccc853e81d533febd8becad8a070e1e7d9f658260b227fc1cfd6,2024-04-02T18:12:16.283000 -CVE-2024-29515,0,0,c383707b3cd02f09eb0d30f76485ac637d83f8594b9d209d7b506d7581c691b7,2024-03-26T12:55:05.010000 +CVE-2024-29515,0,1,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535a56,2024-08-19T20:35:11.413000 CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000 CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000 CVE-2024-2954,0,0,99a73523d01afd84aef469d44b1c2063cfbc0f879cb72415c9f7459e0fff3d47,2024-03-27T12:29:30.307000 @@ -249765,7 +249765,7 @@ CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d CVE-2024-30166,0,0,50687ad455f93a12b9f6c9dbf505813d14042f7054e41b037f825261eb3f0951,2024-08-01T15:35:09.177000 CVE-2024-3017,0,0,b401b23402ebc6f6ec3d2296f1d5b4f9799017607076ff54b8bb35750200243b,2024-06-27T19:25:12.067000 CVE-2024-30170,0,0,cfe0eb8b7b3f847ca52fcf65cc23d512fa1cb604da9a76e828706eb61b361e3a,2024-08-12T16:13:53.803000 -CVE-2024-30171,0,1,a054e0dd8c720b4bdd9579beb1d65acc89fe1ba4a7ad35fbd80151de95e57949,2024-08-19T18:35:08.793000 +CVE-2024-30171,0,0,a054e0dd8c720b4bdd9579beb1d65acc89fe1ba4a7ad35fbd80151de95e57949,2024-08-19T18:35:08.793000 CVE-2024-30172,0,0,e23d65cae1ab6574d22c6026de16bab78b6c6028b759790600f9957da66d8b50,2024-06-14T13:15:51.730000 CVE-2024-30176,0,0,b9c656776bec57369b0fb415cb86239071847d4185cfc200250f61ff82ba37c3,2024-05-01T19:50:25.633000 CVE-2024-30177,0,0,df35a874768fb67f0f9af572132423fb724b172bc8802b6ae0e895e47f280bdb,2024-03-27T12:29:30.307000 @@ -250011,7 +250011,7 @@ CVE-2024-30417,0,0,454137694c003758247b4c0acabe990dae4347bce9b044c8ece06c3d4e475 CVE-2024-30418,0,0,1df5cc20895f4454a18a9db65101208a879bcf1e74b024a952998a5645fb82f8,2024-04-08T18:48:40.217000 CVE-2024-30419,0,0,2f530b202492e52318032e7619655e6192edb2822beab428ec9cba2b2427cda7,2024-07-03T01:54:04.563000 CVE-2024-3042,0,0,b51852dae1f5eba8e99dd3aba03255977b2f1344b1da87286dbd9f450156442b,2024-05-17T02:39:41.680000 -CVE-2024-30420,0,0,808b860979e5773920a8f3e07f798a13f65ac8d8ba3764cc287472d01e39f1ef,2024-05-22T12:46:53.887000 +CVE-2024-30420,0,1,c7aa765232ba482242d297cfff54623d69e480ef9ec026f910cf7643167f5bd5,2024-08-19T20:35:12.223000 CVE-2024-30421,0,0,38d079b732a725b98c99fa6075b2f70c78aac1ea39a1e592d0f5fa7cadf0ec52,2024-03-28T12:42:56.150000 CVE-2024-30422,0,0,60be97e329a95b7adfcb5b64dd5d4834eb184c7233f1129ee8af63f3e0f95146,2024-03-28T12:42:56.150000 CVE-2024-30423,0,0,5c329ade542241c2bfb9bb711657fe27dfedc75940bf241818dd0c4f5202f245,2024-04-01T01:12:59.077000 @@ -250165,7 +250165,7 @@ CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb71 CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000 CVE-2024-30568,0,0,9a768747587e32a201933390f9d26b02cad0ce3e0c3b3cebafe23870ef05160d,2024-04-03T17:24:18.150000 CVE-2024-30569,0,0,927373a4f296e28220cb38df1137df4e0bb8bd499fda93ec080e07657fccab94,2024-04-03T17:24:18.150000 -CVE-2024-30570,0,0,f26413ea64888aee7bf2b0a0614d0ba33fe6749eae37d519e7b2003642262e6e,2024-08-01T13:50:10.667000 +CVE-2024-30570,0,1,caed104332716a7853dfa2ec0af0a5363e33ead1c7830017a6995784a2222c35,2024-08-19T20:35:12.990000 CVE-2024-30571,0,0,d0b0ce739c22bcaf56190db28e9a8c1e2be7759ce3e5fac8f0fae70b3abe2c6e,2024-04-03T17:24:18.150000 CVE-2024-30572,0,0,04b75791693e289b4034f3fd29a8b35bcf61baa8fe2d36e853f3fe35bb0c8981,2024-04-03T17:24:18.150000 CVE-2024-3058,0,0,5f720c32116b174cb7fa6caebc65ad64bae20a551d5ace61f30cefd538f58d5c,2024-04-26T12:58:17.720000 @@ -250191,7 +250191,7 @@ CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e3 CVE-2024-30600,0,0,fce9a7554c9f0f1b0d9fd07c807d160136a357b6c3f88bd0a420c4dbff802c92,2024-03-28T16:07:30.893000 CVE-2024-30601,0,0,9dfac2db560029d7902d4500ce4b1bb8d72ada7002cb3387b6f0aab6501b5284,2024-08-01T13:50:17.780000 CVE-2024-30602,0,0,9c40cbab2c38aaca828b52186223e1df82fdb31d9cb7460440b4892a59e5cdd5,2024-08-01T13:50:18.560000 -CVE-2024-30603,0,0,b70dc9b9fa85e6cbac54af7fa1a3848a23e38b6e996027654cea5d336dfd84ac,2024-03-28T16:07:30.893000 +CVE-2024-30603,0,1,4ed6cfbc1c794faff20a9402a19c1b8e2e0778b0d249fb5742f8d1e4a4dc2f88,2024-08-19T20:35:13.213000 CVE-2024-30604,0,0,060b968f0ffc4c388f441f2bffef7d326f7c284352f55ad52e5dcef963cc081c,2024-03-28T16:07:30.893000 CVE-2024-30606,0,0,76de4dfc14eb6a90a04553ed0c6c96b418361d792a57179120d50d712b7e4c8c,2024-03-28T16:07:30.893000 CVE-2024-30607,0,0,3081b4056d2297b344e88d45dd81bdc04741e21824330f0904116519e8c0505f,2024-08-01T13:50:19.340000 @@ -250200,7 +250200,7 @@ CVE-2024-30612,0,0,e42904b723a61ee315384c0049851285bcc87d076f88def1dfe4ab911cc56 CVE-2024-30613,0,0,ec7980af57ce21f0caa7be201315bcd79301675671829a9c0350efcb6a7c58e3,2024-08-01T15:35:12.083000 CVE-2024-30614,0,0,70864962c71d46c273106725c973080a3fb9295eb2c95d98fdaa16c813277ea2,2024-04-12T12:43:46.210000 CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69aab4,2024-08-01T13:50:20.133000 -CVE-2024-30621,0,0,f1fe1ced472b52b5106f4bb104d36eea881b5ba60acb8d11a8d4b770ef9cd4b9,2024-04-08T22:48:53.950000 +CVE-2024-30621,0,1,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000 CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000 CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000 CVE-2024-30624,0,0,9f0b6bbb0cdd2fc5e8275cfdf473e348e809449e2b22ebe6778b91e551369404,2024-03-29T13:28:22.880000 @@ -250208,7 +250208,7 @@ CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac CVE-2024-30626,0,0,925435eedf5e0aaf58b72dd75ee5a85aebac0837c913b2b11ec6619fafacc6ae,2024-03-29T13:28:22.880000 CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000 CVE-2024-30628,0,0,dd5c2dbd465b741a9303d4905928e279a9f9c188a8cfae6b104c76db64b76117,2024-08-01T13:50:22.470000 -CVE-2024-30629,0,0,065564e121e3b652e8f433bc4bebac9590da04ba26d95145648a65cf0a32cc7a,2024-03-29T13:28:22.880000 +CVE-2024-30629,0,1,dde9c072e6180c2884c3b2073d41ca0bf7b0e2064c1395f3d25c8643c5bf5d2e,2024-08-19T20:35:14.703000 CVE-2024-3063,0,0,e4ccb06d5ff3e906359417688d6094345cf7b0c3520fac98072d600493716bc5,2024-05-30T13:15:41.297000 CVE-2024-30630,0,0,d1f2c24f30d736799fbd9614b05322c8af9640ffb03dab0097ee140dec9fb5dc,2024-03-29T13:28:22.880000 CVE-2024-30631,0,0,41f838085add8cf1dec118fb7468de6b4fc9bce111467eb8baa174f9e9137432,2024-08-01T15:35:12.897000 @@ -250343,7 +250343,7 @@ CVE-2024-30886,0,0,3f62f85f345458e571bc5d6599576ec911abf1641e0ba6b07f58563bdc308 CVE-2024-30889,0,0,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7ed09,2024-08-15T16:35:07.067000 CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000 CVE-2024-30890,0,0,70cd6656f6551d3fbf1d211e5aa4de5732e110f0e7820ed44ca9141eadf4b5b1,2024-07-03T01:54:15.373000 -CVE-2024-30891,0,0,4f494bee46d389b2763a9e0a5cc6080a590a297e24ef8f2135ff7d6a9a1c2df9,2024-04-05T12:40:52.763000 +CVE-2024-30891,0,1,396e17014fd3175e72a9c0a6ece22b5363c9ba81b8e8ea154f79fa53fb440cca,2024-08-19T20:35:15.447000 CVE-2024-3090,0,0,ca58ae48ece7b5420c70058bc4ef34d34b72713bd9fb9580ab51af080cd6b613,2024-05-17T02:39:43.047000 CVE-2024-3091,0,0,ac47144b8dcc6e68da1982025c8274e4d7559a0b603bbff8eb392c09297cdc97,2024-05-17T02:39:43.130000 CVE-2024-30915,0,0,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000 @@ -250796,7 +250796,7 @@ CVE-2024-31497,0,0,8d8d7f6d342d19eead9a597122971bd1c38180baf81620a11231640a58ff9 CVE-2024-31498,0,0,2c6718643a91717514e2b2de53111a126eacf373a9c36aabb09803c11f338d38,2024-04-08T00:15:08 CVE-2024-3150,0,0,69195bb0268f0d9c44b64d544ae820662fe7bc6d09e60627c417b378085c3c15,2024-06-07T14:56:05.647000 CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 -CVE-2024-31503,0,0,453b8b98d65a011386a1105ea39618d955bc56858a00d05311380e4785f957e5,2024-04-17T12:48:07.510000 +CVE-2024-31503,0,1,63f26c08bc84d4a6878a828315f5d6a190e4224cc41f797a0adf367284c5896d,2024-08-19T21:35:06.150000 CVE-2024-31504,0,0,ff5e6de58bbe8f153bd36ad8b71b66ea5d63fceb3d05f083e0fcf1527f2e563c,2024-07-11T16:23:42.943000 CVE-2024-31506,0,0,eb9d067c38ce54e37842aafb28e6ee16ef90a41330c8823e136a3a103ed0b925,2024-04-10T13:24:00.070000 CVE-2024-31507,0,0,11838ac73f4b8ea141494dda45bb54b02e15aae2460bddcbc7e30ae4080ffa17,2024-08-01T13:50:56.497000 @@ -251485,7 +251485,7 @@ CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a CVE-2024-32609,0,0,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000 CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000 CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000 -CVE-2024-32611,0,1,abc754efada8aafebf0fe0506c081c90cf76bdf375a890d26aade6a81a7fbaab,2024-08-19T18:35:09.720000 +CVE-2024-32611,0,0,abc754efada8aafebf0fe0506c081c90cf76bdf375a890d26aade6a81a7fbaab,2024-08-19T18:35:09.720000 CVE-2024-32612,0,0,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 CVE-2024-32613,0,0,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf304923f4,2024-07-03T01:56:46.420000 CVE-2024-32614,0,0,0586f7e2db361ba016a10a7d05822a68e00bab4a467fb3c2cc530efcd3b5819c,2024-07-03T01:56:47.230000 @@ -251783,8 +251783,8 @@ CVE-2024-32923,0,0,d11adde4640e73dc73d759e597c25734ba397f72eb5611b0862ba5e0b613d CVE-2024-32924,0,0,6164bfab82ba6f7007383697d807afc74f25042caf88c7185f8f60f004aee140,2024-06-17T12:43:31.090000 CVE-2024-32925,0,0,952975d13abb7eac228747d03392395178a367274ac09eb4f5daa7e782f272a8,2024-07-03T01:57:18.617000 CVE-2024-32926,0,0,9ef7e8771a6566bb36cb9f88d81a05eda20461f6e380085d4cd6c336f418a7f8,2024-07-03T01:57:19.363000 -CVE-2024-32927,0,1,a78fc6b80483bd4d8c68ac2665b5759b35609385b8680a31aaa2aa1c568f67d9,2024-08-19T18:36:20.123000 -CVE-2024-32928,0,1,ec567f575f2b571bf7e008fd05bb832785e6dde6a10dde842d571fef6f474b36,2024-08-19T18:36:20.123000 +CVE-2024-32927,0,0,a78fc6b80483bd4d8c68ac2665b5759b35609385b8680a31aaa2aa1c568f67d9,2024-08-19T18:36:20.123000 +CVE-2024-32928,0,0,ec567f575f2b571bf7e008fd05bb832785e6dde6a10dde842d571fef6f474b36,2024-08-19T18:36:20.123000 CVE-2024-32929,0,0,17d10f21930634adcf648f3a1af5dffaf801c17e6eb1045912f45ef7311ec215,2024-07-03T01:57:19.547000 CVE-2024-3293,0,0,83ffac847878c264dc6ac6eac7b38e37082e6b861b5988770c12a0259c7b42c0,2024-04-23T12:52:26.253000 CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000 @@ -252529,16 +252529,16 @@ CVE-2024-34112,0,0,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a3 CVE-2024-34113,0,0,a2e9f7ac8776392f6be8ef1204f1c90f02f8da5b4c386f27bfe6c53f96f39c9b,2024-08-07T15:15:54.640000 CVE-2024-34115,0,0,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000 CVE-2024-34116,0,0,4851ab33470ffca4c1046ad0fdbe4ebf66556d22cc3b975d80dd125226b02f02,2024-08-07T15:15:54.863000 -CVE-2024-34117,0,1,145b6534dbb32e064b1f8e11a16bb9e3f70fe3f597d50441e5e65656ea159267,2024-08-19T18:57:27.057000 +CVE-2024-34117,0,0,145b6534dbb32e064b1f8e11a16bb9e3f70fe3f597d50441e5e65656ea159267,2024-08-19T18:57:27.057000 CVE-2024-34118,0,0,def1ef4f0d237934e763e168f4db1b4c3563826c7ed8bb71e24ecd9d8e332a05,2024-08-15T16:48:41.250000 CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d108c,2024-06-14T20:03:08.293000 CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000 CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000 CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000 CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000 -CVE-2024-34124,0,1,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000 -CVE-2024-34125,0,1,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000 -CVE-2024-34126,0,1,9812afe65ee02221e5fd8a63677b5e9e3deeafed44b12298eb7011278c0e0e90,2024-08-19T18:55:47.043000 +CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000 +CVE-2024-34125,0,0,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000 +CVE-2024-34126,0,0,9812afe65ee02221e5fd8a63677b5e9e3deeafed44b12298eb7011278c0e0e90,2024-08-19T18:55:47.043000 CVE-2024-34127,0,0,06c2fc49cbcf18b0add9499f10b3a0814654b0e291f183a8ee09c382b3d1ec3c,2024-08-16T18:22:57.230000 CVE-2024-34128,0,0,c97915102dfd0e38974bf97aab68fa646e656f1eb3dd71f8dec0f1259a6cd8d8,2024-07-24T12:55:13.223000 CVE-2024-34129,0,0,c47df7ddf934177974799de9912c4e8ae1e6353624749fd9b063535c8cf739aa,2024-08-07T15:15:55.070000 @@ -252964,7 +252964,7 @@ CVE-2024-3474,0,0,f8fe69ded09f8f3335cb0a291c0ff93be246183a89b6f2a9db60adabf1ff9a CVE-2024-34740,0,0,cd68171e55105c9a184cdc72c371579137a9ca2bcc91416cae3d7556d14ecb22,2024-08-19T13:00:23.117000 CVE-2024-34741,0,0,92c683bbe77a7f293c2037090a232d821770d81c7905215e3ef6319cf6b5adba,2024-08-19T13:00:23.117000 CVE-2024-34742,0,0,ae7622882d0f2f3d011507be8bcb7493359b0ef6aaca92f56d7280395d35123c,2024-08-19T13:00:23.117000 -CVE-2024-34743,0,0,3118d41c71c2ea3e5e00148205742c3f777858f414c40c423c790d2599a98ff8,2024-08-19T13:00:23.117000 +CVE-2024-34743,0,1,9a08509f1ceb4bbb716866bb59161611c0588d77430a21c15b6c1621568bccf5,2024-08-19T20:35:16.253000 CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000 CVE-2024-3475,0,0,3d68cde343ddcb97ac984b733d2ae7662c97a24c514b9a563c1c306f42f1759f,2024-05-02T13:27:25.103000 CVE-2024-34750,0,0,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000 @@ -253053,7 +253053,7 @@ CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193d CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000 CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000 CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000 -CVE-2024-34905,0,1,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000 +CVE-2024-34905,0,0,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000 CVE-2024-34906,0,0,2d514f74a75383567e242812745d1978f5a5608d1bafa528fe1c42a0f093f8ed,2024-05-23T20:42:22.080000 CVE-2024-34909,0,0,75ef6b64b1e62b9391afd10085bc7fe5995801e2be117fc0dc8d712e21d5d32b,2024-07-03T02:00:52.603000 CVE-2024-3491,0,0,3f53627a80e697de4556db2343c1e928afb824dee19f0a6a29ac6e39296f869d,2024-04-23T12:52:09.397000 @@ -253315,7 +253315,7 @@ CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cef CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000 CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000 CVE-2024-3537,0,0,7295965fffde5e283abb275e5228fcf2f24e25d29556dedbad478c14243435cd,2024-05-17T02:39:59.987000 -CVE-2024-35373,0,1,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000 +CVE-2024-35373,0,0,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000 CVE-2024-35374,0,0,71bf5143a935358076633b16ef6d586d6b493af4d13be33b4867bf136b6a604a,2024-05-28T17:15:10.937000 CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000 CVE-2024-3538,0,0,9615e321c043201a8d062641e6113a127ad070f2c61985bcd402bdf4990165ec,2024-05-17T02:40:00.087000 @@ -253367,6 +253367,8 @@ CVE-2024-35526,0,0,45f791392c66ed8c499767ccc3e4221d8293b29407aac62d7317c3cd0f64f CVE-2024-35527,0,0,72600462defbad3d94b9b914561cd106abcd4f14940c552d4d0bd67292ce0acb,2024-08-12T19:35:08.817000 CVE-2024-3553,0,0,d92b272ac91b29131b7e7854674ae1f210f8268a2cb6312d80e7312af083b77c,2024-05-02T18:00:37.360000 CVE-2024-35537,0,0,5d87fa9d71542082a5117fd75bd541152a38491d14562b96fe74b3627bb4d282,2024-06-24T19:40:04.190000 +CVE-2024-35538,1,1,1b0560b7245d7b2b5ed17ac54a5db96d69933d6353ee932c7288fbe3f314b5ed,2024-08-19T21:15:09.850000 +CVE-2024-35539,1,1,16ccfc5c127f43006c1fe9ed53eec144452a877a3dfe593d55cc44952e099cbb,2024-08-19T21:15:09.913000 CVE-2024-3554,0,0,cc60bd735986056555560436c7b58f65485299a8475c11d30802709a9ea4095c,2024-05-02T18:00:37.360000 CVE-2024-35545,0,0,bc697f72b53789e21cd5d8ac45caf67cd064397c19ab7b48462104e593b9785f,2024-06-27T12:47:19.847000 CVE-2024-35548,0,0,27743d34ac7e82f8c9c7eae383a15382d5ad0f4949e113942667401ad6f68173,2024-08-02T04:15:55.577000 @@ -253862,7 +253864,7 @@ CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950c CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000 CVE-2024-36052,0,0,022010471f20b33cdbb9c0f6e926c1a4caaff0d72570a4d1a2abd38ceffab587,2024-05-22T12:46:53.887000 CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000 -CVE-2024-36054,0,1,573acf3e9153a838a6bd1e03653f71db08e33e3b8f5328f3fb3cc099e632a6e2,2024-08-19T19:35:07.003000 +CVE-2024-36054,0,0,573acf3e9153a838a6bd1e03653f71db08e33e3b8f5328f3fb3cc099e632a6e2,2024-08-19T19:35:07.003000 CVE-2024-36055,0,0,9a65ac3e65fa237426eeec0a5393b74ddf0f405783f600502382f8e03d635757,2024-05-28T12:39:28.377000 CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 @@ -254260,7 +254262,7 @@ CVE-2024-36680,0,0,12a9cd305d4b5b8b70c51b6cca94004d4c8d12385813b2e0157ea675419f2 CVE-2024-36681,0,0,91ab5a39355fb60d1e0e5e355644e5363b5d880ec14684cab5ae1016626028b9,2024-07-03T02:03:31.853000 CVE-2024-36682,0,0,607667f3d3fa1e7539487ebcdf60477393019c86221af3075a4b31a59983923e,2024-08-01T13:53:12.263000 CVE-2024-36683,0,0,18a76ea23a5695131ac0a1a1cae26aee3d1ea92ed38cb283b784e28da9cb3b8c,2024-06-25T12:24:17.873000 -CVE-2024-36684,0,1,92f14ba44da3232d94fa9d8919d066f2f528d700fa94d6456ec4eb59fdec8f01,2024-08-19T18:51:09.050000 +CVE-2024-36684,0,0,92f14ba44da3232d94fa9d8919d066f2f528d700fa94d6456ec4eb59fdec8f01,2024-08-19T18:51:09.050000 CVE-2024-3669,0,0,adf9cc4d7b16c7513726b84fd5b10bd94ac2985d9cd2d264bea2883110b227ce,2024-08-01T13:56:38.537000 CVE-2024-36691,0,0,eb4ea08bf79d1a6ac1d98f330c6ba45260957add9ca280d2ec95e1cc61898b85,2024-06-13T18:36:09.010000 CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000 @@ -254431,7 +254433,7 @@ CVE-2024-36974,0,0,aa342464f56df4c331d398bcc0f3e68d9c36f35501b54bcc80e29a36fedbd CVE-2024-36975,0,0,5fee8a8667371d6492e42fc16656270b45581df0fcea64415a84141dc6966f70,2024-06-20T12:44:01.637000 CVE-2024-36976,0,0,fdc6207792d51a430faf64adc2235b757ae064cff90a05a32bfebe9af7605312,2024-06-20T12:44:01.637000 CVE-2024-36977,0,0,2fe5f328cd77d8e3e2ff7d8822b2b0f7e95a6c6361c8a1a46715f250c7c3d5da,2024-06-20T12:44:01.637000 -CVE-2024-36978,0,1,dcc0f04e3fc2821d8402c617b55b3d37be597fffff7df9cf9ec9b8398c9978a0,2024-08-19T18:31:13.670000 +CVE-2024-36978,0,0,dcc0f04e3fc2821d8402c617b55b3d37be597fffff7df9cf9ec9b8398c9978a0,2024-08-19T18:31:13.670000 CVE-2024-36979,0,0,fae9575e67be5b18a1235e7f3f58f40e4f1d0fa2298698b8ae07de388a8facc1,2024-06-20T12:44:01.637000 CVE-2024-3698,0,0,1636f30943e700f62090e4fa161d7d9dd9aa51f3d552ed312bd5146a81f86c91,2024-05-17T02:40:04.800000 CVE-2024-36982,0,0,aa7c6f6fb5fb0c2be2ff96348e0ea696169b845aaba61abec5ab8d5dad3d35cc,2024-08-02T15:27:14.607000 @@ -254520,7 +254522,7 @@ CVE-2024-37091,0,0,51d89bff6d4927a6932c5f16be7fc12b87d21b9cb01a4f230b0e60352bf9b CVE-2024-37092,0,0,4f832f426d4e20df2ade16ea7f95884ead700f0032ad8127b2362adeff7b3a6b,2024-06-24T19:26:54.367000 CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000 CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000 -CVE-2024-37099,0,1,a39e3257caa4b07cd04194d82985cca1229e701a3b0127c95c1bc7803636b428,2024-08-19T18:36:20.123000 +CVE-2024-37099,0,0,a39e3257caa4b07cd04194d82985cca1229e701a3b0127c95c1bc7803636b428,2024-08-19T18:36:20.123000 CVE-2024-3710,0,0,b54f7b8999ad064535445b5fd4766a137ffc70ceb349f28f8c5f7d65dfa1d3ae,2024-08-01T13:56:40.053000 CVE-2024-37100,0,0,2b3fe9b89db247c6739af47c680e25c99c767f88c107eecdb29b2289fcbaa161,2024-07-26T13:27:50.583000 CVE-2024-37101,0,0,97e2e32c34ae252be2daf95c15efc1d10b3c02ed553eff869e9373b422ad3f71,2024-07-26T13:28:35.413000 @@ -255844,8 +255846,8 @@ CVE-2024-39229,0,0,b4b3823124f3bc9ea90ea2bf51960fefa03fffb294236ab9c3c28ca969852 CVE-2024-3923,0,0,c2a620888229e913021be3366cfd9f75cdf87c5d652acf18a88f48f7b1cc1363,2024-05-14T16:11:39.510000 CVE-2024-39236,0,0,0c0b177de9b0c166027d70b91204b432604c3a2330076ae498cc541e78a8a520,2024-08-02T05:15:33.677000 CVE-2024-3924,0,0,235edb1f62c7ed0711c125c27cb00d729af2f8ac46c7bf2f24b9a6a03738d7f9,2024-05-30T18:19:11.743000 -CVE-2024-39241,0,0,5c98366d94920ffa7e675aa14ec20f1ad153271097a586327226bd3a4162020c,2024-06-27T12:47:19.847000 -CVE-2024-39242,0,0,0ddaf95056cad1c221c85d72c3812ff320fec3836fc02778cf1b1fe4f51a90de,2024-06-27T12:47:19.847000 +CVE-2024-39241,0,1,accd1dd78fc247d99be43a8336696ac9932dfbe631d68c61bc60cbf3393ddd1d,2024-08-19T21:06:05.693000 +CVE-2024-39242,0,1,0ce9eb7ec62fb5bee8b64b27a5019be0610d6047fe2caece098d1a76626bc65e,2024-08-19T21:06:24.177000 CVE-2024-39243,0,0,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2d8b,2024-07-03T02:05:45.213000 CVE-2024-39248,0,0,7a563316fd3453bbdb2eea83c64c484bfa847d40ebdeede8de43d451f8cafde1,2024-07-05T12:55:51.367000 CVE-2024-39249,0,0,2a48392dba1bfe2154eee6a8fcc299c137f87159965d08d8de921312aaa9d522,2024-08-02T05:15:33.900000 @@ -255914,7 +255916,7 @@ CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882b CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000 -CVE-2024-39371,0,1,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000 +CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000 CVE-2024-39373,0,0,e03c6c4e4265087cfa8c4bbe8fccd5576189838192e80bd89272e600b85fa8b9,2024-06-27T17:11:52.390000 CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef26131f,2024-06-27T17:11:52.390000 CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000 @@ -255922,8 +255924,8 @@ CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f CVE-2024-39379,0,0,eea4124c5ea93e0750c53c7242ccfa255eb0eb94ed4c7c3ac1070e74f2655db4,2024-08-01T12:42:36.933000 CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000 CVE-2024-39383,0,0,b4fda2d2621943b7d8ad5e6874dd06b25217ceb08a5761385783d2ff579563c6,2024-08-14T17:49:14.177000 -CVE-2024-39386,0,1,b798786f71e8e8f0735f5ce39eeb2c50d842aae88e8a43200f637f6dd2b6b086,2024-08-19T18:53:49.387000 -CVE-2024-39387,0,1,89b66bc618bdec29880956f86ab320532050f7e569b27da862dd99b48956ab03,2024-08-19T18:53:28.930000 +CVE-2024-39386,0,0,b798786f71e8e8f0735f5ce39eeb2c50d842aae88e8a43200f637f6dd2b6b086,2024-08-19T18:53:49.387000 +CVE-2024-39387,0,0,89b66bc618bdec29880956f86ab320532050f7e569b27da862dd99b48956ab03,2024-08-19T18:53:28.930000 CVE-2024-39388,0,0,8d23a39b2d5c7f24e6d2ce074d1291f49a0b80796f8d0f1605cbbd1187360b13,2024-08-19T16:23:28.353000 CVE-2024-39389,0,0,39fdb9d0b9fb20cf297a06b83cf6ea63096507f0061506f0b3a0f5514e7717bb,2024-08-19T16:17:19.700000 CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000 @@ -255979,15 +255981,15 @@ CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166 CVE-2024-39460,0,0,4f78962312c460642ba8951e77b013301d272c348dd713c542bd0b2b628a69cf,2024-06-27T12:47:19.847000 CVE-2024-39461,0,0,cecb9bb9a4945e2f0e4a10c8862685b90a08a104cc3bac781d0de62df1e3d355,2024-06-25T18:50:42.040000 CVE-2024-39462,0,0,d6fa49df9f42ed202e5a3cc2f250dce01e83d58a2dd9514f13116e83ffa785aa,2024-07-03T02:05:49.283000 -CVE-2024-39463,0,0,47b7e4ed4ce8ef7a787fad9d1bf8e6ce01a7584854c849f2102915a88618997c,2024-06-25T18:50:42.040000 -CVE-2024-39464,0,0,d8d08122e3c7822c6e2c81bade6843bb6f6c731126a109b202da2c920c199b08,2024-06-25T18:50:42.040000 -CVE-2024-39465,0,0,bc634101bd61fc8fe5cdea36fba30094de5e1420c5c522aed6e025caf745d09e,2024-06-25T18:50:42.040000 -CVE-2024-39466,0,0,be958e7a9a2b27b0fb9b2c0d9a71181e3eb90c511ad274e3afe48c007e696285,2024-06-25T18:50:42.040000 +CVE-2024-39463,0,1,713b50bfe2837ba8a6b7f130ffd09bd30c780ec37cdb812163048776185cb1be,2024-08-19T21:01:55.557000 +CVE-2024-39464,0,1,1645ce9c2dd695016de0c94e603fefd07a2e7caabc24d8ebfab3af1a26f6b184,2024-08-19T21:02:16.113000 +CVE-2024-39465,0,1,b6ba07e557ee2621a86675b0febc6290289dae6bc23b121747f5f8e006230695,2024-08-19T21:04:27.467000 +CVE-2024-39466,0,1,4ace459e94329b49137143c03c0ecc682c63ce5f8628b924663a1f0d72bdb734,2024-08-19T20:59:54.867000 CVE-2024-39467,0,0,24b2e918bb6f2bd61687825dd13d0cc0cecac046d19a687da10524a29da67531,2024-06-25T18:50:42.040000 CVE-2024-39468,0,0,ae6a017e6c367f752286f52d1aab45d1166b4dcdd4ca3930857e995f1f6e7677,2024-07-05T08:15:03.410000 CVE-2024-39469,0,0,4f76bc2884fab99f2e647535e4f5ff6741622700979dba4d1d6ae85a7edb0f27,2024-07-05T08:15:03.467000 CVE-2024-3947,0,0,5ac97013084fcc39672b6ea95b043d5a77dd21abc36167b8c6988b355b186d2c,2024-05-30T13:15:41.297000 -CVE-2024-39470,0,0,a5037914436ce9b835dac83661b215f18c9ba9ca80f3efeea162f571d060a96a,2024-06-25T18:50:42.040000 +CVE-2024-39470,0,1,bacd3945ff873a25d6e7500de402ec7a7623e0c3a8a8e559c02c703a2cb142fc,2024-08-19T20:58:03.040000 CVE-2024-39471,0,0,89f000b418cb95dfd2a08e65629c84af8b993dbc826d3e812ee14f26f967887b,2024-06-25T18:50:42.040000 CVE-2024-39472,0,0,88e3c5b4d425f11a9fb34fa56b701a01ea58f8b9e68aad9de5a6d814a13d9eb6,2024-08-19T05:15:06.543000 CVE-2024-39473,0,0,b24af8dffbe76f90c2262850990b3e2af991f249a99e7e85721ef205ffeb0fd3,2024-07-08T17:12:06.610000 @@ -256873,7 +256875,7 @@ CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-41161,0,0,c97152c62d9a10c62a6668742a3fe8e6e77c1bcfdd43214f485b8756f006cd55,2024-08-08T18:55:19.180000 CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000 -CVE-2024-41164,0,1,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000 +CVE-2024-41164,0,0,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000 CVE-2024-41178,0,0,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000 @@ -257069,7 +257071,7 @@ CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000 CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000 -CVE-2024-41719,0,1,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000 +CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000 CVE-2024-41723,0,0,d454a6e84b7279f0a9264114791e422d74feeebe84c47a58ae77b60a510e9c82,2024-08-14T17:49:14.177000 @@ -257128,14 +257130,14 @@ CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000 -CVE-2024-41840,0,1,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 +CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000 -CVE-2024-41850,0,1,105ee8d7e128a7bfef46a6f6d9b6049d5c28c9d7445c37259311e21c46bcceec,2024-08-19T18:41:14.083000 -CVE-2024-41851,0,1,f382ba2978b7b108b5ca794ab973cbc168b42571d6dd14e506c0111f63fbbf25,2024-08-19T18:41:29.073000 -CVE-2024-41852,0,1,b9853968fe67e2c5233e8ca2738b3048de51d482a522c2258b22dc0aff703976,2024-08-19T18:42:01.693000 -CVE-2024-41853,0,1,d0e1d87efca688bf44c8dd7769e57548e5c5327e51e643a477df14e3576a000e,2024-08-19T18:42:21.327000 -CVE-2024-41854,0,1,08cc90ea0adadfa96a276aa03d11f4fc06ec99cae9172cd871fbd7355b111a09,2024-08-19T18:43:34.970000 -CVE-2024-41856,0,1,c2ee80a5f2b7dae1b3c4d8f5600fac764ad18c39c82d16f5ab00e57e14b80619,2024-08-19T18:54:40.513000 +CVE-2024-41850,0,0,105ee8d7e128a7bfef46a6f6d9b6049d5c28c9d7445c37259311e21c46bcceec,2024-08-19T18:41:14.083000 +CVE-2024-41851,0,0,f382ba2978b7b108b5ca794ab973cbc168b42571d6dd14e506c0111f63fbbf25,2024-08-19T18:41:29.073000 +CVE-2024-41852,0,0,b9853968fe67e2c5233e8ca2738b3048de51d482a522c2258b22dc0aff703976,2024-08-19T18:42:01.693000 +CVE-2024-41853,0,0,d0e1d87efca688bf44c8dd7769e57548e5c5327e51e643a477df14e3576a000e,2024-08-19T18:42:21.327000 +CVE-2024-41854,0,0,08cc90ea0adadfa96a276aa03d11f4fc06ec99cae9172cd871fbd7355b111a09,2024-08-19T18:43:34.970000 +CVE-2024-41856,0,0,c2ee80a5f2b7dae1b3c4d8f5600fac764ad18c39c82d16f5ab00e57e14b80619,2024-08-19T18:54:40.513000 CVE-2024-41858,0,0,0b2aa1223d8b75ef4509a2c890063b1cbd2e1ef2deb50b762503d032e69fdb08,2024-08-14T13:00:37.107000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 CVE-2024-41860,0,0,a6ec640882508023af3d0255006bb74c8ca989e8b14eb4eb3a86ff4f7bf11942,2024-08-14T18:19:25.823000 @@ -257143,8 +257145,8 @@ CVE-2024-41861,0,0,5c1f38441bc51a1591a6b04d24472f00c7abfad7294e2ca768b021a3f2ea6 CVE-2024-41862,0,0,7c873addb32f880d3b4d25f01e9b4fa4b723138c587f24e47fbc2d06ada810a8,2024-08-14T18:20:07.867000 CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6046,2024-08-14T18:20:16.013000 CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000 -CVE-2024-41865,0,1,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 -CVE-2024-41866,0,1,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 +CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 +CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 @@ -257407,16 +257409,16 @@ CVE-2024-42259,0,0,f93e0601d2226a89c3f393c0fb74976f6259698e4053ee9039b786e4caa1f CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000 CVE-2024-42260,0,0,eb52125b7ac8aa328b971df28fae3672970357ac79f1958c3b76d2a4939b79fc,2024-08-19T12:59:59.177000 CVE-2024-42261,0,0,72fe870a41ca864453ed4788fd4a91439d6c4b246a2a5f09a56b04af1e7ecbf8,2024-08-19T12:59:59.177000 -CVE-2024-42262,0,0,e87f7760375a43aae7b90d4890ce66a1629fae71857f676486868ed3f7c0212b,2024-08-19T12:59:59.177000 -CVE-2024-42263,0,0,87403f4ca816f23380b6f0d8c6c03c3a7456f3f5da5ff3a53adb775af2384f66,2024-08-19T12:59:59.177000 +CVE-2024-42262,0,1,3b9e5ad518b266ec37af94b80f673cede2236074449c432df6364537ce143899,2024-08-19T20:05:15.407000 +CVE-2024-42263,0,1,2a255e219a49018d61a8610f515650eaed9201ccfd00e1ef55753ab0b807400d,2024-08-19T20:41:11.240000 CVE-2024-42264,0,0,f800640e5c5b569c4b183e1d3aec25dc561d0e0348589b3fe5445e893ded35b8,2024-08-19T12:59:59.177000 CVE-2024-42265,0,0,dc9a1e67a9f4810f2841027c6483efefd3f1789eb7007a2fd693f56892bd11a5,2024-08-19T12:59:59.177000 CVE-2024-42266,0,0,e3773d6d9416557898775f8e251bb3caface8cb0ca7f14ef02f46bb386d50723,2024-08-19T12:59:59.177000 CVE-2024-42267,0,0,881474d04f014e3df273462be8ded36c9d57a485e542f49fb9e4732784ec7797,2024-08-19T12:59:59.177000 -CVE-2024-42268,0,0,e7a31f976a7847b9c8526c3b58bad6401c7f2e4167e3005ddcb1d89aa985260d,2024-08-19T12:59:59.177000 -CVE-2024-42269,0,0,79dd98ec7169036a70ebf9febcb127e37078ee5dcac6cc05d064ed3371b97e49,2024-08-19T12:59:59.177000 -CVE-2024-42270,0,0,7d3f1ef7781c4f320b876c17de2b54772efc04aa2fdfbec5c4b526e573acea3a,2024-08-19T12:59:59.177000 -CVE-2024-42271,0,0,36be35f0adb4136e64a78007fcb0f96eb08dd4ab645f747913dd24f1cc34c303,2024-08-19T12:59:59.177000 +CVE-2024-42268,0,1,470e4d27aa12d8779499ba3b2e25164e689e6957fb0c4ad57dfd46175c59308d,2024-08-19T20:52:49.323000 +CVE-2024-42269,0,1,491dada60f7e866fa32ebe8fcb0b4475c420242ae55bfcda826cc5feafe78ccd,2024-08-19T20:53:51.717000 +CVE-2024-42270,0,1,b49f12c003a5a0b58712f7f59d9683820dd71ed90538d1c5cea863c711e0b061,2024-08-19T20:01:09.520000 +CVE-2024-42271,0,1,0df7c75ef67f151a59228bcb8e14b7a35ce523209f0a0893d4ae076e680c9f4a,2024-08-19T20:03:31.840000 CVE-2024-42272,0,0,e9fd13caa415324a90840fcf36b4a7f856aa001c7dd930380894db0c2ee1562f,2024-08-19T12:59:59.177000 CVE-2024-42273,0,0,89c3e5fcb30a2aae5aa3d49a5c5b01333443b5f3eb420974b5dde59246bd10b4,2024-08-19T12:59:59.177000 CVE-2024-42274,0,0,41adbee025c5f4a53a652bf0a753c3ea42a40dbdd574998956145692ea179777,2024-08-19T12:59:59.177000 @@ -257428,10 +257430,10 @@ CVE-2024-42279,0,0,4072eea42cb14ef4445f722c9302e69097aa69e91098ddb0b91b0bf4f0001 CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000 CVE-2024-42280,0,0,6193de04bf7bd8f71c084599f52dc112addf7361b5e9e28ba30a70409cc12ba4,2024-08-19T12:59:59.177000 CVE-2024-42281,0,0,65c759fec937bf57f102ba761a6aed942da5c28968f8447a080bd52fb87900dd,2024-08-19T12:59:59.177000 -CVE-2024-42282,0,1,6156a8928cafef61f7f5f769684bd833d2bd4b3c24a74574351a7881df6b4533,2024-08-19T19:53:45.483000 -CVE-2024-42283,0,1,f825b2a7ecbebadcca9eeba322e91b65a0eb4c6f424f709ac9763ac81a1cda37,2024-08-19T19:54:33.213000 -CVE-2024-42284,0,1,3de089e862fb9363cf440d4ddcd6c7f62488df29d936c169ac7a6ab7bc964307,2024-08-19T19:47:55.623000 -CVE-2024-42285,0,1,4ec0160442d1538b95cde72767ac70bc274486d2ce7c96c2406c062e83be4de0,2024-08-19T19:45:41.590000 +CVE-2024-42282,0,0,6156a8928cafef61f7f5f769684bd833d2bd4b3c24a74574351a7881df6b4533,2024-08-19T19:53:45.483000 +CVE-2024-42283,0,0,f825b2a7ecbebadcca9eeba322e91b65a0eb4c6f424f709ac9763ac81a1cda37,2024-08-19T19:54:33.213000 +CVE-2024-42284,0,0,3de089e862fb9363cf440d4ddcd6c7f62488df29d936c169ac7a6ab7bc964307,2024-08-19T19:47:55.623000 +CVE-2024-42285,0,0,4ec0160442d1538b95cde72767ac70bc274486d2ce7c96c2406c062e83be4de0,2024-08-19T19:45:41.590000 CVE-2024-42286,0,0,24061156d805ced1339b1724f8564154074076c09f5e325f327fdc585683f93a,2024-08-19T12:59:59.177000 CVE-2024-42287,0,0,ab99cb2182c9d6159d40449c7d07218d1774759ae812acadb1ae409447b25c10,2024-08-19T12:59:59.177000 CVE-2024-42288,0,0,0473e6d533869d02183417e6ce6ab07ac8e6bd7cacb1e11495e5002891b0aae2,2024-08-19T12:59:59.177000 @@ -257440,7 +257442,7 @@ CVE-2024-42290,0,0,d27aca27562195d04490643fa18705d7b7ed22675306a86b123d07597c93e CVE-2024-42291,0,0,72aa73e566f0b3c5cb157f1659781e489a73109e53174d8bea3ddc4964e85fe8,2024-08-19T12:59:59.177000 CVE-2024-42292,0,0,8310aa9a5630623a5a144ae735b237b95b640aed6f25022423101f353e6f84b0,2024-08-19T12:59:59.177000 CVE-2024-42293,0,0,7cf92cea47cf0aeade81c478f71bad3f09bbe1b4ba14510e43dd89a0a6440ef3,2024-08-19T12:59:59.177000 -CVE-2024-42294,0,1,1014993f483faff29cfdc56b3a6e1108bbfa3c0b5440094cc7d24f2d59b3641b,2024-08-19T19:43:22.460000 +CVE-2024-42294,0,0,1014993f483faff29cfdc56b3a6e1108bbfa3c0b5440094cc7d24f2d59b3641b,2024-08-19T19:43:22.460000 CVE-2024-42295,0,0,f0cd0e6a993b87e3204ed117d3bdfa9958e49bdcdf9632bb8d42fdd57196683b,2024-08-19T12:59:59.177000 CVE-2024-42296,0,0,6f0a4e19d0af7904c42d2fd48012f42857e020384d64582beaccc791074f5639,2024-08-19T12:59:59.177000 CVE-2024-42297,0,0,c6a17cd20eb476c36e74835def3dec9425eca068ceb110058bb8cda346565ec4,2024-08-19T12:59:59.177000 @@ -257479,7 +257481,7 @@ CVE-2024-42349,0,0,7c83a1a3a31095b7c061367c56e1e2185d3951ede9de2f7c2b93de9707413 CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000 CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000 CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000 -CVE-2024-42353,0,1,ff6a20bb34a678482c7e929d5bf56188c5e8b6470cc5da2a5c329ecb11992f4a,2024-08-19T18:44:59.903000 +CVE-2024-42353,0,0,ff6a20bb34a678482c7e929d5bf56188c5e8b6470cc5da2a5c329ecb11992f4a,2024-08-19T18:44:59.903000 CVE-2024-42354,0,0,530679279c657883c4b35ba657ab96e7283f524459574665a6f69e940f2dd9b1,2024-08-12T15:49:58.230000 CVE-2024-42355,0,0,4d53406f017c64f607be0598b7dd1b3fb3451e70edad6092c759f1ac9d9afdaf,2024-08-12T15:40:32.777000 CVE-2024-42356,0,0,71e7dc9901543344eaef3df0bcbcdd32b411ba29d6c2531b0f605cb85111defa,2024-08-12T15:34:08.190000 @@ -257587,15 +257589,15 @@ CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb4 CVE-2024-42630,0,0,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000 CVE-2024-42631,0,0,1f47f8877d49e8628a42d74c73cac60b8f382fa6d5b7f60da5c7487aa880aef0,2024-08-13T19:35:12.050000 CVE-2024-42632,0,0,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000 -CVE-2024-42633,0,1,126c15d16c7bea8f5f0fd28b3aed8972f01d9a4964f8b2518721f48b17c481ca,2024-08-19T18:36:20.123000 +CVE-2024-42633,0,0,126c15d16c7bea8f5f0fd28b3aed8972f01d9a4964f8b2518721f48b17c481ca,2024-08-19T18:36:20.123000 CVE-2024-42634,0,0,6658d1cc4139c37b2ef0667c6ab1d67862bb441366a987a8fc3849f65e0dd18f,2024-08-19T13:00:23.117000 CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65c8f,2024-08-19T13:00:23.117000 CVE-2024-42638,0,0,f8a971101f7cdf9fa56d822dabf1a1d2d2e6eccbd0431f9555d3577ca133854c,2024-08-19T13:00:23.117000 -CVE-2024-42639,0,1,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000 +CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 -CVE-2024-42657,0,1,9189d652a51cff209c28ecabe9400e739d91fda304e5796d6780bd977277adf7,2024-08-19T18:36:20.123000 -CVE-2024-42658,0,1,ebcb04a44ee6ff12cd57d411c4d84c51e828425675a45b111c40a36fe5a58823,2024-08-19T18:36:20.123000 +CVE-2024-42657,0,0,9189d652a51cff209c28ecabe9400e739d91fda304e5796d6780bd977277adf7,2024-08-19T18:36:20.123000 +CVE-2024-42658,0,0,ebcb04a44ee6ff12cd57d411c4d84c51e828425675a45b111c40a36fe5a58823,2024-08-19T18:36:20.123000 CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,b21b1be134b642d147ee55ecb619e0382fab4366c661a291e53904c7941658dd,2024-05-24T01:15:30.977000 CVE-2024-42675,0,0,92c6b6457955ed616d1577d62ebea7dcf172d2ecdd66922f34ded7a7ee2d3b6e,2024-08-19T09:15:04.283000 @@ -257605,7 +257607,7 @@ CVE-2024-42678,0,0,ce8a3f135d4f809369d6b75de9ff99127513c0db10a407cdd20ba786f1f3c CVE-2024-42679,0,0,5cfa4f8dc5b9d10c39efd22720f911faf8e4898f0cdbc84b07ec1be3a3d83c77,2024-08-15T17:34:07.033000 CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000 CVE-2024-42680,0,0,7e2ee2b7453733c53c41781c0ef064c6b2c475848bb8f1311159e233bbe5cc94,2024-08-15T17:34:07.033000 -CVE-2024-42681,0,1,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000 +CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000 CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 @@ -257626,13 +257628,16 @@ CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83 CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 CVE-2024-42757,0,0,95625a6e50c27ce340e8acfc982700097d9fc83730e49a1ee849ddb378ae13da,2024-08-19T13:00:23.117000 -CVE-2024-42758,0,1,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 +CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 +CVE-2024-42812,1,1,50e8adee2bf3236ea63b95458622b06ce0fc233a32c6dc2af63faa949dd1d699,2024-08-19T20:15:07.070000 +CVE-2024-42813,1,1,924f25d6a737e9d8299317af6541fb3dac7cc9fa1fb49c20e3f455632a6861ea,2024-08-19T21:35:07.210000 +CVE-2024-42815,1,1,ba908a9c445dbb07df360dbc293a923793c9fa93ec50501c96ffd3e8f0459947,2024-08-19T20:15:07.193000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 -CVE-2024-42843,0,1,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 +CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000 CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 @@ -257662,7 +257667,7 @@ CVE-2024-42953,0,0,8851520fe29c4e2cdfe788f671b16257937bb484146dbc70d9979d7ec9114 CVE-2024-42954,0,0,d7dc5fdc7066bd66ef4157db7606f6118c02f98972de6c14f0326e5f39a08ace,2024-08-16T18:14:12.620000 CVE-2024-42955,0,0,00b8e7d9e7586e92f9d97b1e6a1644d4d4ca5fa3cfd628bfbd234416a0d76773,2024-08-16T17:35:08.957000 CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000 -CVE-2024-42966,0,1,11fb4f8406b51aaf92dcd9c74f137affdd9a6a6d3d3dd012cff469b6ec43d58b,2024-08-19T19:35:09.913000 +CVE-2024-42966,0,0,11fb4f8406b51aaf92dcd9c74f137affdd9a6a6d3d3dd012cff469b6ec43d58b,2024-08-19T19:35:09.913000 CVE-2024-42967,0,0,7e74ee4a2d6a17af6b0f12f00eb90c60c9c52c49e61e430789bbc0c38446386e,2024-08-16T13:34:29.780000 CVE-2024-42968,0,0,ea8af3ba9d524f0f7175c3ac05010317eb6e0c3232797df2ec4eeeed8bf7be47,2024-08-16T18:14:39.303000 CVE-2024-42969,0,0,8304dea3c274f1ae2ddaad05a344a9bb249c0e2abc4bd40a669c59c89b06623c,2024-08-16T18:35:15.027000 @@ -257670,7 +257675,7 @@ CVE-2024-4297,0,0,391cde32595a6f10054c7e99797c9f48482f1c612a355cb934b7ce023c8828 CVE-2024-42973,0,0,ea510c6d08cc16bdb4d726fb68ca476e64ed97e5805f96a8d49cb53ef02d84a3,2024-08-16T18:11:51.570000 CVE-2024-42974,0,0,938719a5c39f954ba2ac313637062853a8371b455f4b682f3eb1a2aeb5004821,2024-08-16T18:11:47.980000 CVE-2024-42976,0,0,b55ce95834b0b84d45bcbcea47b22be13c2eeb921a6b297cd9c701de5bff705f,2024-08-16T17:35:09.687000 -CVE-2024-42977,0,0,feb7f28f54f84204165e37a00b44b1e384cb0d1f0ba15a6d5127e74a8ec2aae1,2024-08-16T13:31:11.107000 +CVE-2024-42977,0,1,284c1cb74b11c8add0a4a2fd16aa0430e19948019ec5006358de30f607388a3a,2024-08-19T20:35:17.330000 CVE-2024-42978,0,0,b1f4d5128465b01f205b47353b8c0b280ab205530bf41f8f4bc128c131592e31,2024-08-16T13:30:54.670000 CVE-2024-42979,0,0,8fe829910a5c801caddb18b0a08003433bde998168b919898eba6ac640ceb18a,2024-08-16T18:11:41.197000 CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000 @@ -257680,14 +257685,14 @@ CVE-2024-42982,0,0,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613 CVE-2024-42983,0,0,c725dcbfb5bb576199cbbf3ee9c5a740bda0a1873727d4ce4b2ca1e69a43a819,2024-08-16T18:11:08.020000 CVE-2024-42984,0,0,2fd3b2ae263fff500fb556980428a38b378e10c4993fb651d635c225d8b2007e,2024-08-16T18:10:53.680000 CVE-2024-42985,0,0,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000 -CVE-2024-42986,0,0,729f44b69d8ed274bedf72a20b1cd0e83d0be1662a818f8ffd16806b1da8caa0,2024-08-16T13:26:43.100000 +CVE-2024-42986,0,1,0b2d204ff26f9eb28ce17ac6820e07d93d61424a006dadbf321ab643bf7229ed,2024-08-19T21:35:07.937000 CVE-2024-42987,0,0,be14eefacd9f282e13e394cb1aeefe62ea3c84389f7783546c46d3192df9881f,2024-08-16T13:26:27.123000 CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000 CVE-2024-42994,0,0,46088bee324f9fb8a88606d17f14c9f666ebd59ae6a0d59deea5611547b28ba5,2024-08-19T13:00:23.117000 CVE-2024-42995,0,0,5fe3b52ce312f2adad41265b1d44f25534179e7b5138e6f382ca4cb8e97a4739,2024-08-19T13:00:23.117000 CVE-2024-4300,0,0,9683d559686bc261042c0ad86aeb3d06ca0ebb649bc8d0eaba9f4d32c108bd00,2024-04-29T12:42:03.667000 -CVE-2024-43005,0,1,0c2d82c5e7b325535bbe68db9615fb82e7c26b50e029f354a077d9f59401062d,2024-08-19T18:35:14.987000 -CVE-2024-43006,0,1,906359812ef9bffa04be5c17860ae0368eb269d312f52d95e12872ce37b04dd4,2024-08-19T18:35:15.920000 +CVE-2024-43005,0,0,0c2d82c5e7b325535bbe68db9615fb82e7c26b50e029f354a077d9f59401062d,2024-08-19T18:35:14.987000 +CVE-2024-43006,0,0,906359812ef9bffa04be5c17860ae0368eb269d312f52d95e12872ce37b04dd4,2024-08-19T18:35:15.920000 CVE-2024-43009,0,0,468db8caeabef579a226d8a65490e413d586c09d4e7e764fb4b818b81835a912,2024-08-19T14:35:10.150000 CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000 CVE-2024-43011,0,0,a1a7726f53e21e3beb63c25ff5d202a0a16dad76f49dffd4b60f93fe1759157a,2024-08-19T14:35:10.893000 @@ -257760,48 +257765,48 @@ CVE-2024-43217,0,0,f82c4fc5d8211638ca35d56d40ca602f216f2cb77b05fbf9169296f7ea836 CVE-2024-43218,0,0,7211cf498c311837d292e9f824bafb9f3bdd8538b1ebf61d4a91523261453a7b,2024-08-13T12:58:25.437000 CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000 CVE-2024-43220,0,0,fa30aceb18b0a5400afb1d9d2f0e9c09b643520e811ea7731a8ad416203ea5f1,2024-08-13T12:58:25.437000 -CVE-2024-43221,0,1,2b76139229385b5dcceacf0dce23b96a549824f2ee979f84ad905a37cfd63278,2024-08-19T18:36:20.123000 +CVE-2024-43221,0,0,2b76139229385b5dcceacf0dce23b96a549824f2ee979f84ad905a37cfd63278,2024-08-19T18:36:20.123000 CVE-2024-43224,0,0,14cde466a8ca3b1bf8974de78502b35cfa4d5ca1d10dafe2a4d04ac6c673d0a4,2024-08-13T12:58:25.437000 CVE-2024-43225,0,0,785bc4278a6946ee9d6c10021191a3cce1fc98e617438c82e5e4e3f2e0cd03b3,2024-08-13T12:58:25.437000 CVE-2024-43226,0,0,a338b4ee27e9fc08682f17c2b31584264a82f90f5a7fca9fd60ce6764ef33c2e,2024-08-13T12:58:25.437000 CVE-2024-43227,0,0,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000 CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000 CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000 -CVE-2024-43232,0,1,d67d0e0fe89aac0949e160b289df7ae61d4b5504a801f0239cfd72e4ed0056de,2024-08-19T18:36:07.297000 +CVE-2024-43232,0,0,d67d0e0fe89aac0949e160b289df7ae61d4b5504a801f0239cfd72e4ed0056de,2024-08-19T18:36:07.297000 CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000 -CVE-2024-43236,0,1,e34883c4de9fffbcb1135e72b7f81f422c83a69e3b88600e5b59a5f63854573d,2024-08-19T18:36:07.297000 +CVE-2024-43236,0,0,e34883c4de9fffbcb1135e72b7f81f422c83a69e3b88600e5b59a5f63854573d,2024-08-19T18:36:07.297000 CVE-2024-43238,0,0,c8521e7625c83e605f0b6621da252175bd1f21854b9854934939807c71b6a24b,2024-08-19T12:59:59.177000 CVE-2024-43239,0,0,79d51d8573e5ae7ca3d4a994fc625c6641954aca391d8556cc284fe714bd5440,2024-08-19T12:59:59.177000 CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000 -CVE-2024-43240,0,1,e2590d31f9001c04f722f434932d0d561d30b41a2446647b837e0a4e39cecd2d,2024-08-19T18:36:07.297000 +CVE-2024-43240,0,0,e2590d31f9001c04f722f434932d0d561d30b41a2446647b837e0a4e39cecd2d,2024-08-19T18:36:07.297000 CVE-2024-43241,0,0,c39932a6e0a58bfac7ae4f1cf6af814f732177d07f4a962afc92645b7cabd135,2024-08-19T12:59:59.177000 -CVE-2024-43242,1,1,6e6c6d64008696b47f3b7a552cc606e837d7cf289b856662a18dc772824d7931,2024-08-19T18:36:07.297000 +CVE-2024-43242,0,0,6e6c6d64008696b47f3b7a552cc606e837d7cf289b856662a18dc772824d7931,2024-08-19T18:36:07.297000 CVE-2024-43244,0,0,1886195ce7a92c6294c50cae518f93eff0f2be660d6ad12e641d6bae1e37edd4,2024-08-19T12:59:59.177000 -CVE-2024-43245,1,1,f98104422ce6b51f20685d084ff1096bdc7ee08ba5424dd8f3e6be12d5b0f80c,2024-08-19T18:36:07.297000 +CVE-2024-43245,0,0,f98104422ce6b51f20685d084ff1096bdc7ee08ba5424dd8f3e6be12d5b0f80c,2024-08-19T18:36:07.297000 CVE-2024-43246,0,0,44a65a28ca2af5cc21ed79f6503fa68b6cded6fd3bf6e91f921a120c96c44499,2024-08-19T12:59:59.177000 -CVE-2024-43247,1,1,314702135e8dec43cdb9d48759c1f4a342c52ce50852f302ca032df3c95afd75,2024-08-19T18:36:07.297000 -CVE-2024-43248,1,1,8b3df22a4664dfd570d0e535bbeb21f2a6e86b245e37a9d073431f57df0a5a36,2024-08-19T18:36:07.297000 -CVE-2024-43249,1,1,d266a0d9c868ddd405992a7be9ce77e8bdb6b51228e95558c7bec0d134d750eb,2024-08-19T18:36:07.297000 +CVE-2024-43247,0,0,314702135e8dec43cdb9d48759c1f4a342c52ce50852f302ca032df3c95afd75,2024-08-19T18:36:07.297000 +CVE-2024-43248,0,0,8b3df22a4664dfd570d0e535bbeb21f2a6e86b245e37a9d073431f57df0a5a36,2024-08-19T18:36:07.297000 +CVE-2024-43249,0,0,d266a0d9c868ddd405992a7be9ce77e8bdb6b51228e95558c7bec0d134d750eb,2024-08-19T18:36:07.297000 CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000 -CVE-2024-43250,1,1,73defcb8a613840edc08706b7bfa965273ffaf322e2f3aa888089e7808660f62,2024-08-19T18:36:07.297000 -CVE-2024-43252,1,1,4be63f9c4a1fbca3f69e3a91cadc265cb38711901384cf8752fff4529c8c4ec4,2024-08-19T18:36:07.297000 -CVE-2024-43256,1,1,c36dc4d6eb578e10ca2d622c1902c6a06d960f9bafe6df9f369bc94f2b884207,2024-08-19T18:36:07.297000 +CVE-2024-43250,0,0,73defcb8a613840edc08706b7bfa965273ffaf322e2f3aa888089e7808660f62,2024-08-19T18:36:07.297000 +CVE-2024-43252,0,0,4be63f9c4a1fbca3f69e3a91cadc265cb38711901384cf8752fff4529c8c4ec4,2024-08-19T18:36:07.297000 +CVE-2024-43256,0,0,c36dc4d6eb578e10ca2d622c1902c6a06d960f9bafe6df9f369bc94f2b884207,2024-08-19T18:36:07.297000 CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a65,2024-05-16T13:03:05.353000 -CVE-2024-43261,1,1,84d953d651a842e6d6703fc3249639804f80f7ab68752db181f51b7ae84af3b4,2024-08-19T18:36:07.297000 +CVE-2024-43261,0,0,84d953d651a842e6d6703fc3249639804f80f7ab68752db181f51b7ae84af3b4,2024-08-19T18:36:07.297000 CVE-2024-43262,0,0,ee2d00bd7b26cdad642ada4c4b2d7bc02c0ccfbce8aef1634bfd7f75ad8dd06b,2024-08-19T12:59:59.177000 CVE-2024-43263,0,0,cf9b7583314454065255b112c0283ce49c3cc8a3b709e9840e4d308ff741cc3e,2024-08-19T12:59:59.177000 CVE-2024-43266,0,0,751fa9ab2a13f701be885e7a1662c496db49511ced127e99a8ff80c20e1ffede,2024-08-19T12:59:59.177000 CVE-2024-43267,0,0,5b844fafa4776837e860aa27df30c3483f35542b577634e0b86bc9628cc0c001,2024-08-19T12:59:59.177000 CVE-2024-4327,0,0,9a5f942b6958d2271ac79f44a3dfa6f019a91702ea5bf4b7c110b804ce763bfb,2024-05-17T02:40:22.673000 -CVE-2024-43271,1,1,f99b46b92b3d5b2518c311032cb405eef72eb5a86f97d6856788a5b4ba850c01,2024-08-19T18:36:07.297000 -CVE-2024-43272,1,1,92cc1cd5d8aafacecbd5bbf3efb4d2aa20aee78234a6e4ea8a22146097421586,2024-08-19T18:36:07.297000 +CVE-2024-43271,0,0,f99b46b92b3d5b2518c311032cb405eef72eb5a86f97d6856788a5b4ba850c01,2024-08-19T18:36:07.297000 +CVE-2024-43272,0,0,92cc1cd5d8aafacecbd5bbf3efb4d2aa20aee78234a6e4ea8a22146097421586,2024-08-19T18:36:07.297000 CVE-2024-43275,0,0,78ead3cb089aaf7c18ceb1d81053b0c408f631313f8368c9da5d02a09209ccb7,2024-08-15T13:01:10.150000 CVE-2024-43276,0,0,009413fe653f24508bf0520a9c733be017d63124458beaa10db3152efbfa2eeb,2024-08-19T12:59:59.177000 CVE-2024-43278,0,0,ce315fd6df2c7c03732ec4666e0eb8df6d4b7eb3d4a28c76f708a96fbe277c0a,2024-08-19T12:59:59.177000 CVE-2024-43279,0,0,e987096db9ded741b69a195b2928ea4cd7001885008ed57560d4daa954a47390,2024-08-19T12:59:59.177000 CVE-2024-4328,0,0,243566e1cc6bca4cb71823d7b7f30591e3ccaa89bb4c9ba718cf8de1f025e822,2024-06-12T19:33:00.527000 -CVE-2024-43280,1,1,70fdeb75e66f4b8d3e8b42148a052b1d4c52503cf27dfee56e90c2921a542fcb,2024-08-19T18:36:07.297000 -CVE-2024-43281,1,1,bf73c9efa9c24f7872f272cc4307d1cfd35c23668eef4d165edfca4d096501c7,2024-08-19T18:36:07.297000 +CVE-2024-43280,0,0,70fdeb75e66f4b8d3e8b42148a052b1d4c52503cf27dfee56e90c2921a542fcb,2024-08-19T18:36:07.297000 +CVE-2024-43281,0,0,bf73c9efa9c24f7872f272cc4307d1cfd35c23668eef4d165edfca4d096501c7,2024-08-19T18:36:07.297000 CVE-2024-43282,0,0,51a1b7b60973a964536d725b46eb7f27a1885c2e782a5c2cec51a4dab10a1bb5,2024-08-19T12:59:59.177000 CVE-2024-43284,0,0,9ec27cbbaa1c9c776151f787875b1a5263af16803ae4108b77758144ff0ef781,2024-08-19T12:59:59.177000 CVE-2024-43286,0,0,8d445c08837bc0d69bb39f698d927b03a1da9d91e0d6c24aee947cb16e9db230,2024-08-19T12:59:59.177000 @@ -257819,15 +257824,19 @@ CVE-2024-43307,0,0,756435dd685e6ec1730a305e988ba2e01786ffce6cef7ad1c53c4b8372b4d CVE-2024-43308,0,0,69d0620714881b9844f3cfb48d168468350ec94f18e61edc0e6e8e74a91b1458,2024-08-19T12:59:59.177000 CVE-2024-43309,0,0,ae9ffc5777a2ca9fc1d6ae36a20dcccfb7bd846279b2270069c08a95bc60ba1f,2024-08-19T12:59:59.177000 CVE-2024-4331,0,0,f83a1d11dfb2c744e38bc97e75352f54247538f697e111d3b125724e343ab75a,2024-07-03T02:07:25.070000 +CVE-2024-43311,1,1,d82e383c4b076f47597b45188e29fdc1277768934a5c4f19c7c0b04440cf6838,2024-08-19T20:15:07.283000 CVE-2024-43313,0,0,c53c97bdb9b1fa19aab2af1cb1b43fa0465e27a5f29b44731ef613ebedef081d,2024-08-19T12:59:59.177000 CVE-2024-43315,0,0,e6014d85dffd349f3b2ce7320cc3098b6f662e4bd5c45fdcd4617c84b6eaae10,2024-08-19T12:59:59.177000 +CVE-2024-43317,1,1,ef003ac3654690b8a1b975d5ca5417c797debeebd38a26bf062481a5d1881ef2,2024-08-19T20:15:07.480000 CVE-2024-43318,0,0,79a8e26aa72eb11eb023e3b493d059563983e38893c3fe6e33721b1cd776d8b8,2024-08-19T12:59:59.177000 CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9b7,2024-06-03T19:23:17.807000 CVE-2024-43320,0,0,ccee38afc2a835bb009830c4531368282e9727bc0052e4d4c17d31bfd55ad002,2024-08-19T12:59:59.177000 CVE-2024-43321,0,0,bb703b2de13a267b8724635b0dde06893a82d0524de00aebee7a6b84161b8d61,2024-08-19T12:59:59.177000 CVE-2024-43322,0,0,e2ca647ab771c590c5e49dd4792b17cb2a82d2c1efaab05806782389dbebd2e3,2024-08-19T12:59:59.177000 CVE-2024-43324,0,0,33fee068f1fdc9b6c272e60c8c07be2143ad8b3f7322d5fc2bc8d91bb1530540,2024-08-19T12:59:59.177000 +CVE-2024-43326,1,1,6d6e2a2749f7699db5527ceb8f84a94e9927740050e8e0749253275d3a75dcfc,2024-08-19T20:15:07.667000 CVE-2024-43327,0,0,a8f936582a6b445f01bc77c962aca7769e9a1c49bc866607b819b7c4fd48f5ab,2024-08-19T12:59:59.177000 +CVE-2024-43328,1,1,0d19fba9649d0768398fa613065548a086906237cb6292217dbf0ddf1af60583,2024-08-19T20:15:07.853000 CVE-2024-43329,0,0,26a74de26b02346cc9aef959a49d84425cfcd1e61c70d1d7eb5550839aec98ac,2024-08-19T12:59:59.177000 CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000 CVE-2024-43330,0,0,18c9cc1b418e02c0186c70603a33b75d4945832a6fdc2ddcfc149e88ac786f4b,2024-08-19T12:59:59.177000 @@ -257835,6 +257844,7 @@ CVE-2024-43335,0,0,dde6dc17375e74f502f7f2bfa9005d811d4652c2ebc27ff9b5ef099712712 CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000 CVE-2024-43342,0,0,ee642e0e72d4e0e4ec6b9a91be938e0b4b5b569cf7ce0c2f528a0acbf756353e,2024-08-19T12:59:59.177000 CVE-2024-43344,0,0,379496d95a40a85d8ca980cbd671a249672d41d04bb66c9b9dcaac6246ede174,2024-08-19T12:59:59.177000 +CVE-2024-43345,1,1,8309cfbab18da12cc26abd14bff061c306958dba686f1a69ec1ffc2bbeb300a3,2024-08-19T20:15:08.047000 CVE-2024-43346,0,0,570d0cbe7918a4fb4c0a3bd9c07365439742f024e036e2f65c29c7f9160e1fea,2024-08-19T12:59:59.177000 CVE-2024-43347,0,0,a069bfc58b83fe59c8005c1de81afd5aa4891713ad4051f4fc9cde4e734ceceb,2024-08-19T12:59:59.177000 CVE-2024-43348,0,0,4e587a486ab64b74f27c7a0d66471182d7fcb8dfc3a2efb9e38ff5b79c569ce9,2024-08-19T12:59:59.177000 @@ -257844,6 +257854,7 @@ CVE-2024-43350,0,0,9cb5938cb418224b70fa131bbeefb55bb31a9bddc4e871598a5180ebb0340 CVE-2024-43351,0,0,4f1a44dd0b092b1cbc40294ea3c1e20ba66e414acc7c7ec139aec5d1c68e6c14,2024-08-19T12:59:59.177000 CVE-2024-43352,0,0,07311db07e42253e292f873208eb8f7da45aad78c36050ff71f1c14b42155a03,2024-08-19T12:59:59.177000 CVE-2024-43353,0,0,63ba11fd8c07de3459ae027affa4265b156cbb90703f59d7d8cf9f7e3e549de4,2024-08-19T12:59:59.177000 +CVE-2024-43354,1,1,fb004d96e3443dd2f4b64dda1f0f14d7858998ca65a32e9e30f8530fe47f3b23,2024-08-19T20:15:08.233000 CVE-2024-43357,0,0,843c188c76220c12bbff3ab3d1983437698ada4d60a6933ff05615bf550f6a01,2024-08-19T13:00:23.117000 CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ffc3a,2024-08-13T12:58:25.437000 CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000 @@ -257859,15 +257870,15 @@ CVE-2024-43372,0,0,a043dcae2b6cd795ef3b53e2a2297979218d8f1c42273b50d63478eed641c CVE-2024-43373,0,0,db91654b81ea063be92db1e222d81162a2c449df0cbfa02fb41874b948a4c8f0,2024-08-16T21:46:08.440000 CVE-2024-43374,0,0,985df10ab42e21b923c86b553c9d031d32672b2cc13ac7d069fd0fa1d25bd2e8,2024-08-19T13:00:23.117000 CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202d67,2024-08-19T13:00:23.117000 -CVE-2024-43379,0,1,2274510657d95ffcc48a92770730410821cfe34d62852c5631ab582d27d295cf,2024-08-19T18:36:20.123000 -CVE-2024-43380,0,1,8e4600010954207ddca63fc28edeb1cd291abe3badd6cde0e059ea5db707d614,2024-08-19T18:36:20.123000 +CVE-2024-43379,0,0,2274510657d95ffcc48a92770730410821cfe34d62852c5631ab582d27d295cf,2024-08-19T18:36:20.123000 +CVE-2024-43380,0,0,8e4600010954207ddca63fc28edeb1cd291abe3badd6cde0e059ea5db707d614,2024-08-19T18:36:20.123000 CVE-2024-43381,0,0,a01674578db7c1648bbba4f532305ea57cf2109d65478c5f7b839cc278dc42fc,2024-08-19T13:00:23.117000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 -CVE-2024-43399,0,1,99ea03d4cb51d89848626678b95b950069c5e7694cc6c47ad014346b9029f738,2024-08-19T18:36:20.123000 +CVE-2024-43399,0,0,99ea03d4cb51d89848626678b95b950069c5e7694cc6c47ad014346b9029f738,2024-08-19T18:36:20.123000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 -CVE-2024-43400,0,1,948d99d3226e07bed979bae346a84e40ea844c2594a77d0a0cad612ad3cc8bc0,2024-08-19T18:36:07.297000 -CVE-2024-43401,0,1,9aa398b025131392ce8a6f0e796ef6d970be06489ef92f0ee874b8751775b22e,2024-08-19T18:36:07.297000 +CVE-2024-43400,0,0,948d99d3226e07bed979bae346a84e40ea844c2594a77d0a0cad612ad3cc8bc0,2024-08-19T18:36:07.297000 +CVE-2024-43401,0,0,9aa398b025131392ce8a6f0e796ef6d970be06489ef92f0ee874b8751775b22e,2024-08-19T18:36:07.297000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 @@ -257877,7 +257888,7 @@ CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f CVE-2024-43472,0,0,5e8b1f10b1ac66b87fc99a4bc40fd92adf2d19366f98cc60bf0ef2a8a8249713,2024-08-19T13:00:23.117000 CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 -CVE-2024-4350,0,0,d55d15841827a93d7de9d28a2b139074634bf4da74d239b69f87daf5bdc1c2f7,2024-08-12T13:41:36.517000 +CVE-2024-4350,0,1,1a6f5a846c08d92d747bb60db8b475cd9e2a367d1319390edc34eccdbc5075d5,2024-08-19T21:15:10.053000 CVE-2024-4351,0,0,1afa7cdd2b07ed7f6c7d4fd33431ae4e847e5055e80de2c2ff284dbdde180a83,2024-05-16T13:03:05.353000 CVE-2024-4352,0,0,83fde2dc0fb70bd9398ce4f7dc00180654ce0fb46c0f63d8091186b07c4c5ecb,2024-05-16T13:03:05.353000 CVE-2024-4353,0,0,aba01e17f5523fea8114a858821f92c407b11c64f22dee184f29d8c270ca2d70,2024-08-07T19:15:48.223000 @@ -257907,11 +257918,11 @@ CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000 CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000 CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000 -CVE-2024-43807,0,0,6e6fa4dfa6862a115bd3cd96a871e98e950bfd1543152be878dc67af9063275f,2024-08-19T13:00:23.117000 -CVE-2024-43808,0,0,e9d191c3599f81399f15ebc7d9e2685d9965db3ad8147f19c205fdd0569f4700,2024-08-19T13:00:23.117000 -CVE-2024-43809,0,0,24e24292b82566d970dc3a2c519e7b57fbe1e7cb5c9f76616b12d0810db14c6e,2024-08-19T13:00:23.117000 +CVE-2024-43807,0,1,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000 +CVE-2024-43808,0,1,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000 +CVE-2024-43809,0,1,83732ae5b37d299f4c52d51b00d231c62060b5df8f6e1ebed9668263f47472ea,2024-08-19T21:11:28.327000 CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000 -CVE-2024-43810,0,0,3720192ade5f2e892f662f63e93f6e776a25b414c6c29d36759006f54ff8a7bd,2024-08-19T13:00:23.117000 +CVE-2024-43810,0,1,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9221,2024-08-19T21:11:45.823000 CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000 CVE-2024-43816,0,0,44d0571961b52b51ae89fc464c69e8f5e9bafc93420d249ab2ac48cf3e8eb3af,2024-08-19T12:59:59.177000 CVE-2024-43817,0,0,7d65ded527da72f977763f6595da9be484a0a5a4216969a1232f7957de06d139,2024-08-19T12:59:59.177000 @@ -259270,9 +259281,9 @@ CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 CVE-2024-5926,0,0,c0270df40bf1e286ad8957d3baf72bffff8cfb079896c2cd70dab328142b04f1,2024-07-12T08:15:11.797000 CVE-2024-5927,0,0,1b7b6c83db008ddacf60314208106fd6b62f6e315f688ea9bb13e1efdd6d20e3,2024-06-13T11:15:48.917000 -CVE-2024-5933,0,0,6758af0b2662de653aa95051fa19ece2cb88da72e8efd4f694bc468beddcf48e,2024-06-27T19:25:12.067000 +CVE-2024-5933,0,1,4b5b8ee984dca52e93a5c74fef0bbbf1e4141af006167bcc3f0d3b5bd5eb1afc,2024-08-19T21:07:56.627000 CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b6e,2024-06-14T16:15:14.647000 -CVE-2024-5935,0,0,a7d5b6247499f12d315c68e24ef40626cc2368303f6af76cae9629f3161ce437,2024-06-27T19:25:12.067000 +CVE-2024-5935,0,1,d873c2fb0d6ab83afab61b44853fabc44b82fc2acb633797561e5182f89995f3,2024-08-19T21:08:52.097000 CVE-2024-5936,0,0,e2323b28e2dc5842b2496ff11e24a4c05c687e44cc94008f23990b03437dd0e3,2024-06-27T19:25:12.067000 CVE-2024-5937,0,0,51e02db0c012e8abf29c205fa293326baf9f1716cc7d665366a7580a75792510,2024-07-09T18:19:14.047000 CVE-2024-5938,0,0,cb9458c48aba8db651d9dffddd7092d96350e7e331bc06e4be8ccddeb7b09d02,2024-07-05T14:25:03.107000 @@ -259344,7 +259355,7 @@ CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8 CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 CVE-2024-6038,0,0,4807c09415696120707d8114a37a205bc4f3b855697eebb2268af32cdef6d3c9,2024-06-27T19:25:12.067000 -CVE-2024-6039,0,1,4b5a4db383c02b57a196aeff64e9771fe65ea4f6cb31d1465158521f6c86f255,2024-08-19T19:26:48.043000 +CVE-2024-6039,0,0,4b5a4db383c02b57a196aeff64e9771fe65ea4f6cb31d1465158521f6c86f255,2024-08-19T19:26:48.043000 CVE-2024-6040,0,0,6a9c4144365634994ba43a8add9c13dbdf1bbd1570489b8639d9e032f2336e4e,2024-08-01T16:45:25.400000 CVE-2024-6041,0,0,92efd7a17c065b70be549e53ceedb9d064d764ccd26b9ca8d8b9c2364f8da7bf,2024-08-15T17:08:11.093000 CVE-2024-6042,0,0,283b4384a7db17fcb736e72a79d56eaff8b425e8cdc09133875467b277d4cbaa,2024-08-15T17:13:52.290000 @@ -259460,8 +259471,8 @@ CVE-2024-6177,0,0,e51904c80961d41608903dd9ecba1a38d9527008f51a121ebd3747e18a611a CVE-2024-6178,0,0,59f19ecff82a76c70bb0044c2129cdaa12044314a15fb2e7dd459f8df0580df5,2024-06-20T15:16:58.507000 CVE-2024-6179,0,0,2b19138855924be9a22cebfb9d12e0ecf8edc110d160dd4a9b77eaf81994263d,2024-06-20T15:16:47.133000 CVE-2024-6180,0,0,ae7bf283ba8414ace0d3bfd9d7e72bd4b5eafadc11f0e00b9a21d42e8d6a993e,2024-07-09T18:19:14.047000 -CVE-2024-6181,0,1,4a771d7fd4a1939a399fe23d890c6a784b853d9c1614b88a570bf3e3a1dcf878,2024-08-19T18:45:06.147000 -CVE-2024-6182,0,1,4a297c17be5ae4a5f3d26ce96174b39183e405f9b2f0229c44576db8b8114f5e,2024-08-19T18:46:05.410000 +CVE-2024-6181,0,0,4a771d7fd4a1939a399fe23d890c6a784b853d9c1614b88a570bf3e3a1dcf878,2024-08-19T18:45:06.147000 +CVE-2024-6182,0,0,4a297c17be5ae4a5f3d26ce96174b39183e405f9b2f0229c44576db8b8114f5e,2024-08-19T18:46:05.410000 CVE-2024-6183,0,0,103c390d46ed5a5b34f5195878be208fa52acfb25358825f2747fb4a1823c1fd,2024-06-20T16:15:14.903000 CVE-2024-6184,0,0,6ed410242918c83588a5b17ccbcdbea871e2837aedc3a54aaddf5510e1de1707,2024-06-20T14:15:11.953000 CVE-2024-6185,0,0,cd6c234b3ed72fe4a1ddcb674b9d77147cb4f951db51bc078af89543191ba8a4,2024-06-25T21:16:01.940000 @@ -259595,7 +259606,7 @@ CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193d CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000 CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000 CVE-2024-6347,0,0,b05eb2868311217449eb10df58f7023e3786bc9ff3f4e4c02dbfa2fb465a5bc1,2024-08-16T14:33:42.730000 -CVE-2024-6348,0,1,1f0be4740551130c8620cc606781e2a1ae91ed22562ad0c79d0d1aac8719e4a7,2024-08-19T18:36:20.123000 +CVE-2024-6348,0,0,1f0be4740551130c8620cc606781e2a1ae91ed22562ad0c79d0d1aac8719e4a7,2024-08-19T18:36:20.123000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 @@ -259719,8 +259730,8 @@ CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bed CVE-2024-6529,0,0,39f9da174065ddfb2f1cb6d88de520cca12e78f6992a8df9512aec7d73b21efd,2024-08-01T14:35:13.090000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6532,0,0,34d446197f804dcbdd8feccdfe721cd1c46fe7ee3b5e0da65e1be9d287c7b644,2024-08-14T13:00:37.107000 -CVE-2024-6533,0,1,66400252f24e50c2d9b1e3ed6e622d7f7b7af745f22a620964464c66ff668430,2024-08-19T18:13:59.457000 -CVE-2024-6534,0,1,0cc2422c4acf0879987370c9bde0fddfc0c65c819154f83a709538e35fb27fca,2024-08-19T18:17:15.110000 +CVE-2024-6533,0,0,66400252f24e50c2d9b1e3ed6e622d7f7b7af745f22a620964464c66ff668430,2024-08-19T18:13:59.457000 +CVE-2024-6534,0,0,0cc2422c4acf0879987370c9bde0fddfc0c65c819154f83a709538e35fb27fca,2024-08-19T18:17:15.110000 CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000 CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 @@ -260335,11 +260346,11 @@ CVE-2024-7539,0,0,8ca50ab02514fa4f50147af014ed5c28ffea833055fdfc32acd3499e2ad0c8 CVE-2024-7540,0,0,cb5a554aa0c84746e2f58930cfb8b74760d168567497ea5e5c5527a69f70db0f,2024-08-06T16:30:24.547000 CVE-2024-7541,0,0,c9b87438ef0c3389f655c0ae7417b44a4e34fadd136e084427d65c8d9544c3b6,2024-08-06T16:30:24.547000 CVE-2024-7542,0,0,7d7280aebe9dc168d7a4a09def93da0d42a3442b7c1b4b2a8bbd3843df2a029b,2024-08-06T16:30:24.547000 -CVE-2024-7543,0,1,503a11ee44f99a51704a6abc3db92fb588f21d0ff08bd2bd9e412e5d0c2d46f8,2024-08-19T19:59:55.340000 -CVE-2024-7544,0,0,5e5704656f3acf323916d86aa21ce308fffec1da803881dd5ee0eea27f03b767,2024-08-06T16:30:24.547000 -CVE-2024-7545,0,0,41789b4aa3b486ddf7d25b9471bfc90c88f8496bc14386811c5c685b59c848ee,2024-08-06T16:30:24.547000 +CVE-2024-7543,0,0,503a11ee44f99a51704a6abc3db92fb588f21d0ff08bd2bd9e412e5d0c2d46f8,2024-08-19T19:59:55.340000 +CVE-2024-7544,0,1,c1cf8fbff6eae578412d69636bfc44a9dcbaf3b74591629eefcc6a239c026269,2024-08-19T20:00:24.957000 +CVE-2024-7545,0,1,ddf5364e31008f118bae55653e1cb0aef851b5fa86eb5245378834db00788f01,2024-08-19T20:00:57.433000 CVE-2024-7546,0,0,a0b520d000dce64c3863ed1b5eb696449d97e5ef3503a621e0cf62f26b7a1008,2024-08-06T16:30:24.547000 -CVE-2024-7547,0,0,ae6868fa244d557b6b616cb266ac453c877446e3f575efc3776ee78dc7ce2c16,2024-08-06T16:30:24.547000 +CVE-2024-7547,0,1,8b5af897776f46884f36969e1145e07082807ba989be313683ebd633a8d93d75,2024-08-19T20:03:12.377000 CVE-2024-7548,0,0,a83134ab837c1f044f7727880755ec030be1b2bfb863a86ddf4e4c1bc02ee770,2024-08-08T13:04:18.753000 CVE-2024-7550,0,0,0ccf7d721eccaf753ef6c8a48b561ee0f9b8839c90b74eac00f4a21c8fe96817,2024-08-12T18:32:08.900000 CVE-2024-7551,0,0,b186fc017c389d319de7d861b1d913a84a5458cd5dbd51c140f542d4aff6a7a9,2024-08-12T16:12:12.377000 @@ -260365,7 +260376,7 @@ CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e6 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 -CVE-2024-7592,1,1,f5528a09220a8b4c03dbb46c177bf2b13223c76de9acbf71ed1979f6742b92c3,2024-08-19T19:26:46.993000 +CVE-2024-7592,0,0,f5528a09220a8b4c03dbb46c177bf2b13223c76de9acbf71ed1979f6742b92c3,2024-08-19T19:26:46.993000 CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000 CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000 CVE-2024-7613,0,0,06e5e4cabe0ef18122aca52d435df5e080447fe62b8094db57d734d45448c36d,2024-08-12T13:41:36.517000 @@ -260453,22 +260464,22 @@ CVE-2024-7797,0,0,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5 CVE-2024-7798,0,0,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000 CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000 CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 -CVE-2024-7808,0,1,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 -CVE-2024-7809,0,1,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 -CVE-2024-7810,0,1,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000 -CVE-2024-7811,0,1,88c1b109895453b0e016b8f565457741ad81c89fc2c5c56111b619f9ad92c4a8,2024-08-19T18:15:40.487000 -CVE-2024-7812,0,1,7d23c7651a18766135526d086e05755f7342e9775f0f39e533e1590484eb2e31,2024-08-19T18:16:21.283000 -CVE-2024-7813,0,1,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f7f,2024-08-19T18:16:48.327000 -CVE-2024-7814,0,1,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000 -CVE-2024-7815,0,1,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000 -CVE-2024-7828,0,1,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000 -CVE-2024-7829,0,1,c3cc2e26bac7b68e3fabf3f591217b419b1c20cb19d25c24cc8b101a28c94a8b,2024-08-19T18:34:00.040000 -CVE-2024-7830,0,1,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f88,2024-08-19T18:34:36.987000 -CVE-2024-7831,0,1,eb69cd4a0800be9661e71c87c21be96f36edebb1b6acd7d144479ba831d4e240,2024-08-19T18:35:25.813000 +CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 +CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 +CVE-2024-7810,0,0,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000 +CVE-2024-7811,0,0,88c1b109895453b0e016b8f565457741ad81c89fc2c5c56111b619f9ad92c4a8,2024-08-19T18:15:40.487000 +CVE-2024-7812,0,0,7d23c7651a18766135526d086e05755f7342e9775f0f39e533e1590484eb2e31,2024-08-19T18:16:21.283000 +CVE-2024-7813,0,0,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f7f,2024-08-19T18:16:48.327000 +CVE-2024-7814,0,0,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000 +CVE-2024-7815,0,0,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000 +CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000 +CVE-2024-7829,0,0,c3cc2e26bac7b68e3fabf3f591217b419b1c20cb19d25c24cc8b101a28c94a8b,2024-08-19T18:34:00.040000 +CVE-2024-7830,0,0,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f88,2024-08-19T18:34:36.987000 +CVE-2024-7831,0,0,eb69cd4a0800be9661e71c87c21be96f36edebb1b6acd7d144479ba831d4e240,2024-08-19T18:35:25.813000 CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7ef,2024-08-19T16:02:17.383000 CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000 CVE-2024-7838,0,0,08896d0dd5f0d271651ed959479ababcf3678bab2f6de38319217dbebd9121c3,2024-08-19T13:00:23.117000 -CVE-2024-7839,0,0,94790d44c57f3d6cda88c2d05a1aec9fac8c3738af92c1bbde24c4a763e8b732,2024-08-19T13:00:23.117000 +CVE-2024-7839,0,1,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 CVE-2024-7841,0,0,009f80811a7e510b5a67a297d5581e736005de8d0fd00ac7dc1232d79672e30e,2024-08-19T13:00:23.117000 CVE-2024-7842,0,0,376595f98e03b5d55dfdd820fd73054da72fc5ca1bcda372d5b4d14b620e4f87,2024-08-19T13:00:23.117000 CVE-2024-7843,0,0,b225e3e73de15f6d60b8901f2783f6fa1e04b6e464a4da789732b7d24dd9ea31,2024-08-19T13:00:23.117000 @@ -260488,17 +260499,17 @@ CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739 CVE-2024-7898,0,0,8c09771630e516b5f0f9a153f946d68f8ead0f340784a4987dcbcd7e91566a30,2024-08-19T15:15:09.297000 CVE-2024-7899,0,0,eae1357abf47e41c71af7e92c424ab9c792614c8de4efe8ea4e3fa4fd0ad24e8,2024-08-19T12:59:59.177000 CVE-2024-7900,0,0,80f124872895e5bd3ab8b707b60991c4a83751766ca4ab41aca3042ca240f062,2024-08-19T12:59:59.177000 -CVE-2024-7901,0,0,09187ffe5f954d2e257aeae071de03c7cc013cd8318011f8801c2a33e42759b0,2024-08-19T12:59:59.177000 +CVE-2024-7901,0,1,4950959963644b22c26b6d5a7faabd9b618c18eb18a5ef6586de4f47918c006e,2024-08-19T21:15:10.157000 CVE-2024-7902,0,0,d9317e94e681e5fc5d081bdb330e47fde6ed15e7a874dabef3b76a04912c9983,2024-08-19T12:59:59.177000 CVE-2024-7903,0,0,65c75a540b1b29079982843aeb23d97ba8ab7149bfb3184abe8ee63d1aa7fdf6,2024-08-19T12:59:59.177000 CVE-2024-7904,0,0,00b92af797fcf7243beef8cf467d3a4a50194d2f529bd582708c05ea102b2d8d,2024-08-19T12:59:59.177000 CVE-2024-7905,0,0,6de58aadea45ceeb00cc6fb61fbda9d7e7d95e6ea77af9889eb16144c4609628,2024-08-19T12:59:59.177000 CVE-2024-7906,0,0,5925ebd1a52432bd63b3f19ac1ead0d4887664fec659899d48bbaa77d66a321d,2024-08-19T12:59:59.177000 -CVE-2024-7907,0,1,827448a6d782832b90e0dd3114804655fe12e38aa269495431146155f04a25e9,2024-08-19T18:53:05.753000 -CVE-2024-7908,0,1,1704b05a8eab2513be21f00da86f5d343c3177e7c40e6732dc94cca77c757036,2024-08-19T18:51:45.210000 -CVE-2024-7909,0,1,3ff5920e8c2d440f1d0a0566cd9f8d3e8252d8e263e071d23d56a988554a2719,2024-08-19T18:51:07.600000 -CVE-2024-7910,0,1,dddecbe9efccf1f397282c79f0ba4716c91b37bb24bbae91fa6ba76ac0a217be,2024-08-19T18:49:49.110000 -CVE-2024-7911,0,1,859a4ab2d69fd8051484705c8ccd7b2fca36f9fd16b342bf7a32ac0026ea24e4,2024-08-19T18:48:06.527000 +CVE-2024-7907,0,0,827448a6d782832b90e0dd3114804655fe12e38aa269495431146155f04a25e9,2024-08-19T18:53:05.753000 +CVE-2024-7908,0,0,1704b05a8eab2513be21f00da86f5d343c3177e7c40e6732dc94cca77c757036,2024-08-19T18:51:45.210000 +CVE-2024-7909,0,0,3ff5920e8c2d440f1d0a0566cd9f8d3e8252d8e263e071d23d56a988554a2719,2024-08-19T18:51:07.600000 +CVE-2024-7910,0,0,dddecbe9efccf1f397282c79f0ba4716c91b37bb24bbae91fa6ba76ac0a217be,2024-08-19T18:49:49.110000 +CVE-2024-7911,0,0,859a4ab2d69fd8051484705c8ccd7b2fca36f9fd16b342bf7a32ac0026ea24e4,2024-08-19T18:48:06.527000 CVE-2024-7912,0,0,d022e995569549791df9628a3255ea9ef44a2cde43358affb6b230c8e7dbab8f,2024-08-19T16:16:10.667000 CVE-2024-7913,0,0,3ca4516cfde0ec40156a2de25faf85d000b43871724e778a5c8d5e9733f2280f,2024-08-19T16:14:30.670000 CVE-2024-7914,0,0,360cef7c15cef40e34b5743ca5d838d36fa6ba30c6337dbb0cc4fd0cdd37714c,2024-08-19T16:12:51.837000 @@ -260507,6 +260518,9 @@ CVE-2024-7917,0,0,eee101cab94721701b8799ab6e3327ea4308628e86850d2bd714ca62d0b6ed CVE-2024-7919,0,0,f2bb5e312b080254029100aad55ac0e116f106f8875406ee9eda26e8584e5716,2024-08-19T12:59:59.177000 CVE-2024-7920,0,0,c41e33ff5de5a36152bea0a48597e7ee27df39730a99a7d96b4832bf67ef32a2,2024-08-19T12:59:59.177000 CVE-2024-7921,0,0,373fc8493a42dec9024075bfa6d26cd35595f3ee4bbd93f8a4d782f94f96ad56,2024-08-19T12:59:59.177000 -CVE-2024-7922,0,1,b9a52276ef0e4b4e0a811fa837019df24b09b6e9a0ad97caa8b416fc4ac9a3e3,2024-08-19T18:36:20.123000 -CVE-2024-7924,1,1,26e80ca5a6c3d5242f65253bd49607d64ce3c4f3d838752c2baea16ef867ef89,2024-08-19T18:36:07.297000 -CVE-2024-7925,1,1,f91a011a841c4359c403a134e1dd493039b70a163d3e50145ae97ad8d71d5ebe,2024-08-19T18:36:07.297000 +CVE-2024-7922,0,0,b9a52276ef0e4b4e0a811fa837019df24b09b6e9a0ad97caa8b416fc4ac9a3e3,2024-08-19T18:36:20.123000 +CVE-2024-7924,0,0,26e80ca5a6c3d5242f65253bd49607d64ce3c4f3d838752c2baea16ef867ef89,2024-08-19T18:36:07.297000 +CVE-2024-7925,0,0,f91a011a841c4359c403a134e1dd493039b70a163d3e50145ae97ad8d71d5ebe,2024-08-19T18:36:07.297000 +CVE-2024-7926,1,1,70ed1b45e7fed7c8943930ceb1db4b6d34d95fe3d55e22c7644ab2d1c7ae8699,2024-08-19T20:15:08.447000 +CVE-2024-7927,1,1,0771d0a8bd672e949fa96a772aebae8f3734a2f3fac503ef0f21148f9a511516,2024-08-19T20:15:08.680000 +CVE-2024-7958,1,1,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000