Auto-Update: 2024-08-08T18:00:17.302181+00:00

This commit is contained in:
cad-safe-bot 2024-08-08 18:03:14 +00:00
parent 7a14064f97
commit ea48197151
47 changed files with 2907 additions and 332 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48662",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-28T13:15:07.937",
"lastModified": "2024-04-30T15:03:30.553",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-08T16:35:01.007",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50008",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-19T17:15:52.013",
"lastModified": "2024-06-10T18:15:23.660",
"lastModified": "2024-08-08T16:35:02.053",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.n6.1-3-g466799d4f5 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n av_malloc en el componente libavutil/mem.c:105:9."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/FFmpeg/FFmpeg/commit/5f87a68cf70dafeab2fb89b42e41a4c29053b89b",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50702",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T23:15:46.587",
"lastModified": "2024-03-27T12:29:30.307",
"lastModified": "2024-08-08T16:35:03.110",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Sikka SSCWindowsService 5 2023-09-14 ejecuta un programa como LocalSystem pero permite el control total por parte de usuarios con pocos privilegios (y los usuarios con pocos privilegios tienen acceso de escritura a %PROGRAMDATA%\\SSCService). En consecuencia, los usuarios con pocos privilegios pueden ejecutar c\u00f3digo arbitrario como LocalSystem."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.youtube.com/watch?v=3dCoV33y1WY",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5397",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:13.240",
"lastModified": "2024-04-17T20:08:21.887",
"lastModified": "2024-08-08T16:35:04.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-0101",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T17:15:17.560",
"lastModified": "2024-08-08T17:15:17.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Mellanox OS, ONYX, Skyway, MetroX-2 and MetroX-3 XC contain a vulnerability in ipfilter, where improper ipfilter definitions could enable an attacker to cause a failure by attacking the switch. A successful exploit of this vulnerability might lead to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5559",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-0102",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T17:15:18.013",
"lastModified": "2024-08-08T17:15:18.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm, where an attacker can cause an out-of-bounds read issue by deceiving a user into reading a malformed ELF file. A successful exploit of this vulnerability might lead to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5548",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-0107",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T17:15:18.240",
"lastModified": "2024-08-08T17:15:18.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5557",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-0108",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-08-08T17:15:18.473",
"lastModified": "2024-08-08T17:15:18.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Jetson Linux contains a vulnerability in NvGPU where error handling paths in GPU MMU mapping code fail to clean up a failed mapping attempt. A successful exploit of this vulnerability may lead to denial of service, code execution, and escalation of privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5555",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22633",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-26T04:15:08.910",
"lastModified": "2024-04-26T12:58:17.720",
"lastModified": "2024-08-08T16:35:05.543",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que el Setor Informatica Sistema Inteligente para Laboratorios (SIL) 388 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro hprinter. Esta vulnerabilidad se activa mediante una solicitud POST manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://tomiodarim.io/posts/cve-2024-22632-3/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26929",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:07.380",
"lastModified": "2024-05-23T19:07:27.803",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-08T16:35:06.543",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-415"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27765",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T23:15:08.050",
"lastModified": "2024-03-06T15:18:08.093",
"lastModified": "2024-08-08T16:35:07.573",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Directory Traversal en Jeewms v.3.7 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente cgformTemplateController."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gitee.com/erzhongxmu/JEEWMS/issues/I8YN90",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30923",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-18T21:15:07.630",
"lastModified": "2024-04-19T13:10:25.637",
"lastModified": "2024-08-08T16:35:08.933",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en DerbyNet v9.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la cl\u00e1usula donde en Racer Document Rendering"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-3180",
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"published": "2024-04-03T19:15:44.560",
"lastModified": "2024-04-04T12:48:41.700",
"lastModified": "2024-08-08T17:15:19.223",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Concrete CMS version 9 below 9.2.8 and previous versions below 8.5.16 is vulnerable to Stored XSS in blocks of type file.\u00a0Prior to fix, stored XSS could be caused by a rogue administrator adding malicious code to the link-text field when creating a block of type file.\u00a0The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .\u00a0Thanks Alexey Solovyev for reporting.\n\n"
"value": "Concrete CMS version 9 below 9.2.8 and previous versions below 8.5.16 is vulnerable to Stored XSS in blocks of type file.\u00a0Stored XSS could be caused by a rogue administrator adding malicious code to the link-text field when creating a block of type file.\u00a0The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .\u00a0Thanks Alexey Solovyev for reporting."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34230",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:38:37.087",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-08-08T16:35:11.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross Site Scripting (XSS) en Sourcecodester Laboratory Management System v1.0 permite a los atacantes ejecutar script web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Informaci\u00f3n del sistema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34230.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37315",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-14T16:15:11.473",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:35:23.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,102 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndIncluding": "23.0.12",
"matchCriteriaId": "4D3FCD5B-9518-43D0-AFA6-E78D1645B2E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndIncluding": "24.0.12",
"matchCriteriaId": "682262D1-7313-4F62-ACA2-35215AD9B747"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "25.0.0",
"versionEndExcluding": "25.0.13",
"matchCriteriaId": "022E939C-D0FF-4B15-B196-2E31648A6D7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "26.0.0",
"versionEndExcluding": "26.0.12",
"matchCriteriaId": "4C261403-8DD8-4A99-956A-BF6F368092EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "26.0.0",
"versionEndExcluding": "26.0.12",
"matchCriteriaId": "B6EB74E4-9D73-4516-9509-A776B76E203F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "27.0.0",
"versionEndExcluding": "27.1.7",
"matchCriteriaId": "37BAF93B-3E31-4C89-BDCE-DCF8E58E71D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "27.0.0",
"versionEndExcluding": "27.1.7",
"matchCriteriaId": "2171184A-C969-4912-89BF-BD7B442282E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "28.0.0",
"versionEndExcluding": "28.0.3",
"matchCriteriaId": "C0D65C0C-98E1-493B-8EA0-5661AF8AAD1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "28.0.0",
"versionEndExcluding": "28.0.3",
"matchCriteriaId": "CE67692D-481F-43BE-981D-108402DDF8CA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5mq8-738w-5942",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/server/pull/43727",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/1356508",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37884",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-14T16:15:13.340",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:39:59.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,88 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "25.0.0",
"versionEndExcluding": "25.0.13.7",
"matchCriteriaId": "5B0FD8DA-3820-4AF9-B7F5-FEEABCAE6023"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "26.0.0",
"versionEndExcluding": "26.0.13",
"matchCriteriaId": "8F643317-2586-435E-8D89-721BC6161691"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "26.0.0",
"versionEndExcluding": "26.0.13",
"matchCriteriaId": "6909C63C-3755-4B68-B90E-4C5E14C78787"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "27.0.0",
"versionEndExcluding": "27.1.8",
"matchCriteriaId": "8696DA00-5B0C-45F5-BD50-9FF1F5E4646F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "27.0.0",
"versionEndExcluding": "27.1.8",
"matchCriteriaId": "B6C25B03-B587-4F48-BE81-052AF67E2045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "28.0.0",
"versionEndExcluding": "28.0.4",
"matchCriteriaId": "C3A816F7-5D5E-43CB-9C53-E4C5B1344C84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "28.0.0",
"versionEndExcluding": "28.0.4",
"matchCriteriaId": "E04001FE-890B-4D94-B679-B0854E840F39"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwgx-f37p-xh8c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/server/pull/43727",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/2290680",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37887",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-14T16:15:14.237",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:33:31.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,77 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "27.0.0",
"versionEndExcluding": "27.1.10",
"matchCriteriaId": "F38721C1-838D-4E12-80EA-4A275C457A97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "27.0.0",
"versionEndExcluding": "27.1.10",
"matchCriteriaId": "54300595-D23D-4F77-8F68-C6B60D6CB0D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "28.0.0",
"versionEndIncluding": "28.0.6",
"matchCriteriaId": "BE4CD3B0-788F-41F8-98A9-388853A84D0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "28.0.0",
"versionEndExcluding": "28.0.6",
"matchCriteriaId": "84E246F1-39F9-4AAB-9049-4002E5EF539A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:29.0.0:*:*:*:-:*:*:*",
"matchCriteriaId": "45508E90-8438-4A52-900E-A2154096E31C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:29.0.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "8573835A-33F1-4598-83F4-EBCE44EDE95D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/server/pull/45309",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/2479325",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38301",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-10T03:15:02.447",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T17:01:45.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:alienware_command_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndIncluding": "5.7.3.0",
"matchCriteriaId": "FD086EC6-4924-450E-A804-E77FE50B4341"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225774/dsa-2024-258",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40898",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-18T10:15:03.217",
"lastModified": "2024-08-01T13:58:17.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:02:40.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +71,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.62",
"matchCriteriaId": "305E43F5-3253-4B7B-A8B0-E6F937986C55"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41037",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T15:15:12.240",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T17:53:57.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: SOF: Intel: hda: corrige el deref nulo en la entrada de suspensi\u00f3n del sistema Cuando el sistema entra en suspensi\u00f3n con una secuencia activa, el n\u00facleo de SOF llama a hw_params_upon_resume(). En las plataformas Intel con HDA DMA utilizado para administrar el enlace DMA, esto conduce a la cadena de llamadas de hda_dsp_set_hw_params_upon_resume() -> hda_dsp_dais_suspend() -> hda_dai_suspend() -> hda_ipc4_post_trigger() Se detecta un error en hda_dai_suspend() como hda_link_dma_cleanup() ejecutar primero, lo que borra hext_stream->link_substream, y luego se llama a hda_ipc4_post_trigger() con un puntero NULL snd_pcm_substream."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.6.41",
"matchCriteriaId": "27E794A4-18EA-4EBB-9EC1-DCA36044ECB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8246bbf818ed7b8d5afc92b951e6d562b45c2450",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9065693dcc13f287b9e4991f43aee70cf5538fdd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/993af0f2d9f24e3c18a445ae22b34190d1fcad61",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41038",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T15:15:12.320",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T17:54:28.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: cs_dsp: evita la saturaci\u00f3n de b\u00fafer al procesar encabezados de alg V2. Verifique que todos los campos de un encabezado de algoritmo V2 encajen en el b\u00fafer de datos del firmware disponible. El formato wmfw V2 introdujo cadenas de longitud variable en el encabezado del bloque del algoritmo. Esto significa que la longitud total del encabezado es variable y la posici\u00f3n de la mayor\u00eda de los campos var\u00eda seg\u00fan la longitud de los campos de cadena. Se debe verificar cada campo para garantizar que no desborde el b\u00fafer de datos del firmware. Como se trata de un parche de correcci\u00f3n de errores, las correcciones evitan realizar cambios significativos en el c\u00f3digo existente. Esto hace que sea m\u00e1s f\u00e1cil de revisar y menos probable que se introduzcan nuevos errores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.100",
"matchCriteriaId": "100CDF74-4DB5-4FC6-A54B-BDBDB0C27137"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.41",
"matchCriteriaId": "96AC42B8-D66D-4AC5-B466-E9BA7910FA29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41087",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T16:15:04.120",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T18:00:03.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,159 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: libata-core: corrige double free en caso de error Si, por ejemplo, la llamada ata_port_alloc() en ata_host_alloc() falla, saltaremos a la etiqueta err_out, que llamar\u00e1 a devres_release_group() . devres_release_group() activar\u00e1 una llamada a ata_host_release(). ata_host_release() llama a kfree(host), por lo que ejecutar kfree(host) en ata_host_alloc() provocar\u00e1 un doble error de kernel free: en mm/slub.c:553. Ups: c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI CPU: 11 PID: 599 Comm: (udev-worker) No contaminado 6.10.0-rc5 #47 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 01/04/2014 RIP: 0010:kfree+0x2cf/0x2f0 C\u00f3digo: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da RSP : 0018:ffffc90000f377f0 EFLAGS: 00010246 RAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320 RDX: 000000000000400b RSI: ffffffffc02c 9de5 RDI: ffff888112b1f2c0 RBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000 R10: ffffc90000f37610 R11: 617461203a736b6e : ffffea00044ac780 R13: ffff888100046400 R14: ffffffffc02c9de5 R15 : 0000000000000006 FS: 00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050 033 CR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? __die_body.cold+0x19/0x27 ? die+0x2e/0x50 ? do_trap+0xca/0x110 ? do_error_trap+0x6a/0x90? kfree+0x2cf/0x2f0 ? exc_invalid_op+0x50/0x70? kfree+0x2cf/0x2f0 ? asm_exc_invalid_op+0x1a/0x20? ata_host_alloc+0xf5/0x120 [libata]? ata_host_alloc+0xf5/0x120 [libata]? kfree+0x2cf/0x2f0 ata_host_alloc+0xf5/0x120 [libata] ata_host_alloc_pinfo+0x14/0xa0 [libata] ahci_init_one+0x6c9/0xd20 [ahci] Aseg\u00farese de que no llamaremos a kfree(host) dos veces, realizando kfree() solo si La llamada a devres_open_group() fall\u00f3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.17",
"versionEndExcluding": "4.19.317",
"matchCriteriaId": "356EA924-A840-4360-ADBF-A5405D9C9BBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.97",
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.37",
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.8",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/010de9acbea58fbcbda08e3793d6262086a493fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/062e256516d7db5e7dcdef117f52025cd5c456e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/290073b2b557e4dc21ee74a1e403d9ae79e393a2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/56f1c7e290cd6c69c948fcd2e2a49e6a637ec38f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5dde5f8b790274723640d29a07c5a97d57d62047",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/702c1edbafb2e6f9d20f6d391273b5be09d366a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8106da4d88bbaed809e023cc8014b766223d6e76",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab9e0c529eb7cafebdd31fe1644524e80a48b05d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41089",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T16:15:04.300",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T17:50:48.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,158 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau/dispnv04: corrige la desreferencia del puntero nulo en nv17_tv_get_hd_modes En nv17_tv_get_hd_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducir\u00e1 a una posible desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Lo mismo se aplica a drm_cvt_mode(). Agregue una marca para evitar la desreferencia del puntero nulo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.317",
"matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.97",
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.37",
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.8",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1c9f2e60150b4f13789064370e37f39e6e060f50",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/30cbf6ffafbbdd8a6e4e5f0a2e9a9827ee83f3ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/56fc4d3b0bdef691831cd95715a7ca3ebea98b2d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5eecb49a6c268dc229005bf6e8167d4001dc09a0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6d411c8ccc0137a612e0044489030a194ff5c843",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6e49a157d541e7e97b815a56f4bdfcbc89844a59",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7ece609b0ce7a7ea8acdf512a77d1fee26621637",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ffabad4aa91e33ced3c6ae793fb37771b3e9cb51",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41092",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T16:15:04.383",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T17:51:11.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915/gt: corrige un posible UAF mediante la revocaci\u00f3n de los registros de valla. CI ha estado informando espor\u00e1dicamente el siguiente problema provocado por igt@i915_selftest@live@hangcheck en ADL-P y m\u00e1quinas similares. : <6> [414.049203] I915: ejecutando Intel_hangcheck_live_SelfTests/IGT_RESET_EVICT_FENCE ... <6> [414.068804] I915 0000: 00: 02.0: [DRM] GT0: GUC: CUBLICIDAD : [drm] GT0: GUC: SLPC habilitado <3> [414.070354] No se puede fijar la cerca con mosaicos en Y; err:-4 <3> [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active)) ... <4>[ 609.603992] ------------[ cortar aqu\u00ed ]- ----------- <2>[ 609.603995] \u00a1ERROR del kernel en drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301! <4>[ 609.604003] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI <4>[ 609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Contaminado: GUW 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1 <4 >[ 609.604008] Nombre del hardware: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 20/01/2023 <4>[ 609.604010] Cola de trabajo: i915 __i915_gem_free_work [i915] <4 >[ 609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915] ... <4>[ 609.604271] Seguimiento de llamadas: <4>[ 609.604273] ... <4>[ 609.604716] ct+0x2e9/ 0x550 [i915] <4>[ 609.604852] __i915_vma_unbind+0x7c/0x160 [i915] <4>[ 609.604977] force_unbind+0x24/0xa0 [i915] <4>[ 609.605098] x2f/0xa0 [i915] <4>[ 609.605210] __i915_gem_object_pages_fini+0x51/0x2f0 [i915] <4>[ 609.605330] __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915] <4>[ 609.605440 process_scheduled_works+0x351/0x690... En el pasado, hubo fallas similares informado por CI de otras pruebas de IGT, observado en otras plataformas. Antes de confirmar 63baf4f3d587 (\"drm/i915/gt: solo espere la actividad de la GPU antes de desvincular una valla GGTT\"), i915_vma_revoke_fence() estaba esperando la inactividad de vma->active a trav\u00e9s de fence_update(). Ese compromiso introdujo vma->fence->active para que fence_update() pudiera esperar selectivamente en ese en lugar de vma->active, ya que solo se necesitaba la inactividad de los registros de cerca. Pero luego, otra confirmaci\u00f3n 0d86ee35097a (\"drm/i915/gt: Hacer que la revocaci\u00f3n de la valla sea inequ\u00edvoca\") reemplaz\u00f3 la llamada a fence_update() en i915_vma_revoke_fence() con solo fence_write(), y tambi\u00e9n agreg\u00f3 que GEM_BUG_ON(!i915_active_is_idle(&fence->active )) Al frente. No se proporcion\u00f3 ninguna justificaci\u00f3n sobre por qu\u00e9 podr\u00edamos esperar que vma->fence->active est\u00e9 inactivo sin esperarlo primero. El problema puede deberse potencialmente a una carrera entre la revocaci\u00f3n de registros de valla por un lado y la ejecuci\u00f3n secuencial de devoluciones de llamadas de se\u00f1ales invocadas al completar una solicitud que las estaba usando por el otro, a\u00fan procesadas en paralelo a la revocaci\u00f3n de esos registros de valla. Solucionelo esperando a que vma->fence->active est\u00e9 inactivo en i915_vma_revoke_fence(). (cereza escogida del compromiso 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "9C4870DD-D890-4898-91A0-A77991EB51FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.97",
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.37",
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.8",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/06dec31a0a5112a91f49085e8a8fa1a82296d5c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/29c0fdf49078ab161570d3d1c6e13d66f182717d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/414f4a31f7a811008fd9a33b06216b060bad18fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/996c3412a06578e9d779a16b9e79ace18125ab50",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f771b91f21c46ad1217328d05e72a2c7e3add535",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41093",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T16:15:04.463",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T17:40:31.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,116 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: evite usar el objeto nulo del framebuffer. En lugar de usar state->fb->obj[0] directamente, obtenga el objeto del framebuffer llamando a drm_gem_fb_get_obj() y devuelva el c\u00f3digo de error. cuando el objeto es nulo para evitar el uso de un objeto nulo de framebuffer."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "DD1E49C8-DE20-4CCB-8715-3FB3FA95ABC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.97",
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.37",
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.8",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/330c8c1453848c04d335bad81371a66710210800",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6ce0544cabaa608018d5922ab404dc656a9d8447",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bcfa48ff785bd121316592b131ff6531e3e696bb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41095",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T16:15:04.613",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T17:40:57.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,158 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau/dispnv04: corrige la desreferencia del puntero null en nv17_tv_get_ld_modes En nv17_tv_get_ld_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducir\u00e1 a una posible desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Agregue una marca para evitar npd."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.317",
"matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.97",
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.37",
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.8",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0d17604f2e44b3df21e218fe8fb3b836d41bac49",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/259549b2ccf795b7f91f7b5aba47286addcfa389",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/66edf3fb331b6c55439b10f9862987b0916b3726",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9289cd3450d1da3e271ef4b054d4d2932c41243e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bdda5072494f2a7215d94fc4124ad1949a218714",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb751e48bbcffd292090f7882b23b215111b3d72",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dbd75f32252508ed6c46c3288a282c301a57ceeb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f95ed0f54b3d3faecae1140ddab854f904a6e7c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41096",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T16:15:04.683",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T17:26:54.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI/MSI: corrige UAF en msi_capability_init KFENCE informa el siguiente UAF: ERROR: KFENCE: lectura de uso despu\u00e9s de liberaci\u00f3n en __pci_enable_msi_range+0x2c0/0x488 Lectura de uso despu\u00e9s de liberaci\u00f3n en 0x0000000024629571 (en kfence-#12): __pci_enable_msi_range+0x2c0/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 kfence-#12: 0x0000000008614900-0x00000000e06c22 8d, tama\u00f1o=104, cach\u00e9=kmalloc-128 asignado por la tarea 81 en la CPU 7 en 10.808142 s: __kmem_cache_alloc_node+0x1f0/0x2bc kmalloc_trace+0x44/0x138 msi_alloc_desc+0x3c/0x9c msi_domain_insert_msi_desc+0x30/0x78 msi_setup_msi_desc+0x13c/0x184 __pci_enable_msi_range+0 x258/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 liberado por la tarea 81 en la CPU 7 en 10.811436s: msi_domain_free_descs+0xd4/0x10c msi_domain_free_locked.part.0+0xc0/0x1d8 msi_domain_alloc_irqs_all_locked+0xb4/0xbc pci_msi_setup_msi_irqs+0x30/0x4c __pci_enable_msi_range+ 0x2a8/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 Asignaci\u00f3n de descriptores realizada en: __pci_enable_msi_range msi_capability_init msi_setup_msi_desc msi_insert_msi_desc msi_domain_insert_msi_desc msi_alloc_desc ... Liberado en caso de fallo en __msi_domain_alloc_locked() __pci_enable_msi_range msi_capability_init pci_msi_setup_msi_irqs msi_domain_alloc_irqs_all_locked msi_domain_alloc_locked __msi_ domain_alloc_locked => falla msi_domain_free_locked... Ese error se propaga nuevamente a pci_msi_setup_msi_irqs() en msi_capability_init() que accede al descriptor para desenmascarar en la salida de error camino. Sor\u00e9guelo copiando el descriptor y usando la copia para la operaci\u00f3n de desenmascarar la ruta de salida del error. [tglx: registro de cambios masajeado]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "6.6.37",
"matchCriteriaId": "4A068371-F559-419E-A5D4-13A6DB320A21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.8",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/45fc8d20e0768ab0a0ad054081d0f68aa3c83976",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9eee5330656bf92f51cb1f09b2dc9f8cf975b3d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff1121d2214b794dc1772081f27bdd90721a84bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41098",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T16:15:04.837",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T17:27:55.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: libata-core: corrige la desreferencia del puntero nulo en caso de error Si la llamada ata_port_alloc() en ata_host_alloc() falla, se llamar\u00e1 ata_host_release(). Sin embargo, el c\u00f3digo en ata_host_release() intenta liberar incondicionalmente a los miembros de la estructura ata_port, lo que puede provocar lo siguiente: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: 0000000000003990 PGD 0 P4D 0 Ups: Ups: 0000 [#1] PREEMPT SMP NOPTI CPU: 10 PID: 594 Comunicaciones: (udev-worker) No contaminado 6.10.0-rc5 #44 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 01/04/2014 RIP : 0010:ata_host_release.cold+0x2f/0x6e [libata] C\u00f3digo: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41 RSP: 0018:ffffc90000ebb968 00010246 RAX : 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0 RBP: ffff888 10fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68 R10: ffffc90000ebb738 R11: 73692033203a746e R12: 000000000000004 R13: 00000000 R14: 0000000000000011 R15: 0000000000000006 FS: 00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000003990 CR3: 00000001122a200 0 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? __die_body.cold+0x19/0x27 ? page_fault_oops+0x15a/0x2f0? exc_page_fault+0x7e/0x180? asm_exc_page_fault+0x26/0x30? ata_host_release.cold+0x2f/0x6e [libata]? ata_host_release.cold+0x2f/0x6e [libata] release_nodes+0x35/0xb0 devres_release_group+0x113/0x140 ata_host_alloc+0xed/0x120 [libata] ata_host_alloc_pinfo+0x14/0xa0 [libata] ahci_init_one+0x6c9/0xd20 ] No acceder a los miembros de la estructura ata_port incondicionalmente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.24",
"versionEndExcluding": "6.6.37",
"matchCriteriaId": "B38E97BD-3569-40F2-98AE-209C0145BB0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.8",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/119c97ace2a9ffcf4dc09a23bb057d6c281aff28",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5d92c7c566dc76d96e0e19e481d926bbe6631c1e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8a8ff7e3b736a70d7b7c8764cbcd2724d4079ec8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-41238",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T16:15:09.123",
"lastModified": "2024-08-08T17:35:05.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in /smsa/student_login.php in Kashipara Responsive School Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"username\" parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Student.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-41239",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T19:15:48.093",
"lastModified": "2024-08-08T13:04:18.753",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T16:15:09.190",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/smsa/add_class_submit.php\" in Kashipara Responsive School Management System v1.0, which allows remote attackers to execute arbitrary code via \"class_name\" parameter field."
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/smsa/add_class_submit.php\" in Responsive School Management System v3.2.0, which allows remote attackers to execute arbitrary code via \"class_name\" parameter field."
},
{
"lang": "es",

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-42365",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T17:15:19.340",
"lastModified": "2024-08-08T17:15:19.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1220"
},
{
"lang": "en",
"value": "CWE-267"
}
]
}
],
"references": [
{
"url": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-42366",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-08T17:15:19.590",
"lastModified": "2024-08-08T17:15:19.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VRCX is an assistant/companion application for VRChat. In versions prior to 2024.03.23, a CefSharp browser with over-permission and cross-site scripting via overlay notification can be combined to result in remote command execution. These vulnerabilities are patched in VRCX 2023.12.24. In addition to the patch, VRCX maintainers worked with the VRC team and blocked the older version of VRCX on the VRC's API side. Users who use the older version of VRCX must update their installation to continue using VRCX."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/vrcx-team/VRCX/commit/cd2387aa3289f936ce60049121c24b0765bd4180",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vrcx-team/VRCX/security/advisories/GHSA-j98g-mgjm-wqph",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:52.007",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:10:07.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF7A73B7-CA75-4CF3-AE1D-54B35F99D710"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.268793",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.268793",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.358386",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:52.283",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:05:04.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sqli.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.268794",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.268794",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.358439",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T22:15:10.657",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:24:21.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:music_class_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E22143E2-3FBE-4804-A32C-B77D0BAC53B0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jadu101/CVE/blob/main/SourceCodester-Musical-Class-Enrollment-System-SQLi.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.268795",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.268795",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.358566",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-18T01:15:20.333",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:20:42.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Laster-dev/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.268825",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.268825",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.358628",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6110",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-18T12:15:13.290",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:12:55.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:magbanua_beach_resort_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6CB7216D-7848-48BA-9A2D-BFC765A0ED26"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Laster-dev/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.268856",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.268856",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.358592",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6652",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-10T23:15:15.250",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T16:43:37.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gym_management_system_project:gym_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53D108B3-1095-42CE-89BC-32C4805EC803"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/littletree7/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.271059",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.271059",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.372193",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-7121",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-08T17:15:19.820",
"lastModified": "2024-08-08T17:15:19.820",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-7123",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-08T17:15:19.970",
"lastModified": "2024-08-08T17:15:19.970",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-7394",
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"published": "2024-08-08T17:15:20.023",
"lastModified": "2024-08-08T17:15:20.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Concrete CMS versions 9 through 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in getAttributeSetName(). \u00a0A rogue administrator could inject malicious code. The Concrete CMS team gave this a CVSS v3.1 rank of 2 with vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \u00a0and a CVSS v4.0 rank of 1.8 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N . Thanks, m3dium for reporting."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 1.8,
"baseSeverity": "LOW"
}
}
]
},
"weaknesses": [
{
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/933-release-notes?pk_vid=e367a434ef4830491723055753d52041",
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
},
{
"url": "https://documentation.concretecms.org/developers/introduction/version-history/8518-release-notes?pk_vid=e367a434ef4830491723055758d52041",
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
},
{
"url": "https://github.com/concretecms/concretecms/commit/c08d9671cec4e7afdabb547339c4bc0bed8eab06",
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
},
{
"url": "https://github.com/concretecms/concretecms/pull/12166",
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7477",
"sourceIdentifier": "securityalerts@avaya.com",
"published": "2024-08-08T16:15:09.363",
"lastModified": "2024-08-08T16:15:09.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\u00a0Avaya Aura System Manager\u00a0database.\u00a0\n\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "securityalerts@avaya.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "securityalerts@avaya.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://download.avaya.com/css/public/documents/101091159",
"source": "securityalerts@avaya.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7480",
"sourceIdentifier": "securityalerts@avaya.com",
"published": "2024-08-08T16:15:09.567",
"lastModified": "2024-08-08T16:15:09.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An\u00a0Improper access control vulnerability was found in Avaya Aura System Manager which could allow a command-line interface (CLI) user with administrative privileges to read arbitrary files on the system.\u00a0Affected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "securityalerts@avaya.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "securityalerts@avaya.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://download.avaya.com/css/public/documents/101091159",
"source": "securityalerts@avaya.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7490",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-08-08T15:15:19.057",
"lastModified": "2024-08-08T15:15:19.057",
"lastModified": "2024-08-08T17:15:20.163",
"vulnStatus": "Received",
"cveTags": [
{
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow.\n This vulnerability is associated with program files tinydhcpserver.C and program routines lwip_dhcp_find_option.\n\nThis issue affects Advanced Software Framework: through 3.52.0.2574."
"value": "Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow.\n This vulnerability is associated with program files tinydhcpserver.C and program routines lwip_dhcp_find_option.\n\nThis issue affects Advanced Software Framework: through 3.52.0.2574.\n\n\nASF is no longer being supported. Apply provided workaround or migrate to an actively maintained framework."
}
],
"metrics": {

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-7522",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.237",
"lastModified": "2024-08-06T23:15:59.960",
"lastModified": "2024-08-08T16:35:14.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14."
},
{
"lang": "es",
"value": "El c\u00f3digo del editor no pudo verificar el valor de un atributo. Esto podr\u00eda haber dado lugar a una lectura fuera de los l\u00edmites. Esta vulnerabilidad afecta a Firefox &lt; 129, Firefox ESR &lt; 115.14, Firefox ESR &lt; 128.1, Thunderbird &lt; 128.1 y Thunderbird &lt; 115.14."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906727",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-08T16:00:18.459792+00:00
2024-08-08T18:00:17.302181+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-08T15:55:51.160000+00:00
2024-08-08T18:00:03.977000+00:00
```
### Last Data Feed Release
@ -33,50 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
259359
259371
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `12`
- [CVE-2024-41942](CVE-2024/CVE-2024-419xx/CVE-2024-41942.json) (`2024-08-08T15:15:17.527`)
- [CVE-2024-42354](CVE-2024/CVE-2024-423xx/CVE-2024-42354.json) (`2024-08-08T15:15:17.793`)
- [CVE-2024-42355](CVE-2024/CVE-2024-423xx/CVE-2024-42355.json) (`2024-08-08T15:15:18.013`)
- [CVE-2024-42356](CVE-2024/CVE-2024-423xx/CVE-2024-42356.json) (`2024-08-08T15:15:18.247`)
- [CVE-2024-42357](CVE-2024/CVE-2024-423xx/CVE-2024-42357.json) (`2024-08-08T15:15:18.460`)
- [CVE-2024-7490](CVE-2024/CVE-2024-74xx/CVE-2024-7490.json) (`2024-08-08T15:15:19.057`)
- [CVE-2024-0101](CVE-2024/CVE-2024-01xx/CVE-2024-0101.json) (`2024-08-08T17:15:17.560`)
- [CVE-2024-0102](CVE-2024/CVE-2024-01xx/CVE-2024-0102.json) (`2024-08-08T17:15:18.013`)
- [CVE-2024-0107](CVE-2024/CVE-2024-01xx/CVE-2024-0107.json) (`2024-08-08T17:15:18.240`)
- [CVE-2024-0108](CVE-2024/CVE-2024-01xx/CVE-2024-0108.json) (`2024-08-08T17:15:18.473`)
- [CVE-2024-41238](CVE-2024/CVE-2024-412xx/CVE-2024-41238.json) (`2024-08-08T16:15:09.123`)
- [CVE-2024-42365](CVE-2024/CVE-2024-423xx/CVE-2024-42365.json) (`2024-08-08T17:15:19.340`)
- [CVE-2024-42366](CVE-2024/CVE-2024-423xx/CVE-2024-42366.json) (`2024-08-08T17:15:19.590`)
- [CVE-2024-7121](CVE-2024/CVE-2024-71xx/CVE-2024-7121.json) (`2024-08-08T17:15:19.820`)
- [CVE-2024-7123](CVE-2024/CVE-2024-71xx/CVE-2024-7123.json) (`2024-08-08T17:15:19.970`)
- [CVE-2024-7394](CVE-2024/CVE-2024-73xx/CVE-2024-7394.json) (`2024-08-08T17:15:20.023`)
- [CVE-2024-7477](CVE-2024/CVE-2024-74xx/CVE-2024-7477.json) (`2024-08-08T16:15:09.363`)
- [CVE-2024-7480](CVE-2024/CVE-2024-74xx/CVE-2024-7480.json) (`2024-08-08T16:15:09.567`)
### CVEs modified in the last Commit
Recently modified CVEs: `99`
Recently modified CVEs: `33`
- [CVE-2024-42233](CVE-2024/CVE-2024-422xx/CVE-2024-42233.json) (`2024-08-08T14:56:18.620`)
- [CVE-2024-42234](CVE-2024/CVE-2024-422xx/CVE-2024-42234.json) (`2024-08-08T14:55:29.913`)
- [CVE-2024-42235](CVE-2024/CVE-2024-422xx/CVE-2024-42235.json) (`2024-08-08T14:55:16.533`)
- [CVE-2024-42236](CVE-2024/CVE-2024-422xx/CVE-2024-42236.json) (`2024-08-08T14:54:34.470`)
- [CVE-2024-42237](CVE-2024/CVE-2024-422xx/CVE-2024-42237.json) (`2024-08-08T14:54:24.207`)
- [CVE-2024-42238](CVE-2024/CVE-2024-422xx/CVE-2024-42238.json) (`2024-08-08T14:54:45.470`)
- [CVE-2024-42239](CVE-2024/CVE-2024-422xx/CVE-2024-42239.json) (`2024-08-08T14:54:08.330`)
- [CVE-2024-42240](CVE-2024/CVE-2024-422xx/CVE-2024-42240.json) (`2024-08-08T14:53:59.897`)
- [CVE-2024-42241](CVE-2024/CVE-2024-422xx/CVE-2024-42241.json) (`2024-08-08T14:53:50.763`)
- [CVE-2024-42242](CVE-2024/CVE-2024-422xx/CVE-2024-42242.json) (`2024-08-08T14:53:42.797`)
- [CVE-2024-42243](CVE-2024/CVE-2024-422xx/CVE-2024-42243.json) (`2024-08-08T14:53:35.073`)
- [CVE-2024-42244](CVE-2024/CVE-2024-422xx/CVE-2024-42244.json) (`2024-08-08T14:53:27.147`)
- [CVE-2024-42245](CVE-2024/CVE-2024-422xx/CVE-2024-42245.json) (`2024-08-08T14:53:19.530`)
- [CVE-2024-42246](CVE-2024/CVE-2024-422xx/CVE-2024-42246.json) (`2024-08-08T14:52:35.353`)
- [CVE-2024-42247](CVE-2024/CVE-2024-422xx/CVE-2024-42247.json) (`2024-08-08T14:52:25.213`)
- [CVE-2024-42395](CVE-2024/CVE-2024-423xx/CVE-2024-42395.json) (`2024-08-08T15:35:20.467`)
- [CVE-2024-4965](CVE-2024/CVE-2024-49xx/CVE-2024-4965.json) (`2024-08-08T15:15:18.730`)
- [CVE-2024-6206](CVE-2024/CVE-2024-62xx/CVE-2024-6206.json) (`2024-08-08T14:35:13.290`)
- [CVE-2024-6481](CVE-2024/CVE-2024-64xx/CVE-2024-6481.json) (`2024-08-08T14:35:14.190`)
- [CVE-2024-6706](CVE-2024/CVE-2024-67xx/CVE-2024-6706.json) (`2024-08-08T14:35:14.497`)
- [CVE-2024-6707](CVE-2024/CVE-2024-67xx/CVE-2024-6707.json) (`2024-08-08T14:35:14.743`)
- [CVE-2024-6890](CVE-2024/CVE-2024-68xx/CVE-2024-6890.json) (`2024-08-08T14:35:15.090`)
- [CVE-2024-6891](CVE-2024/CVE-2024-68xx/CVE-2024-6891.json) (`2024-08-08T14:35:15.340`)
- [CVE-2024-6893](CVE-2024/CVE-2024-68xx/CVE-2024-6893.json) (`2024-08-08T14:35:15.587`)
- [CVE-2024-7265](CVE-2024/CVE-2024-72xx/CVE-2024-7265.json) (`2024-08-08T15:15:18.970`)
- [CVE-2024-3180](CVE-2024/CVE-2024-31xx/CVE-2024-3180.json) (`2024-08-08T17:15:19.223`)
- [CVE-2024-34230](CVE-2024/CVE-2024-342xx/CVE-2024-34230.json) (`2024-08-08T16:35:11.040`)
- [CVE-2024-37315](CVE-2024/CVE-2024-373xx/CVE-2024-37315.json) (`2024-08-08T16:35:23.750`)
- [CVE-2024-37884](CVE-2024/CVE-2024-378xx/CVE-2024-37884.json) (`2024-08-08T16:39:59.217`)
- [CVE-2024-37887](CVE-2024/CVE-2024-378xx/CVE-2024-37887.json) (`2024-08-08T16:33:31.063`)
- [CVE-2024-38301](CVE-2024/CVE-2024-383xx/CVE-2024-38301.json) (`2024-08-08T17:01:45.347`)
- [CVE-2024-40898](CVE-2024/CVE-2024-408xx/CVE-2024-40898.json) (`2024-08-08T16:02:40.887`)
- [CVE-2024-41037](CVE-2024/CVE-2024-410xx/CVE-2024-41037.json) (`2024-08-08T17:53:57.487`)
- [CVE-2024-41038](CVE-2024/CVE-2024-410xx/CVE-2024-41038.json) (`2024-08-08T17:54:28.177`)
- [CVE-2024-41087](CVE-2024/CVE-2024-410xx/CVE-2024-41087.json) (`2024-08-08T18:00:03.977`)
- [CVE-2024-41089](CVE-2024/CVE-2024-410xx/CVE-2024-41089.json) (`2024-08-08T17:50:48.727`)
- [CVE-2024-41092](CVE-2024/CVE-2024-410xx/CVE-2024-41092.json) (`2024-08-08T17:51:11.700`)
- [CVE-2024-41093](CVE-2024/CVE-2024-410xx/CVE-2024-41093.json) (`2024-08-08T17:40:31.917`)
- [CVE-2024-41095](CVE-2024/CVE-2024-410xx/CVE-2024-41095.json) (`2024-08-08T17:40:57.760`)
- [CVE-2024-41096](CVE-2024/CVE-2024-410xx/CVE-2024-41096.json) (`2024-08-08T17:26:54.243`)
- [CVE-2024-41098](CVE-2024/CVE-2024-410xx/CVE-2024-41098.json) (`2024-08-08T17:27:55.600`)
- [CVE-2024-41239](CVE-2024/CVE-2024-412xx/CVE-2024-41239.json) (`2024-08-08T16:15:09.190`)
- [CVE-2024-6065](CVE-2024/CVE-2024-60xx/CVE-2024-6065.json) (`2024-08-08T16:10:07.147`)
- [CVE-2024-6066](CVE-2024/CVE-2024-60xx/CVE-2024-6066.json) (`2024-08-08T16:05:04.247`)
- [CVE-2024-6067](CVE-2024/CVE-2024-60xx/CVE-2024-6067.json) (`2024-08-08T16:24:21.720`)
- [CVE-2024-6084](CVE-2024/CVE-2024-60xx/CVE-2024-6084.json) (`2024-08-08T16:20:42.537`)
- [CVE-2024-6110](CVE-2024/CVE-2024-61xx/CVE-2024-6110.json) (`2024-08-08T16:12:55.633`)
- [CVE-2024-6652](CVE-2024/CVE-2024-66xx/CVE-2024-6652.json) (`2024-08-08T16:43:37.053`)
- [CVE-2024-7490](CVE-2024/CVE-2024-74xx/CVE-2024-7490.json) (`2024-08-08T17:15:20.163`)
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-08T16:35:14.220`)
## Download and Usage

View File

@ -6345,7 +6345,7 @@ CVE-2002-2020,0,0,c43e8c9455f36070484f9b3430060219675622985597fe4ead375bc67ab75f
CVE-2002-2021,0,0,22e43e2af48e1ab1b08e5ec4baf46250f55a3e046f9a0cee21e45b856ec2d84a,2008-09-05T20:32:07.387000
CVE-2002-2022,0,0,fde5859713c3639523370bcb059cf3100ff87332c3b0fa0672526f305d5e89bc,2008-09-05T20:32:07.540000
CVE-2002-2023,0,0,d08df7fa4f052c6c2635521c9a67c776b7421b631cf5eafd7dbacd951801cdbe,2008-09-05T20:32:07.697000
CVE-2002-2024,0,1,aadd687fac19baf43b88b34733b0ab9e3d9b027926f9db3f9c1929de905b156f,2024-08-08T14:35:00.557000
CVE-2002-2024,0,0,aadd687fac19baf43b88b34733b0ab9e3d9b027926f9db3f9c1929de905b156f,2024-08-08T14:35:00.557000
CVE-2002-2025,0,0,c8d790aa7748c2fc38fdcd5f87e40b9df90bb51cc9eb166ea1d9e7201afc771e,2023-11-07T01:56:07.430000
CVE-2002-2026,0,0,df761725f9aefd2d39b32606d747b504d29e9d259a10e5b7fa3a0c093ddb6c42,2008-09-05T20:32:08.183000
CVE-2002-2027,0,0,4b056c090548d22f54865b7e3f1a59d9d39c59996ae9c842018ab198f5d9dcb1,2008-09-05T20:32:08.323000
@ -110521,7 +110521,7 @@ CVE-2018-0820,0,0,37d589a7f7767da548742f43b26a7c38d523c69858e08b8d59487fdbeb3dfa
CVE-2018-0821,0,0,37dec9a7b0ae2ffd8a131f1a880202d0667df20584fc6dd4d2087710ee9368d0,2019-10-03T00:03:26.223000
CVE-2018-0822,0,0,c66251d7b34352211af4f5a1245ff2487d2b8b80cc2206f069acf1fd0551276c,2019-10-03T00:03:26.223000
CVE-2018-0823,0,0,ac2d84c2f389fa31c4d934d83621a09019f5c8716fb56f16749dd620acccf433,2019-10-03T00:03:26.223000
CVE-2018-0824,0,1,d820697974a95a92220b3c50ba68426731cecbd20100a1a9c5c73ea42658cc59,2024-08-08T14:50:32.110000
CVE-2018-0824,0,0,d820697974a95a92220b3c50ba68426731cecbd20100a1a9c5c73ea42658cc59,2024-08-08T14:50:32.110000
CVE-2018-0825,0,0,19d1e409c71f6bdd74f7307c0ca3ae6349435b385c177c0f107f15ffa26c9de1,2022-05-23T17:29:15.350000
CVE-2018-0826,0,0,0262a58d145e4ac0fc914edffbaef5cbfb5a2eb6406789cd178f229c4198538c,2019-10-03T00:03:26.223000
CVE-2018-0827,0,0,ea8505a0898212d1f009c625f74ba880dc432a66250be2699ee30b8136b4f69f,2019-10-03T00:03:26.223000
@ -187289,7 +187289,7 @@ CVE-2021-47445,0,0,21fc896860fffefafa9aa835465276d609313e1013c80059416f676b461ea
CVE-2021-47446,0,0,3c208b33728fa949084ac2577096bc3db3ea155516d8511259e29c10cf44eec1,2024-05-22T12:46:53.887000
CVE-2021-47447,0,0,7d3e3404bbe938d7cf8428882bca2545505fcf5836de23d533ad6b776039a099,2024-05-22T12:46:53.887000
CVE-2021-47448,0,0,84543ebd7e0959e3d92727cfcb58cc634497b7d0c46172885626db67641195bc,2024-05-22T12:46:53.887000
CVE-2021-47449,0,1,9b6e22d1737352b54ef63c271e27f44f899978519026cb2f331d0431c52ca925,2024-08-08T15:35:01.740000
CVE-2021-47449,0,0,9b6e22d1737352b54ef63c271e27f44f899978519026cb2f331d0431c52ca925,2024-08-08T15:35:01.740000
CVE-2021-47450,0,0,e7487069497e55beeb1cdab85e0945911f094cb4e8e05214f68bab9fa64ec639,2024-05-22T12:46:53.887000
CVE-2021-47451,0,0,abd0feafb8f299e1b7b139009f40730b8058f13775455cb4ca5c07a53e5fca93,2024-05-22T12:46:53.887000
CVE-2021-47452,0,0,e2121f6d240f1ef11cb0d844440a6e3e4146b77dac993a2eccd06e90cf498e50,2024-05-22T12:46:53.887000
@ -212126,7 +212126,7 @@ CVE-2022-48659,0,0,739b868a474a4ffd0d46243cb98b66c6dfd7ee413018b4f326afd972c1be9
CVE-2022-4866,0,0,199e44d50116095b956b964a4c6fd43b01b5552a04fb1a09a2a7d98fc1c49607,2023-01-06T21:24:01.587000
CVE-2022-48660,0,0,8d46c959e786b8b58955f0ff93ba1d3c08d6316eb1842ed4f09b2150e1c368bf,2024-04-30T15:06:08.540000
CVE-2022-48661,0,0,3c1a91a4878fc0dffd0274a57d5ef2e983527ee481ceb34709f9a63b3494b859,2024-04-30T15:05:37.530000
CVE-2022-48662,0,0,107826e06defd05649e280a189037cc55d251feb868d97da90eaf9a0414354af,2024-04-30T15:03:30.553000
CVE-2022-48662,0,1,4ca2f1a058f4d2db61a4549f15a664d250019454531a3330e1e773232ecca95f,2024-08-08T16:35:01.007000
CVE-2022-48663,0,0,faa35d27b468e0fe98ba3119f078a76fddc46319da6c037dd74eacad5fe5db95,2024-04-29T12:42:03.667000
CVE-2022-48664,0,0,98f5b9aae9394a787d88883dde988c23ff88ed82e2585a6fbf2ab1feed010f18,2024-04-29T12:42:03.667000
CVE-2022-48665,0,0,61f8dd0c53e94318dbff1c099a7764d159a4ff134c1b49d99d2540fba60ac74e,2024-04-29T12:42:03.667000
@ -220547,7 +220547,7 @@ CVE-2023-27632,0,0,7d63548d0abe85e0b0632ab7aaf41f7ead23df0f48603c9db3839cf29d10f
CVE-2023-27633,0,0,667915267380321c38091d3911cbba4db7ed7d4486126c4c2e607eb21aee4206,2023-11-30T19:19:27.577000
CVE-2023-27634,0,0,eaa23db8570d1347105bceb81f013c40b227ebf03b3ad9c57e98eb59567f5f06,2023-06-22T16:20:13.857000
CVE-2023-27635,0,0,a170767a3a9745c536f76deaac4974d5bd153d1fb1267ed8ca68c7bf522f58ac,2023-03-13T16:40:51.640000
CVE-2023-27636,0,1,5b38555da95857791af63fff1a48ebddcd333d7257b9ca08d9069318086716c1,2024-08-08T14:08:34.707000
CVE-2023-27636,0,0,5b38555da95857791af63fff1a48ebddcd333d7257b9ca08d9069318086716c1,2024-08-08T14:08:34.707000
CVE-2023-27637,0,0,09c54c05a6fc0cdafe1a0a5f17e0b09492affbb7af175f018052ffb34b848c42,2023-06-21T15:58:54.023000
CVE-2023-27638,0,0,4a9411179b2442608547cd54016c6025bc41a8d74d58cedfa7327acf1b2b9c0e,2023-06-21T15:58:51.637000
CVE-2023-27639,0,0,3c1eda8a47206555c299dfbebd4c1eb14d2a6a52bbb717933a2ca5930a4f1dc7,2023-06-09T15:48:23.720000
@ -237067,7 +237067,7 @@ CVE-2023-50000,0,0,9f688a9792ad2ce6d0658cbf9071b12e1b4df659935180a67724a25c5cd88
CVE-2023-50001,0,0,b4771677786ecba9bde15a0f76b34acceb49e626365dbda21f278b0628caa15d,2023-12-09T04:45:12.637000
CVE-2023-50002,0,0,4ec906b692f1a9dd432c48a906e1571a789a584d37b771b6956e1b52d20411aa,2023-12-09T04:45:15.093000
CVE-2023-50007,0,0,c2a98c3d87da72b92c324ba3cb08ad35629bf406e9b3c35addda6f10f3816108,2024-07-03T01:42:48.353000
CVE-2023-50008,0,0,f6f91531be169cece903630a442bc5772f38d2e61707ca8ffbb5e96b52d35adc,2024-06-10T18:15:23.660000
CVE-2023-50008,0,1,7f115fb7cf065952761d4f3da06cb7d1d06fdd92c76ae962b98d8b7ee2cdcb0d,2024-08-08T16:35:02.053000
CVE-2023-50009,0,0,170dd9930657e166b905729f0ac42a66a8992249c05ebf1d569c0f4eb6cd99b1,2024-07-03T01:42:49.137000
CVE-2023-5001,0,0,d9ac16974d049c360e3bd40fa3597b22777e9e496c7757647056f596e2b1a7bd,2023-11-07T04:23:17.670000
CVE-2023-50010,0,0,2cb91c5b0cd0b34eab6d9a9d9e423db72c16e763bec8471e43a8ef97d96dc827,2024-07-03T01:42:49.940000
@ -237413,7 +237413,7 @@ CVE-2023-50693,0,0,dd08939e4ce32c03f59f04532580821ca5b697adc34a251e1c45db564373a
CVE-2023-50694,0,0,78b1aa0914931a0876815df8adb1c998b4fa38e7b62d7363c774f0a97cabce80,2024-03-21T02:49:58.640000
CVE-2023-5070,0,0,9fb6a723c8279931601cd42b57dae05abcb788776665c70d867d5b3fe8e04ffe,2023-11-07T04:23:25.600000
CVE-2023-50700,0,0,a170e7fca21b0a66cf96d92c9a79d76d10f0f906521b1974e4809465f286d528,2024-08-01T13:45:26.497000
CVE-2023-50702,0,0,aabbc77a2d305beae7af1d1ea3729a356ffb437e099440502361eda2d189553a,2024-03-27T12:29:30.307000
CVE-2023-50702,0,1,5a9a6e1f931a55dff8e60df6ebb6d3783b09408223c86b861d914b06ab161284,2024-08-08T16:35:03.110000
CVE-2023-50703,0,0,5412fe627eb96f0f79abae297ed08738bff2931ef5956788ab3e3239f68219e5,2023-12-29T16:32:32.477000
CVE-2023-50704,0,0,d49cda3dff4ba1c0ede49172a75175738fe4d5075a250a9b7bfefb732a3e26ef,2023-12-29T16:31:20.133000
CVE-2023-50705,0,0,ad0a3e4412ad9c92740ec4e4e393908819d60949342bffcc602e49dd7390ae76,2023-12-29T16:28:38.393000
@ -239038,7 +239038,7 @@ CVE-2023-52813,0,0,5a497de90c526172c26b5dac57669c5d83bcc91b8398c5bb528989dc5ae64
CVE-2023-52814,0,0,7beb37b73115ec81ce0ec04ef14d3c556e989e0aeced84f5749a8521c2300544,2024-07-03T01:44:01.383000
CVE-2023-52815,0,0,00e28cef1b8ae125ec0e755924b2b62d1b00a745a0d5e9b45c6a2d985c46ff6f,2024-05-24T01:14:29.643000
CVE-2023-52816,0,0,2d9134e11a2e8e924c15c258352c1c9a81d5ec49c658e3031c83980ea09240f2,2024-05-21T16:53:56.550000
CVE-2023-52817,0,1,c91d2047da8bbfe976f327dcdb351220f8bcbbab0add37701f32515ee0413d05,2024-08-08T15:35:04.263000
CVE-2023-52817,0,0,c91d2047da8bbfe976f327dcdb351220f8bcbbab0add37701f32515ee0413d05,2024-08-08T15:35:04.263000
CVE-2023-52818,0,0,7f2852fb5747a8c60c395929c96799e7bca84aa85fa64d70c2a6f8db55b17943,2024-05-21T16:53:56.550000
CVE-2023-52819,0,0,e59c42c5eaf7a76edce756156fead26d956efd3a1ed27e24e182693a4bf1971a,2024-05-21T16:53:56.550000
CVE-2023-5282,0,0,85ba66d123a16998bc65330f022fdaf483cda482ea06414e7b1194275a4fbce6,2024-05-17T02:32:58.013000
@ -239224,7 +239224,7 @@ CVE-2023-5393,0,0,ce078de54b177ac4406f630c3c1fed3ce153dfa6eaf31f252a0377c134b8cd
CVE-2023-5394,0,0,a96d7207f4eb5f9d49798c5e726b517481bba2916f942eb56932f569e6dc4d9e,2024-04-12T12:43:57.400000
CVE-2023-5395,0,0,42220d960331ea232791f8929a2890ca4fa05b271badde81e14439f1a1e3f0dd,2024-04-17T20:08:21.887000
CVE-2023-5396,0,0,007a12e631c053a3e331d0a53b8f249595ed84b8b7b57b06d9e2c90e9e577e11,2024-04-17T20:08:21.887000
CVE-2023-5397,0,0,61d0435957a2fc5389b6bb152f683a8e54d0fd2d11e4dcec1ed16edcd445740b,2024-04-17T20:08:21.887000
CVE-2023-5397,0,1,09540507e05c48e772c47aa2a9d172c4b1ebc1df188d43479285639da81701fa,2024-08-08T16:35:04.180000
CVE-2023-5398,0,0,03dafa4dab8d65556fef227ab72b602748ace9cd1ad664cc261be580c6de3ef7,2024-04-17T20:08:21.887000
CVE-2023-5399,0,0,2077fc3839d7041d58d4243bb44c146fe2a56129890351df55240d8647ef2ac3,2023-10-29T02:33:20.933000
CVE-2023-5400,0,0,248a9a65e9b9caa77a1b34eeb3f0b78767eeb5cf9522e2439f2b3bce2064987c,2024-04-17T20:08:21.887000
@ -240965,7 +240965,11 @@ CVE-2024-0097,0,0,828e0d6edaac74d80e85e7cd248c4487f7d9ed2e02d8d361934a62f860a855
CVE-2024-0098,0,0,069a5c23019341513ba5e45eb7cd80085fa3c5305327bc38e3233b2410f520d3,2024-05-14T16:13:02.773000
CVE-2024-0099,0,0,a353a072382bc9c8f100deeb43f065f1ec38735a442f0652f39ff4a5b9a341a3,2024-06-17T12:43:31.090000
CVE-2024-0100,0,0,f536814b5676db735894c02187696008c7cf1b3d39286954ee01bd7aaee5fdca,2024-05-14T16:13:02.773000
CVE-2024-0101,1,1,1e85eaa0e6f02d7c957fcc14c2e942ff4ea3831be8864e4f7fe5413e400b8f89,2024-08-08T17:15:17.560000
CVE-2024-0102,1,1,79147c4b917305337ce222e03fcf97f5dcd85cd50dd383102a8f7a874fa89713,2024-08-08T17:15:18.013000
CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000
CVE-2024-0107,1,1,b7328357e000247162d1b1ff91c0ee7902dd7ca392f89b8b3405fd20663b27cd,2024-08-08T17:15:18.240000
CVE-2024-0108,1,1,0f9c01a35f626b0080419755561c41419878a521a591f52ce6ac90990b96b475,2024-08-08T17:15:18.473000
CVE-2024-0151,0,0,76f8e609c18c3e1a4007c23b03249fd06e27f5de1d5adec60540b40f497459b7,2024-04-25T08:15:07.420000
CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000
CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000
@ -243918,7 +243922,7 @@ CVE-2024-21816,0,0,3556729912be1fc6b4992629f2fcc218916937e232361f846f9c6dbeb23ef
CVE-2024-21818,0,0,c637d2f2e962f29751d87c76f242879f1ed5232e4fb28fc3b3902f1a9fec3083,2024-05-17T18:36:05.263000
CVE-2024-2182,0,0,e5d057aaf5079db80e1e474120adef9e78f0f137b5dec62cd588e101fd1aaeae,2024-06-20T23:15:51.710000
CVE-2024-21821,0,0,7321c5e03ded4c9a82a76a55d87da948884b86260a5a676716e6227a5659e3c2,2024-07-03T23:15:02.157000
CVE-2024-21823,0,1,ef966f9b1400806029177a0b8af9f0c4d64ad7fa783b89a1b12229e1edcf4217,2024-08-08T15:35:06.513000
CVE-2024-21823,0,0,ef966f9b1400806029177a0b8af9f0c4d64ad7fa783b89a1b12229e1edcf4217,2024-08-08T15:35:06.513000
CVE-2024-21824,0,0,7aa5726f0c5574af74e9f5a3cf3ffd6696b10e95ff2f5e13938ce9966974ff7c,2024-03-18T12:38:25.490000
CVE-2024-21825,0,0,d4fc704324754f387b029d9f0684cd28f1fe50758fd7d66af26180f7c807a125,2024-02-26T18:15:07.390000
CVE-2024-21826,0,0,e4665c6424ea4b61934e3bcd1ab7ddf62869802487f99534f2a3f3dd7a0149b4,2024-03-04T13:58:23.447000
@ -244478,7 +244482,7 @@ CVE-2024-22627,0,0,7de1240a28417cbc53b0ae0bc15d5725aafb2c30be8715fae81f72db699db
CVE-2024-22628,0,0,c48e2ec55f18b02d5d682e8e3830e76341123221faa60f4082cbda6cff78fe53,2024-01-19T14:33:00.143000
CVE-2024-2263,0,0,99c9bacabc6e08e73f0d8c338bf9824b2423a516921892dd6360ed31ad0e3588,2024-04-01T12:49:00.877000
CVE-2024-22632,0,0,a97332f0b173cc610cbf62f4df4cd14dbcbefc795dfe6e338a0059d8c9ab3926,2024-04-26T12:58:17.720000
CVE-2024-22633,0,0,f1b2654014e720ddeab7fea4aa5632c092020c5bde26eb69c784da88500f7007,2024-04-26T12:58:17.720000
CVE-2024-22633,0,1,62bbea01bbc9e791cb93aa09eb03c6d5e054ab6b131ba05c74d3ac37dac5c57e,2024-08-08T16:35:05.543000
CVE-2024-22635,0,0,b93c7bc1d12536d652dcc85ddd79edfb5c7213a29d94f8bd78c761d3d7145598,2024-01-29T15:57:23.770000
CVE-2024-22636,0,0,89d4b44d2ef5b65ebff1ecc48c0ac08f7378ed51f775b08505485e1b9be39e7e,2024-01-29T15:57:32.540000
CVE-2024-22637,0,0,a291343c074c38d5ffa0ead2af145c1d6fcfb9e6210b62bf7edb9b14c027e94a,2024-02-15T15:19:44.187000
@ -245974,7 +245978,7 @@ CVE-2024-25065,0,0,16a7a7b6f026624f93e53a8f22e4552bfc2be0aea00d361d0fcaf4a0f3d59
CVE-2024-2507,0,0,059cda731f595d08cc9a92bc2f36829afe22653a29c81bf0cc15e53c1729da6d,2024-04-10T13:23:38.787000
CVE-2024-25075,0,0,bfed480b2306172449fd442aea4561660fa83ab81e8f534c8111cd2e1f0d7f14,2024-04-03T12:38:04.840000
CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000
CVE-2024-25077,0,1,9936dfb9fa263db917d226ab0cd6f8d094e5b95fa936d5098b62c9aa7f5236ab,2024-08-08T14:35:02.810000
CVE-2024-25077,0,0,9936dfb9fa263db917d226ab0cd6f8d094e5b95fa936d5098b62c9aa7f5236ab,2024-08-08T14:35:02.810000
CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000
CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000
CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000
@ -246199,7 +246203,7 @@ CVE-2024-25434,0,0,26bac245bd5b6380c1089f8063086eb0c8545596793c0265b0d4261729bfc
CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000
CVE-2024-25436,0,0,16fb2e1f886d8db1c20751b88d1af87dc346511e3a7b7468111bb026aa3d1366,2024-03-04T13:58:23.447000
CVE-2024-25438,0,0,7afb128454169133a93c3b51a6bebbe2c69c11640c7e435fab86df0a19809367,2024-03-04T13:58:23.447000
CVE-2024-2544,0,1,ed2d05b42178fff9a17d6f22998085016a1e0e93b19acb35a0624153a8b064cb,2024-08-08T15:27:52.437000
CVE-2024-2544,0,0,ed2d05b42178fff9a17d6f22998085016a1e0e93b19acb35a0624153a8b064cb,2024-08-08T15:27:52.437000
CVE-2024-25442,0,0,eb84b12a8b6870c7b4be7ea073493dd91ec0cf779e81ffeb769d60880071c8d7,2024-02-20T02:15:51.217000
CVE-2024-25443,0,0,f9f46e03349c3c7bab20646f2d76799e4fab073653be96db01bac732191b3058,2024-02-20T02:15:51.313000
CVE-2024-25445,0,0,9513b3e5a2e30e7d6439b2cce4865346623e49c934516a91bc102f1687ad8e58,2024-02-20T02:15:51.397000
@ -247348,7 +247352,7 @@ CVE-2024-26925,0,0,2724913f362a9890cc8fb3dd8cbeebdee08487b2bf7ffa79a3e9b6cbc6100
CVE-2024-26926,0,0,afaf5b7b6b1e2e8422b7d9a5d5e09d6dca5c5bcaea40d04fd581fd0c9bb650ce,2024-06-25T23:15:27.893000
CVE-2024-26927,0,0,4116dbe7df52a1c2d9850cca2fd6397392bdbeda2c2b84e268cf9d86129f791b,2024-07-03T01:50:01.863000
CVE-2024-26928,0,0,8849c5ddf3f8359b34f84019effa9d5d4066ffd02515d38a7a9e159b15bfe7a3,2024-04-29T12:42:03.667000
CVE-2024-26929,0,0,e9a82e089aa3e4881a5478421ee66ca6239f4ec3adb415a1a5c4fe96dd536cc7,2024-05-23T19:07:27.803000
CVE-2024-26929,0,1,0345601d3687dcfc0db8f00b9b8b65897332ed99291c5fbcbfec34873b944ced,2024-08-08T16:35:06.543000
CVE-2024-2693,0,0,5b20da29193cdbd021de554496a550f19c059f255dc84cf7e6153dfe6b8cf895,2024-04-10T13:23:38.787000
CVE-2024-26930,0,0,eebfc5b7d2d8fe5cbe99cdd9da00ebebd63fd431cc6c01a6fd1333054068c5b1,2024-05-23T19:10:49.540000
CVE-2024-26931,0,0,fd1d56ef07a54cc94e651da59890263257da3a79c612811464e959c80e42800d,2024-06-27T13:15:57.053000
@ -247985,7 +247989,7 @@ CVE-2024-27757,0,0,cd3b5b6b7fe57179d531119e33f0f74486d4fc8f97f5ac96ca27aa14ec09c
CVE-2024-27758,0,0,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7b50,2024-08-01T13:48:45.070000
CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000
CVE-2024-27764,0,0,dcb5f4d1c0bf36ea54d48a35b1fb25d36699fcee8f1dae6b9d2e2eb62b497b1c,2024-03-06T15:18:08.093000
CVE-2024-27765,0,0,c1021bc743132e7d195dccaa0bc629b0f9f060b7a3eda2d9633ef14c430a5d52,2024-03-06T15:18:08.093000
CVE-2024-27765,0,1,946f1ae3b42eeddef53163b64360f4980758030270d5c196b145f2c4061e3615,2024-08-08T16:35:07.573000
CVE-2024-27767,0,0,588021191ffc186f7dafcc065bb8b722083fff47f2715dec13cceb116744ce43,2024-03-18T19:40:00.173000
CVE-2024-27768,0,0,2a172611cfb3cb531839add9d871259e9ae7004ba84244aa574347493f81c01e,2024-03-18T19:40:00.173000
CVE-2024-27769,0,0,40c08942e7bc0a364e2e9393c4316622b03ce4f4c87f0140fc357e25906e47fa,2024-03-18T19:40:00.173000
@ -248998,7 +249002,7 @@ CVE-2024-29205,0,0,4e674b8f8da8d044735de177a49e7b209584ddf484ab1ea225bf31caee569
CVE-2024-29206,0,0,e86d328fcc9a6f514df760d2a874996b94023486fc1fbca1ce78fd9823e4431a,2024-07-03T01:52:17.397000
CVE-2024-29207,0,0,cb61fd349829f4c3ea10e2458bf16eaba90c4ab4b0709ae414d9c6319d6d4f1f,2024-07-03T01:52:18.087000
CVE-2024-29208,0,0,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074d9d,2024-07-03T01:52:18.780000
CVE-2024-29209,0,1,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd9a3,2024-08-08T15:35:08.173000
CVE-2024-29209,0,0,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd9a3,2024-08-08T15:35:08.173000
CVE-2024-2921,0,0,f4e342ffc58e19f9931b03228666e88722fb82add7b9c9b268ee78781cd5e71e,2024-04-09T19:15:38.423000
CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000
CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000
@ -250167,7 +250171,7 @@ CVE-2024-3092,0,0,58e4c2f42c32b89d77c71a34b852d576a28801e4a89752dc17e73517fbf960
CVE-2024-30920,0,0,755e5fd72bb1859fa0ef82051ceaafd42ee2d81708d249e6f1a815457a0034d0,2024-07-03T01:54:16.273000
CVE-2024-30921,0,0,8e85a33db60f73a94dcc7d8613386cc444fa7f9176c5206bdd02bb45585e34b2,2024-07-03T01:54:17.057000
CVE-2024-30922,0,0,cf163111ed5d85555cabc446f2f9d97fac6c7f0ed747ee1f78406fef4e9bf3e0,2024-07-03T01:54:17.827000
CVE-2024-30923,0,0,2d2c05cd172127b4074b12e775f766f0140bdee7a598ca3f87a3d39bddaedc61,2024-04-19T13:10:25.637000
CVE-2024-30923,0,1,7a2527b99b92b80199b99b73f6b95e071f710c19fc4c06ba189dbf6ed66c0865,2024-08-08T16:35:08.933000
CVE-2024-30924,0,0,22bd972b2c3f6dbbb8e41f56a66263757ec7eb8e597484f0e2796a2cac4237a4,2024-07-03T01:54:18.593000
CVE-2024-30925,0,0,23f6cfde37cb305753d473ae13036a29f5bb7fcda37b8c8f7b5e05d6955a525c,2024-07-03T01:54:19.410000
CVE-2024-30926,0,0,2e48339c860de6d8b8371963c63d2e47743152d622b217fd2eb9f09dedcce9c7,2024-07-03T01:54:20.187000
@ -250709,7 +250713,7 @@ CVE-2024-3178,0,0,724b5b9b62dd4e92f1f229f9f28fcb0bddf71f92c79c0b94c18fdb2af7074b
CVE-2024-31783,0,0,dea8534fc1b6933b26cda6217a1982520e5d50556b9ff7b4e3fbbb8c80f4a35b,2024-04-16T13:24:07.103000
CVE-2024-31784,0,0,872beb17d1c68d7ed92a4188cf9514602c2aada50c10052ecdc3a0e44dff88ee,2024-08-01T13:51:07.627000
CVE-2024-3179,0,0,464d285bc972fdb5e95f8aa4a77b96bdfaeed1940a229e7762cb456353d6a4b4,2024-04-04T12:48:41.700000
CVE-2024-3180,0,0,a00f1e9c0c961bfe4f5d9bc0c89218e810bdec4720fe175e0a11a11dd8540d68,2024-04-04T12:48:41.700000
CVE-2024-3180,0,1,5bb7af5f4cf3797fd0e13fd61c5a120e857e3a7924c7f2a1b54e6cd1ca4c495c,2024-08-08T17:15:19.223000
CVE-2024-31801,0,0,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b836488bc,2024-07-03T01:55:21.550000
CVE-2024-31802,0,0,dd0b491f4b4a8abc2eb95691f4e0d78bda6718f8c1d907d0d856648428006edd,2024-06-28T10:27:00.920000
CVE-2024-31803,0,0,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f243,2024-08-01T13:51:08.687000
@ -251177,7 +251181,7 @@ CVE-2024-32492,0,0,b8f37fd95afd9f3c0db9b82f19324f4f73a560600fb9ed3392952c1c91bb3
CVE-2024-32493,0,0,ffb6c116d41e9a5c89f19db9ee55928315a8849f99630d88960b7d23ca7c5aa5,2024-07-03T01:56:39.257000
CVE-2024-32498,0,0,906a6af4f331d76dafce3172b342bad5a72acec04065280273f5a351dbe47aff,2024-07-08T16:43:34.677000
CVE-2024-3250,0,0,c5f4cddd48066fbb0c4e0be3eeb988cdfc41e3f2cb53a12d5a0c784e567df5aa,2024-04-04T22:15:09.350000
CVE-2024-32502,0,1,6c01a3b4b5868656f3d57f70bafd56da976a1e8c28c0eec374ff444b607fb7d0,2024-08-08T15:35:08.940000
CVE-2024-32502,0,0,6c01a3b4b5868656f3d57f70bafd56da976a1e8c28c0eec374ff444b607fb7d0,2024-08-08T15:35:08.940000
CVE-2024-32503,0,0,73104beb74be99de375467071c1d6a9a0fcbf9e020ddd8f16d4fe11689fe95cf,2024-06-07T19:24:09.243000
CVE-2024-32504,0,0,3994b5718a6a88903126308cc0ea3df60ba5aeb7ee0f236d9b16b618e0fabb55,2024-07-16T14:59:17.967000
CVE-2024-32505,0,0,a50cedf26eb8bc3e2fc8813f61518049bc267a075d7ee53541957942fde52858,2024-04-17T12:48:07.510000
@ -251557,7 +251561,7 @@ CVE-2024-32895,0,0,3b5e93f479d0a309808bc7ab37e73f0b736af7b90a097c9affa7582da06b5
CVE-2024-32896,0,0,488630bc5a56abb942dcf67bee02da446a8ee3fdd397356e05994c519aa70266,2024-07-03T01:57:14.863000
CVE-2024-32897,0,0,90e26042088ada707b934da98a5303718a15c9664281ad13fb45655a7f047677,2024-07-11T14:28:06.287000
CVE-2024-32898,0,0,a1164d1f13a42749bf96f7e0b3ba86ae7d47aa4b6dca1eac9925e7f63479422a,2024-07-11T14:28:44.707000
CVE-2024-32899,0,1,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6319,2024-08-08T14:35:04.040000
CVE-2024-32899,0,0,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6319,2024-08-08T14:35:04.040000
CVE-2024-3290,0,0,e37941463fbcfeca19f06c6ff95de33721080f43186b5a4e3649d38706662f8a,2024-05-17T18:35:35.070000
CVE-2024-32900,0,0,f3fcf6c6b161054d4b70c688a26df4960499cb9e7985675c1f9e0f52edc8445d,2024-07-11T14:22:34.243000
CVE-2024-32901,0,0,a3552a7ee6d0836f928936581a297ba1f653d939cb18fc905df3f090c2fd1257,2024-07-11T14:23:01.377000
@ -251565,7 +251569,7 @@ CVE-2024-32902,0,0,1fbd0dd08d9bd5e977338d384aea2714e29c13de9c12a031106e742a6a47a
CVE-2024-32903,0,0,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000
CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000
CVE-2024-32905,0,0,4460b80af340c6f668b7232b3aebc59e6f35de40c0e49ba7c976380d5f0f46f5,2024-08-01T13:51:38.530000
CVE-2024-32906,0,1,ca7a041d3e36c163545ea72e6fe5c5fb310b0b59e35ef87f024c52e5493be59e,2024-08-08T14:35:04.950000
CVE-2024-32906,0,0,ca7a041d3e36c163545ea72e6fe5c5fb310b0b59e35ef87f024c52e5493be59e,2024-08-08T14:35:04.950000
CVE-2024-32907,0,0,14dfd1aaa25a46fea5214540e8b9086c0e794eff9e7591e8b296e1769fd633c5,2024-07-11T15:10:44.407000
CVE-2024-32908,0,0,f22243bdf03341c4f49fe8c95d52c9746f5d3123ec78466cf58d8b7d93534350,2024-08-01T13:51:39.347000
CVE-2024-32909,0,0,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000
@ -252190,19 +252194,19 @@ CVE-2024-33957,0,0,09bedb02c8e3dd520e4eb895fb68ee9645dd7844e1b831a24ad6b897c0a3b
CVE-2024-33958,0,0,7a7168ec64302facb7ecafd694509fffebdd99590b2e576ad77919591906e0e2,2024-08-06T16:30:24.547000
CVE-2024-33959,0,0,be6fd7f670b1328bdfc37564b1ac34c10351de104e6269aff09617e3efa74d30,2024-08-06T16:30:24.547000
CVE-2024-33960,0,0,d17745e604717d53f9bd9a9910346900a87259f527ec070325bfb24c71beb81b,2024-08-06T16:30:24.547000
CVE-2024-33961,0,1,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000
CVE-2024-33962,0,1,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000
CVE-2024-33963,0,1,7b2ea757d18c83ff1944815cc2e202a03e9537a07a76c5aeb78e0eabda293f3b,2024-08-08T15:29:09.743000
CVE-2024-33964,0,1,aff21f5744b29292c3707aee86cfd710533d3b56a46a9a36f37cc48f743d5159,2024-08-08T15:29:15.933000
CVE-2024-33965,0,1,ed4fa15cdf01bcb0fd89c5e1854d266245eefe080933b85ee013428b57c127e8,2024-08-08T15:28:25.530000
CVE-2024-33966,0,1,997cc6c63d87be9f515a0dcf9d62401fc2dd34c2f41a0abacfbb628c3d719cd6,2024-08-08T15:28:08.357000
CVE-2024-33967,0,1,d52e78f1049cf149f0cfaf3916dd091a82be5a43af2f535f9c6c47436fc6ab9f,2024-08-08T15:27:50.917000
CVE-2024-33968,0,1,915776392a400d4a5400237f91d8138ecb548a9ee2c3e80cc12564c4b5c60c56,2024-08-08T15:27:34.080000
CVE-2024-33969,0,1,e3e71cf8a0f7a44667eb284306dcd69fe80d8c0fb2202c6d4f70e6f7b7013f4b,2024-08-08T15:27:09.497000
CVE-2024-33970,0,1,862acdadc96a67e3c244b8d3248f39839dd79ae113c84953fd701fed8bc7b855,2024-08-08T15:26:48.940000
CVE-2024-33971,0,1,a7859046d8372a909dcb2b37a15cf3347b7e31d10dadb7980f4c9fb8d7cb93d8,2024-08-08T15:26:31.097000
CVE-2024-33972,0,1,42dee7a80c44684711acc9909b4734c5fb83b699be5ad7e45fa494c43db80c3d,2024-08-08T15:25:18.450000
CVE-2024-33973,0,1,0a583261d2674aa7d4e2f3bbf7680a44773ad150514a793eca996581b9e8bd33,2024-08-08T15:24:35.547000
CVE-2024-33961,0,0,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000
CVE-2024-33962,0,0,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000
CVE-2024-33963,0,0,7b2ea757d18c83ff1944815cc2e202a03e9537a07a76c5aeb78e0eabda293f3b,2024-08-08T15:29:09.743000
CVE-2024-33964,0,0,aff21f5744b29292c3707aee86cfd710533d3b56a46a9a36f37cc48f743d5159,2024-08-08T15:29:15.933000
CVE-2024-33965,0,0,ed4fa15cdf01bcb0fd89c5e1854d266245eefe080933b85ee013428b57c127e8,2024-08-08T15:28:25.530000
CVE-2024-33966,0,0,997cc6c63d87be9f515a0dcf9d62401fc2dd34c2f41a0abacfbb628c3d719cd6,2024-08-08T15:28:08.357000
CVE-2024-33967,0,0,d52e78f1049cf149f0cfaf3916dd091a82be5a43af2f535f9c6c47436fc6ab9f,2024-08-08T15:27:50.917000
CVE-2024-33968,0,0,915776392a400d4a5400237f91d8138ecb548a9ee2c3e80cc12564c4b5c60c56,2024-08-08T15:27:34.080000
CVE-2024-33969,0,0,e3e71cf8a0f7a44667eb284306dcd69fe80d8c0fb2202c6d4f70e6f7b7013f4b,2024-08-08T15:27:09.497000
CVE-2024-33970,0,0,862acdadc96a67e3c244b8d3248f39839dd79ae113c84953fd701fed8bc7b855,2024-08-08T15:26:48.940000
CVE-2024-33971,0,0,a7859046d8372a909dcb2b37a15cf3347b7e31d10dadb7980f4c9fb8d7cb93d8,2024-08-08T15:26:31.097000
CVE-2024-33972,0,0,42dee7a80c44684711acc9909b4734c5fb83b699be5ad7e45fa494c43db80c3d,2024-08-08T15:25:18.450000
CVE-2024-33973,0,0,0a583261d2674aa7d4e2f3bbf7680a44773ad150514a793eca996581b9e8bd33,2024-08-08T15:24:35.547000
CVE-2024-33974,0,0,d280489cb050a80c8bcc0878f3de7456d028053d751ad633a2e500fbf3c9b3f8,2024-08-07T17:44:17.477000
CVE-2024-33975,0,0,b4a2bd340912bc931a374c57fe59d9cb93cb7a454e32e5eaff66f0334316ab39,2024-08-06T16:30:24.547000
CVE-2024-33976,0,0,d8344d47b36c41472e2a93847ff870ae8e0d131ecf2149662397af204779e48f,2024-08-06T16:30:24.547000
@ -252387,7 +252391,7 @@ CVE-2024-34224,0,0,f4b792085c33fe751ba37a69e3ef609b6c4267fa901657944ebf702e373cd
CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000
CVE-2024-34226,0,0,ee0bf03dfbb7276f0e585da87dd55a8f54aaadf529a97ab40343d543468cb68c,2024-05-14T16:12:23.490000
CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000
CVE-2024-34230,0,0,fd5204c1861dff4dda042be017a0c119fb7cd76dbdfed3865e1a91afa4cda6b2,2024-05-14T16:12:23.490000
CVE-2024-34230,0,1,a05a38a79741a72c9d6f5456446d713ef2ea9e7cfac29bb555039d0657084814,2024-08-08T16:35:11.040000
CVE-2024-34231,0,0,bc89f3c9bb61baf29d2d35dc13499882fd5aa1b8a06439e514ae7d635339b6f7,2024-08-01T13:52:18.070000
CVE-2024-3424,0,0,c4f58681c753d20af997e7344afbac06ec6a3371ca686fb7c9b49ad5c93b94a2,2024-05-17T02:39:55.073000
CVE-2024-34240,0,0,0bd91146d8fc729ed5df9e4184632c68ef13b96fc0c02f7c671568de44e3b0a0,2024-05-22T12:46:53.887000
@ -252414,7 +252418,7 @@ CVE-2024-3430,0,0,a941a2bdaed6734132b4bed8d998008948b76c9a3932a595684037246d0032
CVE-2024-34308,0,0,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000
CVE-2024-3431,0,0,5fc2c93ae5310a51e046f84945a2a838f604d6025e1cecd0f4843d0687905336,2024-05-17T02:39:55.597000
CVE-2024-34310,0,0,eec98a80baf7dabcd95632f08b3aaea83d6020ef7be3a232837a6c521a96dc62,2024-05-14T16:12:23.490000
CVE-2024-34312,0,1,0d47c59fdc924186f20f65c25079bdc3a52800889945bbbdd92d5f35b0cde75d,2024-08-08T14:19:10.503000
CVE-2024-34312,0,0,0d47c59fdc924186f20f65c25079bdc3a52800889945bbbdd92d5f35b0cde75d,2024-08-08T14:19:10.503000
CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70a40,2024-07-03T01:59:52.040000
CVE-2024-34314,0,0,229621e4389765698bde4ee87838cb1f181d4467573c64759d3cb34848f22f9d,2024-05-07T20:07:58.737000
CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000
@ -252560,9 +252564,9 @@ CVE-2024-34475,0,0,3c160241762503df55acb87d7d14b9c9456523cbc048b20e9117848219522
CVE-2024-34476,0,0,0e840da90ac72a5275cc1cab81863ba6c9d8f821141193be8bf66abb3acfdeaf,2024-08-01T13:52:23.687000
CVE-2024-34477,0,0,5d1de91fef7cafecd3b029f0bcee8de7cabdae801a9f3bc40e1b3eaf6a48cb39,2024-06-07T14:15:10.293000
CVE-2024-34478,0,0,d1c568df328ac159f8fd1b75d61a9d6d3cc927200b0e76f99fa386488fe6be45,2024-08-07T16:35:07.180000
CVE-2024-34479,0,1,6ed94fc6f4fb4fe38a40f5abea31649df9eb3ec92c6e81e3f39692d9740128a1,2024-08-08T15:10:12.900000
CVE-2024-34479,0,0,6ed94fc6f4fb4fe38a40f5abea31649df9eb3ec92c6e81e3f39692d9740128a1,2024-08-08T15:10:12.900000
CVE-2024-3448,0,0,c82b147a40506a777755d14476bf2e6fcdd10273ee4086f8cdaaaac6db9939f8,2024-04-10T19:49:51.183000
CVE-2024-34480,0,1,49b250a98ce255257090c20d521285dac95287e688640b081174f9d009be3614,2024-08-08T15:35:10.330000
CVE-2024-34480,0,0,49b250a98ce255257090c20d521285dac95287e688640b081174f9d009be3614,2024-08-08T15:35:10.330000
CVE-2024-34481,0,0,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821efc72,2024-07-09T16:22:36.033000
CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000
CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000
@ -252856,7 +252860,7 @@ CVE-2024-34945,0,0,bd887865baa11222c5471f83f64ee50937d3f1c1cfa2d234bd4834ddeb94d
CVE-2024-34946,0,0,bc37c91351bb9de539bebc2edf6ca00a5506257a85c0193f030841ee78b07113,2024-07-03T02:01:00.960000
CVE-2024-34947,0,0,1639e64ad64e3efff06c97dd9d715badbd33e6d8d7c52e5aa73aac445f5ce021,2024-05-20T19:34:58.277000
CVE-2024-34948,0,0,1be0e178d75a75458d35d0a783016b73f5729bb8efeb1fbecd8e8099d4e24c7a,2024-05-20T19:34:58.277000
CVE-2024-34949,0,1,153f526975e57cbda3da567b214cb11ac9a77a410da95e9aba96a02a87ca6108,2024-08-08T15:35:11.187000
CVE-2024-34949,0,0,153f526975e57cbda3da567b214cb11ac9a77a410da95e9aba96a02a87ca6108,2024-08-08T15:35:11.187000
CVE-2024-3495,0,0,2d01763d9fd00934d213846ccfe97dfaae5495029603a64e4efbf7d1d6ec8266,2024-05-22T12:46:53.887000
CVE-2024-34950,0,0,4b8267007ff70ad214b66a8a544774886740823c745cf811c7b1935620d9a19e,2024-07-03T02:01:01.753000
CVE-2024-34952,0,0,0b3ec7ed40085393e2071bc6d9d415733ee6d2bb94374bd8520452bf0007770e,2024-05-20T15:17:54.513000
@ -252883,7 +252887,7 @@ CVE-2024-34994,0,0,2a57fa5a48b91cfc9175994b09415b4e2c46f84fdbe6aceded93bada909a8
CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adaeedd,2024-07-03T02:01:11.353000
CVE-2024-34997,0,0,f1e18585236e7f0a59fe769dd2659091355a2fe62bd1315f5027e11c678faa34,2024-08-02T03:15:48.413000
CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000
CVE-2024-35009,0,1,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000
CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000
CVE-2024-35010,0,0,d24eb37231999ffbf1e461e69272836338e2106e037fb208bca0adcf07905054,2024-05-14T19:17:55.627000
CVE-2024-35011,0,0,a8947b533dc1a6aaf33e10215f23dae95a96d0da8092d086fdf57d48f5a0e318,2024-05-14T19:17:55.627000
CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000
@ -253161,7 +253165,7 @@ CVE-2024-35570,0,0,117a724a498932850802f3f22448be111c00fb8192d78e6cc7cb1dda47848
CVE-2024-35571,0,0,737c2a7f64c2812d810288ac20005c00d1a957dbded3b4f543f336361b86f200,2024-07-03T02:01:53.540000
CVE-2024-35576,0,0,4cf028a111dcdddf7b60054ad17a0fe8aad691fef93220823224c4163d503b71,2024-07-03T02:01:54.333000
CVE-2024-35578,0,0,fd79be27425584c76cc2d4b545495b232268e5d494b2fd2516c8d9eaac2f6939,2024-08-01T13:52:42.763000
CVE-2024-35579,0,1,37bfb499a88acccf42bbe9e75a181bacd08a79a39311b6039233619c973ca1d4,2024-08-08T15:35:12.957000
CVE-2024-35579,0,0,37bfb499a88acccf42bbe9e75a181bacd08a79a39311b6039233619c973ca1d4,2024-08-08T15:35:12.957000
CVE-2024-3558,0,0,f9fa909e69165819ae496c8acd1ccdd67c7ef5aa9a5c6af8d01fcec23b3946f3,2024-07-11T02:52:17.780000
CVE-2024-35580,0,0,0387db6917a36212f88347cae7a6aab7914a4db72f7693d46d262f85e8b4bfe1,2024-05-20T19:34:58.277000
CVE-2024-35581,0,0,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000
@ -253623,7 +253627,7 @@ CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45c
CVE-2024-36041,0,0,d88899430b8465bd9e7ec84eb791ba971452eec022e6c65dc6ad08436f1e4123,2024-07-09T16:22:37.687000
CVE-2024-36042,0,0,5e54aecb20c44082aa92fd61c0f8a58aa5121675b55d97309cf9a5aaaf11ac5e,2024-07-03T02:02:42.150000
CVE-2024-36043,0,0,3bd225f8561cef578aaa027f6bceef70b4450bc22a2e5dc039a9b76782f71691,2024-05-20T13:00:04.957000
CVE-2024-36048,0,1,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534fd54,2024-08-08T15:35:13.937000
CVE-2024-36048,0,0,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534fd54,2024-08-08T15:35:13.937000
CVE-2024-36049,0,0,51d271179b773ae975431c0c021fa3b0015024baa0aaf9431319b88ebb604829,2024-05-24T18:09:20.027000
CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000
CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000
@ -253865,7 +253869,7 @@ CVE-2024-36393,0,0,66cc85a4816620185dd811312e53841307ae83d95e0a80e5417b0f2e7ce59
CVE-2024-36394,0,0,ce487e69c50908b259342c996fd749aeec003c1cc9ebc8d7c04cb76587e4b2a6,2024-06-11T17:46:38.227000
CVE-2024-36395,0,0,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
CVE-2024-36396,0,0,6296e5e5abad58fd92610447f6d594c40593fdd339b1a18f1de671640ea0ec15,2024-08-07T17:40:12.830000
CVE-2024-36397,0,1,397d32bfdb09c2d3f9db35c1f7589cf3773b581a432802ae94747ca8dbab95df,2024-08-08T14:52:17.297000
CVE-2024-36397,0,0,397d32bfdb09c2d3f9db35c1f7589cf3773b581a432802ae94747ca8dbab95df,2024-08-08T14:52:17.297000
CVE-2024-36399,0,0,343a0b337c47a08f8ef5da762844b89fa9f0783d7ae2cdee4dacb27b86b494cf,2024-06-07T14:56:05.647000
CVE-2024-3640,0,0,634a3a61b60e4b6447ed9849adb2e8bddc05031ce5f2169a17d54b538992fc1b,2024-05-17T18:36:31.297000
CVE-2024-36400,0,0,47a38d468bfeafda14a4695dfbafb860220a66750f81a96f50551b5447b95aa6,2024-06-10T19:39:21.660000
@ -253971,7 +253975,7 @@ CVE-2024-36550,0,0,91adae745b223f9735fdb21a15339bb26034752e595063e3f9b20141d647e
CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000
CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000
CVE-2024-3657,0,0,ee35636c80343c35c9d7ec01515342fe2ebdf7b3a803cae60aab4ad80a6b3995,2024-07-18T16:15:07.693000
CVE-2024-36572,0,1,51fcc433e117044936f625e7e1dc65ef66d9076878d51d4460ad4070df0069c4,2024-08-08T14:28:25.750000
CVE-2024-36572,0,0,51fcc433e117044936f625e7e1dc65ef66d9076878d51d4460ad4070df0069c4,2024-08-08T14:28:25.750000
CVE-2024-36573,0,0,9ceb16a2acc670182f357db64f06ef9a672381f951b2f58ee1e425755272a679,2024-08-01T13:53:08.237000
CVE-2024-36574,0,0,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000
CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092c4a,2024-07-03T02:03:19.590000
@ -253986,8 +253990,8 @@ CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1a
CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000
CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000
CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000
CVE-2024-3659,0,1,45d8955e8ffd3d16f89a4279f52887a232a2257d1cf08559d9df0afb2157d916,2024-08-08T15:35:18.413000
CVE-2024-36597,0,1,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000
CVE-2024-3659,0,0,45d8955e8ffd3d16f89a4279f52887a232a2257d1cf08559d9df0afb2157d916,2024-08-08T15:35:18.413000
CVE-2024-36597,0,0,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000
CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000
CVE-2024-36599,0,0,2b2bc07f90b37a08fed3176237d4d673945409fdbbe06bfa5eecf36828a7ec56,2024-08-01T20:31:01.340000
CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117ed2,2024-08-01T13:56:38.227000
@ -254182,7 +254186,7 @@ CVE-2024-36968,0,0,a995bed3e48bd8c81f02b7e9d11197af7d121a937f63236c67c72482dd84f
CVE-2024-36969,0,0,e622ab8131a3dbc40ec2fb2b416de8073d7058b237c224b8ddf44dea78c18b59,2024-07-17T16:50:29.427000
CVE-2024-3697,0,0,6e56c636d90d09536d9c0a6418223e2755a5c4ad9d107f96b9c5e19a7cee17c5,2024-06-04T19:20:23.323000
CVE-2024-36970,0,0,71019bd2eae5fd365be1f562acf6569962a155e7ea79c468fc47a7884a32f8dd,2024-06-10T02:52:08.267000
CVE-2024-36971,0,1,19a783e743bca7b704f26b9e2c301763abbc69d1adcc4e7bcc3cfec2328bc2ff,2024-08-08T14:49:52.603000
CVE-2024-36971,0,0,19a783e743bca7b704f26b9e2c301763abbc69d1adcc4e7bcc3cfec2328bc2ff,2024-08-08T14:49:52.603000
CVE-2024-36972,0,0,a2ab0e02a9dc38f992f1abc892dfaba943164f0fa5c0a17bc8e30ba95822955c,2024-07-03T02:03:56.627000
CVE-2024-36973,0,0,ad2c4092d909690c4766323dda96dac09439cf4ae37914f4902c28191444a81a,2024-06-21T14:15:12.250000
CVE-2024-36974,0,0,aa342464f56df4c331d398bcc0f3e68d9c36f35501b54bcc80e29a36fedbdd6a,2024-07-05T08:15:02.943000
@ -254266,7 +254270,7 @@ CVE-2024-37080,0,0,f0a9bd7effb46ac30e1d20f1d1aa7a7b386c0ee7e62089b4e1cc310e9f341
CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000
CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7382,2024-07-12T17:15:10.220000
CVE-2024-37084,0,0,80550735d6bb4a6e286021e9f22257f5e538827d4cf62f5ba780a83b5b57849d,2024-08-01T13:53:22.230000
CVE-2024-37085,0,1,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3b37,2024-08-08T14:48:49.303000
CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3b37,2024-08-08T14:48:49.303000
CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000
CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000
CVE-2024-37089,0,0,9e292fe1dd11fba75d82973b2e1db6879968f554c93ecd19be42fbc3a656ef4b,2024-06-24T12:57:36.513000
@ -254439,7 +254443,7 @@ CVE-2024-37310,0,0,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601
CVE-2024-37312,0,0,c9951de02441eaa79d1cb1dd04f0cb479ff9f95a9feb89bd2a12c3935f476481,2024-06-17T12:42:04.623000
CVE-2024-37313,0,0,56e03be6114dcbcc420d52ba189ce21fd838f398741344c11caac865e40212b6,2024-06-17T12:42:04.623000
CVE-2024-37314,0,0,2a8bc61fa93764cb0fb07c24d5bac1ea60f00f829a9b504f8438b7c40cefcf59,2024-06-17T12:42:04.623000
CVE-2024-37315,0,0,31f47ce02db58cee61420543ed6af1becb289e2e35f5273500587c2c2526b083,2024-06-17T12:42:04.623000
CVE-2024-37315,0,1,78d1052b31ae41f56b435a7566552773a5c40ebb59f83a745739357048c084e1,2024-08-08T16:35:23.750000
CVE-2024-37316,0,0,23efa33580c16c198846d8cbc540c3b959c8c6cc5d8e7e643aacce595c39ab53,2024-06-17T12:42:04.623000
CVE-2024-37317,0,0,39b0b4317a6651cb59a140f8d7c551e6209dd76ddab831aefab29483d97c356d,2024-06-17T12:42:04.623000
CVE-2024-37318,0,0,f24ae26ca0facd31c951e48825bfa20026c0187e1527557d74d4daef2adbc562,2024-07-09T18:18:38.713000
@ -254743,12 +254747,12 @@ CVE-2024-37880,0,0,e6a073a13f4d5d80acb782a97b27605fba3820cc74e70d67b997f08c66f11
CVE-2024-37881,0,0,e093bcdbd16679bd51273f21b0d2d0887a3da8aeb5e0bdca0911ec7d57d9cff9,2024-08-01T13:54:28.750000
CVE-2024-37882,0,0,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000
CVE-2024-37883,0,0,7626a3367857543c450838d843023961ad58fb44ff2499e7c7931fd5ab11dafa,2024-06-17T12:42:04.623000
CVE-2024-37884,0,0,e664115ebc3d9e62a2f4cd0cf06116aef2a7d566cbf93f008874f1175c726ead,2024-06-17T12:42:04.623000
CVE-2024-37884,0,1,4e6fff0a6361455ad7e37911dc54427d765d3f4a4c4bb46beeffcddf37eecd25,2024-08-08T16:39:59.217000
CVE-2024-37885,0,0,17f5559a85e6e9db6ebd185b566af3c7ce60a0f396cf403a1166b89dd6d49182,2024-06-17T12:42:04.623000
CVE-2024-37886,0,0,37a2c4f4d6005992267e24a61cfd186fd6016e8e0dba151502269eb8999be1da,2024-06-17T12:42:04.623000
CVE-2024-37887,0,0,b37e79a679fd9102b91941b53bdc183f281fbd5b4dc7d1de4c3b5e688532b583,2024-06-17T12:42:04.623000
CVE-2024-37887,0,1,dd1db8e47a04efe406ac991a9022a48114c0903c568235a94787de1fe87758b4,2024-08-08T16:33:31.063000
CVE-2024-37888,0,0,089dd35cce5dcae3cb152eacc7c740a003a3d7c1b73414660b2199c1fb6b7c31,2024-06-17T12:42:04.623000
CVE-2024-37889,0,1,ee014bfb18a496c8142601928a13908bee5aa40300b8bda82e59b1c0a2e0b1e3,2024-08-08T15:31:53.683000
CVE-2024-37889,0,0,ee014bfb18a496c8142601928a13908bee5aa40300b8bda82e59b1c0a2e0b1e3,2024-08-08T15:31:53.683000
CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f99848d,2024-05-14T16:11:39.510000
CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000
CVE-2024-37891,0,0,ddade946d98463a2c8f8cfbb3e55e1c2664330986b4bd67bacc4915522a6cc76,2024-06-20T12:44:22.977000
@ -254943,7 +254947,7 @@ CVE-2024-38272,0,0,0d362d9df49b138200ab4f12d59df7df286d43127ca17e43b2d79b45065d1
CVE-2024-38273,0,0,98139fcc5d27706ddcb6f85d322a9c3ffe167225916ac0c861ab393656c9d382,2024-06-27T03:15:50.130000
CVE-2024-38274,0,0,3f34dcdbcb04b3bd1c27e63f0c6c999c7639ff04bd1f29bc2ba555ae3687211a,2024-06-27T03:15:50.233000
CVE-2024-38275,0,0,17a29176c9cd94911e6aad5a6dd293a641887c69fe54b6763e0075600fbe8757,2024-07-03T02:04:53.613000
CVE-2024-38276,0,1,420b302a83b8efbfcc0741f978bb4fb38300f6e3967d44226949bf558a6f3b37,2024-08-08T15:55:51.160000
CVE-2024-38276,0,0,420b302a83b8efbfcc0741f978bb4fb38300f6e3967d44226949bf558a6f3b37,2024-08-08T15:55:51.160000
CVE-2024-38277,0,0,16053847926d7223ffdceef240174876427d3d8df27818d0420d2b969f2f78a5,2024-06-27T03:15:50.370000
CVE-2024-38278,0,0,60d3c0d868d616e6d5a7669c0c9db2a6b6980c62032698d59edd5028fd6418f8,2024-07-09T18:19:14.047000
CVE-2024-38279,0,0,cab780052140a006f97b0d891784c002d8aa91120b62e579420a5e2e60e5c1a0,2024-06-13T18:35:19.777000
@ -254961,7 +254965,7 @@ CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c9815
CVE-2024-38293,0,0,2af5660de21ea537f089380c69d608dd10ea2321053bca42c4352602d7ee9678,2024-08-01T13:54:46.393000
CVE-2024-38294,0,0,f88948441f6418893f991fd0ef34dfd45f0e02ebcb8e39fd787f2f64385d53d8,2024-08-02T18:11:19.757000
CVE-2024-38295,0,0,c8378492e2d02be00aeda8d1da5a5ec5803f1a3bcf3481a4ca52e9e0e7261335,2024-08-02T18:10:46.607000
CVE-2024-38301,0,0,334450ca56bd1074e744d5e2e9a9bf04f668e867ead0d50886a3b74cbc9c3832,2024-07-11T13:05:54.930000
CVE-2024-38301,0,1,0aaba53899fa63c6f65cba4d5faa4104f18194e9cd1a78452f451bbbdb780cd8,2024-08-08T17:01:45.347000
CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
@ -255018,7 +255022,7 @@ CVE-2024-38396,0,0,5f72717de89283d9d02d4a6b5fda996e5c7ff361cf439906862ebb83e84bf
CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000
CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
CVE-2024-38428,0,1,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000
CVE-2024-38428,0,0,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000
CVE-2024-38429,0,0,5e526ecd9f3601e5c2a795b29824bf852a40a8bd76e3dceab8977ec097461eef,2024-07-30T13:32:45.943000
CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000
CVE-2024-38430,0,0,d1c73169d37efc71e6beb9c22a4d2028659521613b3d071afac8c89cb0341c77,2024-07-30T13:32:45.943000
@ -255347,8 +255351,8 @@ CVE-2024-38884,0,0,2995d6655030b3efa99eeb13ff3962c49b64356404f8cdbbcd7d79ef0fe80
CVE-2024-38885,0,0,8a2e7c92ff9d59eeb253764b9b37a9e191e8aa4093e5ab42e0fe7961aff8a0f1,2024-08-05T12:41:45.957000
CVE-2024-38886,0,0,7f7480a9fc0b3a4a59d99433c843b2ef60b52e8307cd555f1962e8229585a9ec,2024-08-07T16:15:45.170000
CVE-2024-38887,0,0,4ef670c69378591ff707bbb33d589d9f51782faaa69470b8debfe2f088a4a51d,2024-08-07T16:15:45.253000
CVE-2024-38888,0,1,d634d5c4fda84e84d6d530d61c52e88e8a68a7b5ebce006b5ca5c9a24e94ca29,2024-08-08T15:35:14.817000
CVE-2024-38889,0,1,ff5449d6729d1bfcccdf0b8a6b7ef1db4efc5b9569e828f6e023fb30564cd1e3,2024-08-08T15:35:15.143000
CVE-2024-38888,0,0,d634d5c4fda84e84d6d530d61c52e88e8a68a7b5ebce006b5ca5c9a24e94ca29,2024-08-08T15:35:14.817000
CVE-2024-38889,0,0,ff5449d6729d1bfcccdf0b8a6b7ef1db4efc5b9569e828f6e023fb30564cd1e3,2024-08-08T15:35:15.143000
CVE-2024-3889,0,0,2ba5a45c24d719fe59128cbd33fa4af06a688faaf656f20a90f93b6e4da4d713,2024-04-23T12:52:09.397000
CVE-2024-38890,0,0,4a300469b7efb073b95f9a9bf7e491c182b2ee0ba64a27c027d75d0858cc932c,2024-08-07T16:15:45.443000
CVE-2024-38891,0,0,7d793eac7055749c212813812ed3b0024238fafee96aa609578fa7b4deb68b69,2024-08-07T16:15:45.503000
@ -255380,8 +255384,8 @@ CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eab
CVE-2024-38971,0,0,46979c6cce7787051e40b62dba0207d3f5f20f29a3ce299a21265249d3eebf4c,2024-07-12T14:50:45.817000
CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000
CVE-2024-38983,0,0,b4007717ba4ecdcb9f705c2dcea6a2ebbf6e393e28ab95db12566748e89540ae,2024-08-08T13:58:47.040000
CVE-2024-38984,0,1,7c3f7dcbb9d8db747f3ca9e598aad133b9cb813297db2b8c281b7b8ebe0e4cd5,2024-08-08T14:20:15.617000
CVE-2024-38986,0,1,f88f428c38525ddbc968d1794b1779fbac2144427d1465f154ce6924362299d1,2024-08-08T14:18:47.127000
CVE-2024-38984,0,0,7c3f7dcbb9d8db747f3ca9e598aad133b9cb813297db2b8c281b7b8ebe0e4cd5,2024-08-08T14:20:15.617000
CVE-2024-38986,0,0,f88f428c38525ddbc968d1794b1779fbac2144427d1465f154ce6924362299d1,2024-08-08T14:18:47.127000
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000
CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000
@ -255398,9 +255402,9 @@ CVE-2024-39001,0,0,4a910b75869faff6116d62c4b16aa9d6512985c5f7163a2ecfe1d35727f84
CVE-2024-39002,0,0,5ae3119071c777fe1c3c088ebb594ee3244ed1b22187ea0a59fbd4bdb0225ef6,2024-08-01T13:55:15.163000
CVE-2024-39003,0,0,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000
CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000
CVE-2024-39010,0,1,ea27e1a674e0e51152c366aff9b8434577dd6bdd1d1fbf49281cb1173cbd8dea,2024-08-08T14:17:52.963000
CVE-2024-39011,0,1,0ff72e1262c145c0e7ad0e12159fa8940005cef45637179ea7630e9fc6914efb,2024-08-08T14:16:25.860000
CVE-2024-39012,0,1,9df6324c2bfe44c83576ce38800d6b3518f1e8bebb5d26f5ef119b7475ae9607,2024-08-08T14:03:03.583000
CVE-2024-39010,0,0,ea27e1a674e0e51152c366aff9b8434577dd6bdd1d1fbf49281cb1173cbd8dea,2024-08-08T14:17:52.963000
CVE-2024-39011,0,0,0ff72e1262c145c0e7ad0e12159fa8940005cef45637179ea7630e9fc6914efb,2024-08-08T14:16:25.860000
CVE-2024-39012,0,0,9df6324c2bfe44c83576ce38800d6b3518f1e8bebb5d26f5ef119b7475ae9607,2024-08-08T14:03:03.583000
CVE-2024-39013,0,0,a4c20ecb3bde21856044d9eb2da0ec8e02acc3f9684d1a5bf6185d1fb2e7bba0,2024-07-01T16:37:39.040000
CVE-2024-39014,0,0,9a0097bf0bd9a3cc47cff0cc484a6f4c909bfad413f77f22d65f886eb0aa8457,2024-07-01T16:37:39.040000
CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000
@ -255462,7 +255466,7 @@ CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c4
CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000
CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000
CVE-2024-39181,0,0,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000
CVE-2024-39182,0,1,51b32df09d912e550efbb72e5951696c8519aefd089e452500578b0d065b1383,2024-08-08T14:35:05.753000
CVE-2024-39182,0,0,51b32df09d912e550efbb72e5951696c8519aefd089e452500578b0d065b1383,2024-08-08T14:35:05.753000
CVE-2024-3919,0,0,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3e6,2024-08-01T13:56:45.767000
CVE-2024-3920,0,0,0491b769da3fcc1d713428de93228065f2895f5f96d5fbedd163ec53b9c646c0,2024-05-24T01:15:30.977000
CVE-2024-39202,0,0,348a7ae5d8dd5240a11e31748e08097038b5b43463791ad3f8bbf301dcb39ab4,2024-08-01T13:55:45.870000
@ -255477,10 +255481,10 @@ CVE-2024-39211,0,0,2097c1c66ba59a15383c9353c96916ab9a5680eac99b1f2a60f6c4879ed46
CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000
CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000
CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000
CVE-2024-39225,0,1,93ec07be332c0fbc08f4cc605af38a214d7821d7542b5861ecdd39a33713e3a2,2024-08-08T15:35:16.513000
CVE-2024-39225,0,0,93ec07be332c0fbc08f4cc605af38a214d7821d7542b5861ecdd39a33713e3a2,2024-08-08T15:35:16.513000
CVE-2024-39226,0,0,65538f67cb196596a8cfb9513b9dfa6fe8eec2180b85ecc10f4d7ce6bc6a8c80,2024-08-07T20:55:49.350000
CVE-2024-39227,0,0,2211ddbd5220f8b56e47d2f7c46758947c3e06d1cbf2ccb482742b173f16326b,2024-08-07T15:35:04.963000
CVE-2024-39228,0,1,8b1f3c0005e0842107b7f0c645c21a9762591a4fc4cf4f38347830d4f20d016f,2024-08-08T15:35:17.417000
CVE-2024-39228,0,0,8b1f3c0005e0842107b7f0c645c21a9762591a4fc4cf4f38347830d4f20d016f,2024-08-08T15:35:17.417000
CVE-2024-39229,0,0,584cfbf56ddefb54ea5352429d5e93d41ff81ee610b212dc50534d94bcebb0b6,2024-08-07T15:17:46.717000
CVE-2024-3923,0,0,c2a620888229e913021be3366cfd9f75cdf87c5d652acf18a88f48f7b1cc1363,2024-05-14T16:11:39.510000
CVE-2024-39236,0,0,0c0b177de9b0c166027d70b91204b432604c3a2330076ae498cc541e78a8a520,2024-08-02T05:15:33.677000
@ -256178,7 +256182,7 @@ CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede6
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000
CVE-2024-40898,0,0,d1dec81302f4e54a600dae87bee8bfb9655cc572e1020953c947841130b121a3,2024-08-01T13:58:17.817000
CVE-2024-40898,0,1,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
@ -256328,8 +256332,8 @@ CVE-2024-41033,0,0,7183dfda87a717a7043cb53f856518b54b6ea87a88747e15104fc76ba2e9f
CVE-2024-41034,0,0,8ef7155ce0eaa8275171b9ac0813864d0797967a61f622f33157a8a24fce3047,2024-07-29T16:21:52.517000
CVE-2024-41035,0,0,cf48df2d338e0ed99938b6805f348531b3d0c639b71dd85f792b634a7cad4d55,2024-07-29T16:21:52.517000
CVE-2024-41036,0,0,3eb36f0b966eb35cff9222acfdc54aaaf4f85427f44e523908ded2d0342001b2,2024-07-29T16:21:52.517000
CVE-2024-41037,0,0,03ad41aa47b3521ca726588a13b9b67807df47d603e0c2ae5f4a7855107c284a,2024-07-29T16:21:52.517000
CVE-2024-41038,0,0,846baeab557d3551a3a4fa3b4d204920637ef62e2619819c67d5cc5dc43f5b9e,2024-07-29T16:21:52.517000
CVE-2024-41037,0,1,ee0b06bc77973c4027d48245d79fc7d87f47e59f3c8717e8720a6850fc7cec0b,2024-08-08T17:53:57.487000
CVE-2024-41038,0,1,2aabacb99b432cb8d9836c68ea21fc07218bc88764ab1e896c1d79793004d876,2024-08-08T17:54:28.177000
CVE-2024-41039,0,0,3cf037a7b77611f693ccd2b6ab5e6ffc513017022cda8dfe8747fcd8d565d21f,2024-07-29T16:21:52.517000
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
CVE-2024-41040,0,0,7c4f1d43a75af85b97ad82a0f079e37e8691141bbc74b9a4b3f13879c7076fe9,2024-07-29T16:21:52.517000
@ -256382,18 +256386,18 @@ CVE-2024-41083,0,0,dff5dc6a7165d8b682758090410b05b21412e86ab2996b0805e7e8a0c1a5e
CVE-2024-41084,0,0,f925e6b8af988fbff4009df696776564d1566b9bec0a2d08e615514886466a2d,2024-07-29T16:21:52.517000
CVE-2024-41085,0,0,2a01a626749195e58b8c5d7793aaaf03330b26d8f731e06b491ff19b65d15e11,2024-07-29T16:21:52.517000
CVE-2024-41086,0,0,def1e72f4af73afb05473009bf28654fb55be728733d04a1cb558efe55809b1e,2024-07-29T16:21:52.517000
CVE-2024-41087,0,0,bd15033a3cf973bd638aace7e26263a17fe38e501501b32e5f4542ad2048b802,2024-07-29T16:21:52.517000
CVE-2024-41087,0,1,58c38c74c158e439afdb46cfb9959ea78813107a1e241ba0d714928a41f4075e,2024-08-08T18:00:03.977000
CVE-2024-41088,0,0,77b266b2f37d59fc76108613da24291390035f20c7c9f472230f677ce48b8790,2024-07-29T16:21:52.517000
CVE-2024-41089,0,0,42d363fb28c0c402e3b3a26eeb72bb1828849bc65cfe7de4fdb1a253856c4efa,2024-07-29T16:21:52.517000
CVE-2024-41089,0,1,38c98937ddcf0489f642c6e9ec7fba9f1ecb4dca47f05ab2326eea2df7749aea,2024-08-08T17:50:48.727000
CVE-2024-41090,0,0,6fcac80b2a14c2c34689e44731def02717dedfe18dda82ddf5737822dbb56b40,2024-07-29T14:12:08.783000
CVE-2024-41091,0,0,3fc4e261f19779ac0e56a4e977593baaf33599d021e440beef3dc9dadc5be94c,2024-07-29T14:12:08.783000
CVE-2024-41092,0,0,6ba4cc9e9d43c375b4a27827e9ec237140f86ae979bb409fce41de855fede6f0,2024-07-29T16:21:52.517000
CVE-2024-41093,0,0,0d64e8910c13b044168b969bba921ca7dfdd81d34edec58275188d07470da2a5,2024-07-29T16:21:52.517000
CVE-2024-41092,0,1,3c39b044ea5e355675d6fc317f55f869cf719acff5bdab05fd9abf02bf44d9f2,2024-08-08T17:51:11.700000
CVE-2024-41093,0,1,4ea05a79a95d172d19f70ea731b5f27982d494680f43de6cd04d5939fa17a543,2024-08-08T17:40:31.917000
CVE-2024-41094,0,0,278c76ef5ca1238c19b2adc813e6cb3415611fd6af79d964f6f40f1f04f60911,2024-07-29T16:21:52.517000
CVE-2024-41095,0,0,f244fd6ca8576a21cb7f6e12692a808905044dd2fc8132b84f6eedf5a6d0c3a3,2024-07-29T16:21:52.517000
CVE-2024-41096,0,0,f753c653f62c476d7f1d028269b80b34585f6eb891d94690df0f36d2c3d3deef,2024-07-29T16:21:52.517000
CVE-2024-41095,0,1,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a567d,2024-08-08T17:40:57.760000
CVE-2024-41096,0,1,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0395,2024-08-08T17:26:54.243000
CVE-2024-41097,0,0,c920409ed43bd61ce66fbb67a2bc2f7c465a9ae9767076af29e351ce5c3e00a0,2024-07-29T16:21:52.517000
CVE-2024-41098,0,0,545801a52863d7fb74ca8bb3c684f54e35c8de9c9dee55a88b00c0dc2fd6a1ec,2024-07-29T16:21:52.517000
CVE-2024-41098,0,1,4658b1a664747249856491a8decc3561c2036eed8e14f4d01a4226586d09138c,2024-08-08T17:27:55.600000
CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000
CVE-2024-41108,0,0,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000
CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000
@ -256442,25 +256446,26 @@ CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b
CVE-2024-41200,0,0,773adf6d8e9dc4d2b0557aa5b14dffd1b26ae280076ffdf0856bca3a52b0026c,2024-08-06T16:30:24.547000
CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
CVE-2024-41226,0,1,f5381931de23c5c05f7ee8bfe76927ab8a3b6cc5523ba53e93ac6154cb968434,2024-08-08T14:35:06.727000
CVE-2024-41226,0,0,f5381931de23c5c05f7ee8bfe76927ab8a3b6cc5523ba53e93ac6154cb968434,2024-08-08T14:35:06.727000
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
CVE-2024-41237,0,1,6c3bbfd67a2c38c6147b8483ba279472257fc740c0d1572c5fa4e63c27c892fc,2024-08-08T14:35:07.647000
CVE-2024-41239,0,0,adf670735c7ceebbef13764d2688de43ef7a5c56a813a8d8300861cc79bf2917,2024-08-08T13:04:18.753000
CVE-2024-41237,0,0,6c3bbfd67a2c38c6147b8483ba279472257fc740c0d1572c5fa4e63c27c892fc,2024-08-08T14:35:07.647000
CVE-2024-41238,1,1,cf96282fa1415cd67f054f797fb68068695ecd470c073cb302f195cae77e40bc,2024-08-08T17:35:05.697000
CVE-2024-41239,0,1,4739a4322a16e9b592b27bce368fa148c39d464b16681353d1da057fafdab0e5,2024-08-08T16:15:09.190000
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
CVE-2024-41240,0,1,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
CVE-2024-41241,0,1,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
CVE-2024-41242,0,1,136c7b7d22b080b31a334ec64795d2be9a741e5bc601d37387485bacabb32da5,2024-08-08T15:21:56.590000
CVE-2024-41243,0,1,952dd949cd58ac35f0a1a9ee0037ce6943213f0d14c4ea16f43a084423f1a4c5,2024-08-08T15:19:38.640000
CVE-2024-41244,0,1,892fb6545cc28ccf50cd66c9f6ebdecb8c20baeba0848d57269be31999372da5,2024-08-08T15:20:24.533000
CVE-2024-41245,0,1,587669924cb86d0aced2b2326d4b0b028a2dc0fb71bb86f1df18fc2bef95dffd,2024-08-08T15:20:58.417000
CVE-2024-41246,0,1,a352b0d929b79816f00a5f05f3133a7c2713cc0cccf57d59b49d04652ec3a004,2024-08-08T15:08:51.867000
CVE-2024-41247,0,1,b1879234dbb5e4e51537003eb14b996f7ad3d024ec805dab5d73eb6a361d1f7a,2024-08-08T15:08:20.403000
CVE-2024-41248,0,1,2e3eb92d4ddb9fb73a0d6cd2e0e99894b028d705fe4f5641721da8bf80a9bf4d,2024-08-08T15:07:27.853000
CVE-2024-41249,0,1,b36adc3976bd0fd4b1a986a438ce356cce08547870c88e153dfb2ebcd8a73b86,2024-08-08T15:06:48.843000
CVE-2024-41240,0,0,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
CVE-2024-41242,0,0,136c7b7d22b080b31a334ec64795d2be9a741e5bc601d37387485bacabb32da5,2024-08-08T15:21:56.590000
CVE-2024-41243,0,0,952dd949cd58ac35f0a1a9ee0037ce6943213f0d14c4ea16f43a084423f1a4c5,2024-08-08T15:19:38.640000
CVE-2024-41244,0,0,892fb6545cc28ccf50cd66c9f6ebdecb8c20baeba0848d57269be31999372da5,2024-08-08T15:20:24.533000
CVE-2024-41245,0,0,587669924cb86d0aced2b2326d4b0b028a2dc0fb71bb86f1df18fc2bef95dffd,2024-08-08T15:20:58.417000
CVE-2024-41246,0,0,a352b0d929b79816f00a5f05f3133a7c2713cc0cccf57d59b49d04652ec3a004,2024-08-08T15:08:51.867000
CVE-2024-41247,0,0,b1879234dbb5e4e51537003eb14b996f7ad3d024ec805dab5d73eb6a361d1f7a,2024-08-08T15:08:20.403000
CVE-2024-41248,0,0,2e3eb92d4ddb9fb73a0d6cd2e0e99894b028d705fe4f5641721da8bf80a9bf4d,2024-08-08T15:07:27.853000
CVE-2024-41249,0,0,b36adc3976bd0fd4b1a986a438ce356cce08547870c88e153dfb2ebcd8a73b86,2024-08-08T15:06:48.843000
CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000
CVE-2024-41250,0,1,bc95c78a7efc0365fead4119be635c241b3ddedc1c42b75d136374203f86efd4,2024-08-08T15:21:18.130000
CVE-2024-41251,0,1,5ba1e81e82ce502a72a5f7e5c5f8e1fac5b8153b5b88fdafbb8f664b9b159757,2024-08-08T15:05:36.537000
CVE-2024-41252,0,1,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
CVE-2024-41250,0,0,bc95c78a7efc0365fead4119be635c241b3ddedc1c42b75d136374203f86efd4,2024-08-08T15:21:18.130000
CVE-2024-41251,0,0,5ba1e81e82ce502a72a5f7e5c5f8e1fac5b8153b5b88fdafbb8f664b9b159757,2024-08-08T15:05:36.537000
CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000
CVE-2024-41254,0,0,27d7c2f374106e64ca875d8bdf9e26785b8da013fe899595d0b402d9e5d8a252,2024-08-01T12:42:36.933000
CVE-2024-41255,0,0,7cc2545787669f116d3dff916e600823ce1d7be3e6c14b4dba9c7bef750d7295,2024-08-01T15:35:18.570000
@ -256478,9 +256483,9 @@ CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a
CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
CVE-2024-41304,0,0,50eb5d3ccf87bf5dc8e8d40b784bffa46248caaebc645a20bf8eaeddf45f3d43,2024-07-31T12:57:02.300000
CVE-2024-41305,0,1,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
CVE-2024-41308,0,1,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
CVE-2024-41309,0,1,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
CVE-2024-41310,0,0,411e679a4d87025cfbd714a6e1af5ab48738e4397cbbc5202ae220b932f1975c,2024-08-05T12:41:45.957000
CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000
CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000
@ -256509,7 +256514,7 @@ CVE-2024-4140,0,0,1a159a4a143aac5301b6b2c31977a1ba9c685fc606596154a85964b944248c
CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb29d,2024-04-24T19:58:40.710000
CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000
CVE-2024-4143,0,0,3e703fdfd0a07e589cb7985eb968c1c228e0bf41a25245c7c0c730d1481e87d2,2024-08-01T13:59:25.697000
CVE-2024-41432,0,1,8f4c9c137a73ce4492827c5d064849c429a9c8bcf4d56d4aa0a1d934e4b0578d,2024-08-08T15:02:52.647000
CVE-2024-41432,0,0,8f4c9c137a73ce4492827c5d064849c429a9c8bcf4d56d4aa0a1d934e4b0578d,2024-08-08T15:02:52.647000
CVE-2024-41437,0,0,e389b50aa4d5a29958eacacc1cf1faf0204fd6cb11cd0999a5af2bb030d46651,2024-07-31T12:57:02.300000
CVE-2024-41438,0,0,996a6cc02fa9447bba099c45bfb4b15a572a20ecb18cd6121c0e71f3f9fd5f1a,2024-08-01T13:58:40.670000
CVE-2024-41439,0,0,43b59c8356f4d1c8bf3b4e415610ae4cbbf5c49a8a4d0218f2cf89083ef134a7,2024-07-31T12:57:02.300000
@ -256671,7 +256676,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
CVE-2024-41942,1,1,d3803f07ce0e65ed29e1e70dc90caac5025f888fb0a18433d54e269ebd38e920,2024-08-08T15:15:17.527000
CVE-2024-41942,0,0,d3803f07ce0e65ed29e1e70dc90caac5025f888fb0a18433d54e269ebd38e920,2024-08-08T15:15:17.527000
CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000
@ -256831,8 +256836,8 @@ CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad
CVE-2024-42151,0,0,fdb3fba7028cbe28580e674b99b9030e1b9e9a62c2e7f59da9e900cf53455fd9,2024-07-30T13:32:45.943000
CVE-2024-42152,0,0,cf7897733bea0728a109fc5e6bd10f12dc7e878ac6bdef95ec146d648e8c50e6,2024-07-30T13:32:45.943000
CVE-2024-42153,0,0,fcc644e98f47bf80a615aace1a6ace900e6f19b9ce88641e6a917689ff1d51b4,2024-08-08T12:51:49.873000
CVE-2024-42154,0,1,5a5c96e428c438e1f3dced31d05704a5d2c2ea208c7b4d00317e93a93e699f79,2024-08-08T15:02:01.050000
CVE-2024-42155,0,1,95a42d84399f0f115a34ecfd921658f3d7af5446b3cada02cd7d7dba29b77291,2024-08-08T15:01:33.093000
CVE-2024-42154,0,0,5a5c96e428c438e1f3dced31d05704a5d2c2ea208c7b4d00317e93a93e699f79,2024-08-08T15:02:01.050000
CVE-2024-42155,0,0,95a42d84399f0f115a34ecfd921658f3d7af5446b3cada02cd7d7dba29b77291,2024-08-08T15:01:33.093000
CVE-2024-42156,0,0,3e3b593a088f7c0fa294387fa1377c62b099a10750cb61c9f552055051d6684b,2024-08-02T14:31:53.660000
CVE-2024-42157,0,0,5125f5bae216026101436b8ffee5dc883ebe43267cdd74d06d29261ee37e908f,2024-08-02T14:31:28.107000
CVE-2024-42158,0,0,f708fe0c9b8afdea7e816433ff8d7e695756b23c2951cd3e7d51dd4aa0ae2367,2024-08-02T14:31:04.187000
@ -256845,7 +256850,7 @@ CVE-2024-4217,0,0,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd606
CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000
CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000
CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000
CVE-2024-42218,0,1,0f1deaa2b36000515fee391bcd2c28c5d6e64cfa71591116e02669ca7ef63ea0,2024-08-08T14:35:11.900000
CVE-2024-42218,0,0,0f1deaa2b36000515fee391bcd2c28c5d6e64cfa71591116e02669ca7ef63ea0,2024-08-08T14:35:11.900000
CVE-2024-42219,0,0,00fd975f66f6a2839a189f6a2df8a7d9de08250abaf16b5b10685ac80a797621,2024-08-07T20:35:23.967000
CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000
CVE-2024-42222,0,0,38cd91b9b737930e3a3bbd66eab3ff63c06a7a58cfd61a8acfc3675557f6b5ab,2024-08-07T15:17:46.717000
@ -256859,23 +256864,23 @@ CVE-2024-42229,0,0,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d
CVE-2024-4223,0,0,a9cdfeab1a1d35d41a694125f4f4f3203fe0cd94da938f50193ff10f6450cc4d,2024-05-16T13:03:05.353000
CVE-2024-42230,0,0,489de0c942b162ae04db8d65286f120a7fa8b9f22ca14fe8139d983112a4bb74,2024-07-30T19:32:51.137000
CVE-2024-42231,0,0,10724278b1403d9010315b9b102a7133e512f19dc0258e17964781455ceff0fb,2024-07-30T19:30:52.427000
CVE-2024-42232,0,1,97d1ff8df3e66dbe79f646e97c3af8fe34aa07d5ff0f154f387b73a5b743c2f7,2024-08-08T15:02:09.750000
CVE-2024-42233,0,1,b858c2184be0fe9bc0cfbcdc8da672b46795edb7eff9525a65fd92743ad6599c,2024-08-08T14:56:18.620000
CVE-2024-42234,0,1,cf936c476d401b01b17f21c4e4ca650e769fd6fed6837fd263712aa8a356e3b8,2024-08-08T14:55:29.913000
CVE-2024-42235,0,1,9f11b42e1871685982fdbf6f53089e9f3f33bab0488d21a69e9f64a0b3866973,2024-08-08T14:55:16.533000
CVE-2024-42236,0,1,6b4e98fd82e82c6c7dac85df976320ff8022b8678ac478676c90c4ed4c101893,2024-08-08T14:54:34.470000
CVE-2024-42237,0,1,2582452331a5d9178bb53c817c854b132fde8a0d3c55495d0e8679006a2bbd38,2024-08-08T14:54:24.207000
CVE-2024-42238,0,1,0d2e2825ed61c4e9cd100f8e3636e4a2f6260a95f57324d0ff39d5aa486178c4,2024-08-08T14:54:45.470000
CVE-2024-42239,0,1,bce0cbc185e9dba8bf14bbf789d8b1c57e6b9d76cbdc58ec3be7ed7be3fe4ef8,2024-08-08T14:54:08.330000
CVE-2024-42232,0,0,97d1ff8df3e66dbe79f646e97c3af8fe34aa07d5ff0f154f387b73a5b743c2f7,2024-08-08T15:02:09.750000
CVE-2024-42233,0,0,b858c2184be0fe9bc0cfbcdc8da672b46795edb7eff9525a65fd92743ad6599c,2024-08-08T14:56:18.620000
CVE-2024-42234,0,0,cf936c476d401b01b17f21c4e4ca650e769fd6fed6837fd263712aa8a356e3b8,2024-08-08T14:55:29.913000
CVE-2024-42235,0,0,9f11b42e1871685982fdbf6f53089e9f3f33bab0488d21a69e9f64a0b3866973,2024-08-08T14:55:16.533000
CVE-2024-42236,0,0,6b4e98fd82e82c6c7dac85df976320ff8022b8678ac478676c90c4ed4c101893,2024-08-08T14:54:34.470000
CVE-2024-42237,0,0,2582452331a5d9178bb53c817c854b132fde8a0d3c55495d0e8679006a2bbd38,2024-08-08T14:54:24.207000
CVE-2024-42238,0,0,0d2e2825ed61c4e9cd100f8e3636e4a2f6260a95f57324d0ff39d5aa486178c4,2024-08-08T14:54:45.470000
CVE-2024-42239,0,0,bce0cbc185e9dba8bf14bbf789d8b1c57e6b9d76cbdc58ec3be7ed7be3fe4ef8,2024-08-08T14:54:08.330000
CVE-2024-4224,0,0,e1cf2ae7cdc88422eca01167991edf26a4949e3c9b9aa4ed5e8cc28f6acda13c,2024-08-01T13:59:28.640000
CVE-2024-42240,0,1,220bf32b63332418629725f3f6b777328a87abe3a935b8d71148fd45efcfbe19,2024-08-08T14:53:59.897000
CVE-2024-42241,0,1,ab98a3cf3764211ffb1c1c41264e4310931269ffa3c49a3d4924da8457a30617,2024-08-08T14:53:50.763000
CVE-2024-42242,0,1,76feb11ff1b64882ae98cb05d8fee01154bb93b05ad0f7b74505099ce9d0fc7c,2024-08-08T14:53:42.797000
CVE-2024-42243,0,1,a100e682d084e1c9afe0b29d6e1ddb97769c71cbec41adefbc9f2f46e71c060a,2024-08-08T14:53:35.073000
CVE-2024-42244,0,1,64f9bf8b856af87969559561804111262192afa37aa42ad347e05b54753c2e75,2024-08-08T14:53:27.147000
CVE-2024-42245,0,1,fcb264c29551cd3e5d6115618e13535ac0249a42a696c4e8493e8f7d1f5c12ef,2024-08-08T14:53:19.530000
CVE-2024-42246,0,1,da0158313668d0853864dbfeb7b41dd897a00dbf2d1500f2de975e9a95c1bed0,2024-08-08T14:52:35.353000
CVE-2024-42247,0,1,3e8b3f558d251c3978924ee255c30e74df6492b1da5085ab4e636b80775e9831,2024-08-08T14:52:25.213000
CVE-2024-42240,0,0,220bf32b63332418629725f3f6b777328a87abe3a935b8d71148fd45efcfbe19,2024-08-08T14:53:59.897000
CVE-2024-42241,0,0,ab98a3cf3764211ffb1c1c41264e4310931269ffa3c49a3d4924da8457a30617,2024-08-08T14:53:50.763000
CVE-2024-42242,0,0,76feb11ff1b64882ae98cb05d8fee01154bb93b05ad0f7b74505099ce9d0fc7c,2024-08-08T14:53:42.797000
CVE-2024-42243,0,0,a100e682d084e1c9afe0b29d6e1ddb97769c71cbec41adefbc9f2f46e71c060a,2024-08-08T14:53:35.073000
CVE-2024-42244,0,0,64f9bf8b856af87969559561804111262192afa37aa42ad347e05b54753c2e75,2024-08-08T14:53:27.147000
CVE-2024-42245,0,0,fcb264c29551cd3e5d6115618e13535ac0249a42a696c4e8493e8f7d1f5c12ef,2024-08-08T14:53:19.530000
CVE-2024-42246,0,0,da0158313668d0853864dbfeb7b41dd897a00dbf2d1500f2de975e9a95c1bed0,2024-08-08T14:52:35.353000
CVE-2024-42247,0,0,3e8b3f558d251c3978924ee255c30e74df6492b1da5085ab4e636b80775e9831,2024-08-08T14:52:25.213000
CVE-2024-42248,0,0,9daba88013a62f39f5836d2ca2738ebe99311dc207e5be6d1a23f2affcf30263,2024-08-07T19:09:46.290000
CVE-2024-42249,0,0,bf365edc2c96a4876083f80ea351bf6e74bd1f39215b48e95af26a5324f39b9e,2024-08-07T19:09:46.290000
CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000
@ -256899,19 +256904,21 @@ CVE-2024-42349,0,0,d97bc517c9e69f035ec995db0492468328dd387e0dc6614b4ad8bd471c06d
CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000
CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000
CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000
CVE-2024-42354,1,1,3d7595135ce94793d71e84673f836d90ebff18be5f4f6e094ccb4747459b4723,2024-08-08T15:15:17.793000
CVE-2024-42355,1,1,18cdeda7877af65f170277b41a145f3c35a4438f3a3190478b69fcca0b47db9f,2024-08-08T15:15:18.013000
CVE-2024-42356,1,1,98e8fd4c7edac05c8c94e1e93ad8136456c4b4a84fc6ae709b38a989943e3a4f,2024-08-08T15:15:18.247000
CVE-2024-42357,1,1,17a3203dc9637fb73af25dd0413d02cecc35254bb9f6894cc80f19b3085c5a0b,2024-08-08T15:15:18.460000
CVE-2024-42354,0,0,3d7595135ce94793d71e84673f836d90ebff18be5f4f6e094ccb4747459b4723,2024-08-08T15:15:17.793000
CVE-2024-42355,0,0,18cdeda7877af65f170277b41a145f3c35a4438f3a3190478b69fcca0b47db9f,2024-08-08T15:15:18.013000
CVE-2024-42356,0,0,98e8fd4c7edac05c8c94e1e93ad8136456c4b4a84fc6ae709b38a989943e3a4f,2024-08-08T15:15:18.247000
CVE-2024-42357,0,0,17a3203dc9637fb73af25dd0413d02cecc35254bb9f6894cc80f19b3085c5a0b,2024-08-08T15:15:18.460000
CVE-2024-42358,0,0,bfdfea3765abe743074eccf4e4988e900f51d95c87e996dc4c204d5e5db7c300,2024-08-07T15:17:46.717000
CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000
CVE-2024-42365,1,1,d3a57ff46171e16a07c5d4a9ce8d6a97fac3c2d8c14d2533d5e2b227cc435cea,2024-08-08T17:15:19.340000
CVE-2024-42366,1,1,c6ae642720c4b2dbd302d4317caf1ed1792180069099f5fdd4ecd87302025526,2024-08-08T17:15:19.590000
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000
CVE-2024-42393,0,0,5dd44c9308d36b411fed5411a98459070241dd2bf710d7dad45f46ec0d5bad2d,2024-08-07T15:17:46.717000
CVE-2024-42394,0,0,8620f2200c19aa777678f20e32bb1e445009605fa585ff86df761a7b63f61fb2,2024-08-07T15:35:07.267000
CVE-2024-42395,0,1,e1c76c107b3f7053fd30c6ccc9feaab55edee78b1124907a4f272d01f9bc9027,2024-08-08T15:35:20.467000
CVE-2024-42395,0,0,e1c76c107b3f7053fd30c6ccc9feaab55edee78b1124907a4f272d01f9bc9027,2024-08-08T15:35:20.467000
CVE-2024-42396,0,0,903b5dfacb7e423dfce4ec2f21d9e5672155e7489cd90f70dcb7b200326e589d,2024-08-07T15:17:46.717000
CVE-2024-42397,0,0,f7434600ffa56a576ecdf14011898fe7e4d8ca06e11d6701b45a9c7152ebd870,2024-08-07T15:17:46.717000
CVE-2024-42398,0,0,1bd47f35d1750f7fdf43bf764c0abf3e2c80a4806a8e0014d8bb69479613f3de,2024-08-07T15:17:46.717000
@ -257569,7 +257576,7 @@ CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a1
CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54
CVE-2024-4963,0,0,ef1fba35c0790604656a5e5622c9c7f4af0f1d1414e5784cd7a21207910d8397,2024-08-01T21:15:54.113000
CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000
CVE-2024-4965,0,1,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000
CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000
CVE-2024-4966,0,0,ca96dc16e6a41cb4de3af3c10d7787996b0688fd8eb0522e09efb3ad5052b418,2024-05-17T02:40:44.507000
CVE-2024-4967,0,0,8025a234fc289bdab04f9acbdc2478b7155048b60320bc8b6b7a0758b314e3b9,2024-06-04T19:20:55.777000
CVE-2024-4968,0,0,e5876599ebc72fb366518fd24786abd136bd58674cfc6b7ffb1fde29b7dfc2f8,2024-06-04T19:20:55.910000
@ -258444,9 +258451,9 @@ CVE-2024-6061,0,0,9fbdc13d40c52cd3201ba4dbc85806265bcae7fe430997057864a0abc50a97
CVE-2024-6062,0,0,93dbd09d82a9c090799896e27a01f38efff42cdeec70d50228105cef0f88fcb4,2024-06-20T12:44:22.977000
CVE-2024-6063,0,0,bc31baa414c7130817af75aefc4c93d5c50e0d49a263847622e8e121134c5d33,2024-06-20T12:44:22.977000
CVE-2024-6064,0,0,3370149dffce37c68b93ba4d92c68f6dbfa595c6fecab2312ed9b990710fd435,2024-06-20T12:44:22.977000
CVE-2024-6065,0,0,514bd9f9f4a3613b94bc7bfb084d907ec74ed34501cfb3e4a683a0b50d6afe06,2024-06-20T12:44:01.637000
CVE-2024-6066,0,0,a06c9fc8db7eb13dd621ace2d752d99df40755c9b5b91f1efc8bbc9b6de30b09,2024-06-20T12:44:01.637000
CVE-2024-6067,0,0,1e6b129394b13ed508cc25c73753e4a7c09d825658c089c51e19bb31b1ffc20c,2024-06-20T12:44:01.637000
CVE-2024-6065,0,1,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000
CVE-2024-6066,0,1,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000
CVE-2024-6067,0,1,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000
CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000
CVE-2024-6070,0,0,1949da6de042279176b79576f8e73bfd6878b90ce3cb716b8378384d024fe5eb,2024-08-01T14:00:09.647000
CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000
@ -258458,7 +258465,7 @@ CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f7
CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000
CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000
CVE-2024-6083,0,0,a8e42b758c673e09d4e24ea193e5640feaaf3b5eee44f78d141a0b2276184907,2024-06-20T12:44:01.637000
CVE-2024-6084,0,0,06b281398f86ed81b091427e75b7100073dd1dfd003da38e7de1b912df60ef63,2024-06-20T12:44:01.637000
CVE-2024-6084,0,1,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
@ -258475,7 +258482,7 @@ CVE-2024-6103,0,0,5e29bc37d9d7a304c867024ebdb6c9635d505e152b36dfc1b31a9280adb1e2
CVE-2024-6104,0,0,108534f982ecedc8e18a75e604642b0e40fef80fdd2c5d6c473bb0683c303507,2024-06-26T17:19:40.850000
CVE-2024-6108,0,0,8dcf8c978ffd08a68470779b67afcba2ef4b72c9a7a6acbd6d0451b159e2f4f9,2024-06-25T18:15:11.730000
CVE-2024-6109,0,0,bb0e3455a169d6bebc9d8b88e9df5fdfc40e2e3982d9fbc581f71bdf8363e7cb,2024-06-20T12:44:01.637000
CVE-2024-6110,0,0,50ef215f8e6157854634fcfeb971b8c496415614205b190cacac31c6923eeaf4,2024-06-20T12:44:01.637000
CVE-2024-6110,0,1,b63b3d86bda62f504e857148e856fae2084982d1fba5e9f950f2c7804e723853,2024-08-08T16:12:55.633000
CVE-2024-6111,0,0,98763a9958bd86a666bf14e0feaaf6fc585400a69f10e2d292b840aca2e315e8,2024-06-20T12:44:01.637000
CVE-2024-6112,0,0,b1e6c0864e0ebee4a0a8c4638d7eeba1ec17f68eaa1c8ef1caada2a1fabb05a0,2024-06-20T12:44:01.637000
CVE-2024-6113,0,0,5b70a902f6bae2f98582af8aea358fa74ce77c6f620f786f6fe02fb8c741aebc,2024-06-20T12:43:25.663000
@ -258552,7 +258559,7 @@ CVE-2024-6201,0,0,d38367168d5aef370997b6f5887839730436f73d95cab416b78e0d1a684123
CVE-2024-6202,0,0,872874bb823d5057711a230ba61fa2dff5a30353a0a7e4d78a374d9e572ebcf9,2024-08-06T16:30:24.547000
CVE-2024-6203,0,0,cc0fa811d8a866e1744c3dbcff814070dea6464d7cea80a2e3dc6064e330aefd,2024-08-06T16:30:24.547000
CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000
CVE-2024-6206,0,1,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000
CVE-2024-6206,0,0,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000
CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000
CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000
CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000
@ -258745,7 +258752,7 @@ CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc77
CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000
CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000
CVE-2024-6477,0,0,af465e59718721c7b727c1ec6a265ade947c829c05464c1090814aa1a74a6b13,2024-08-05T12:41:45.957000
CVE-2024-6481,0,1,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000
CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000
CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000
CVE-2024-6485,0,0,b143d2f5de1cad2c57f83d18fe64abfe0ba2da69210341aec4863f07cdd850cb,2024-07-11T18:09:58.777000
CVE-2024-6487,0,0,ade8feb977b02299075dd869ca65fb48f198290ee8a478009ada36ae91b54213,2024-08-01T14:00:24
@ -258855,7 +258862,7 @@ CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73e
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000
CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555ee,2024-08-06T16:30:24.547000
CVE-2024-6652,0,0,0923244b6b76f442c47a88150f368b6b9dcb9b0e76b0d2676e50d3c093d67a8a,2024-07-11T13:05:54.930000
CVE-2024-6652,0,1,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
@ -258879,8 +258886,8 @@ CVE-2024-6699,0,0,9d9db768b9c88d760728ad43f917f22b5e5ff8a9965264fbc4d242d1015fef
CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000
CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000
CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000
CVE-2024-6706,0,1,d1d145b947ad97f8eaf2f091ef3b977ed89dbed4347b44402611d132f13059bb,2024-08-08T14:35:14.497000
CVE-2024-6707,0,1,c792dc80f91b7e4b45ea7a1b1487bfed6fdc5bec0250d28885774ca401b7c4d5,2024-08-08T14:35:14.743000
CVE-2024-6706,0,0,d1d145b947ad97f8eaf2f091ef3b977ed89dbed4347b44402611d132f13059bb,2024-08-08T14:35:14.497000
CVE-2024-6707,0,0,c792dc80f91b7e4b45ea7a1b1487bfed6fdc5bec0250d28885774ca401b7c4d5,2024-08-08T14:35:14.743000
CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b602,2024-08-05T12:41:45.957000
CVE-2024-6710,0,0,4e918da09846cceb474e5a8b11ef31c34f74c44e6fb5c62544fbedf363b9f5e1,2024-08-07T21:35:11.673000
CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000
@ -258961,10 +258968,10 @@ CVE-2024-6881,0,0,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1
CVE-2024-6884,0,0,1ab82a5f63c30a2091b7b058cafc8d62a5f67aa78df5b8c418a856100b70a5fa,2024-08-08T13:04:18.753000
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000
CVE-2024-6890,0,1,b493f7bd70bdeb873cbdf2524979e878cc1ca0743f8358dd3fc37c7addf41719,2024-08-08T14:35:15.090000
CVE-2024-6891,0,1,4430753a26635e6503a6d16441a998be7c3931a4c0419d868885b0693fc5d654,2024-08-08T14:35:15.340000
CVE-2024-6890,0,0,b493f7bd70bdeb873cbdf2524979e878cc1ca0743f8358dd3fc37c7addf41719,2024-08-08T14:35:15.090000
CVE-2024-6891,0,0,4430753a26635e6503a6d16441a998be7c3931a4c0419d868885b0693fc5d654,2024-08-08T14:35:15.340000
CVE-2024-6892,0,0,bc0d9068ca32a5801c1d63fe6f4795dc5c08dc9fc9ea0bef7783b53d20a45087,2024-08-08T13:04:18.753000
CVE-2024-6893,0,1,285cb73a7cc1c1a41688e25537ed90b263914746d47ad30eeac40ecdfa9e70f5,2024-08-08T14:35:15.587000
CVE-2024-6893,0,0,285cb73a7cc1c1a41688e25537ed90b263914746d47ad30eeac40ecdfa9e70f5,2024-08-08T14:35:15.587000
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000
@ -259086,6 +259093,8 @@ CVE-2024-7117,0,0,1e4afcc6cca6c4e7beb85fac1a7fed4a23e63b6654ed7d583e0579875d0c65
CVE-2024-7118,0,0,6ddf36fc8a10a330c27e6abbf544962e1f8806ebf38d58bb308a1fa31785fd26,2024-07-26T12:38:41.683000
CVE-2024-7119,0,0,0d4c04861267ba0260c186040cffb33b88f1cb2cf783b33962c97c266a3b660d,2024-07-26T12:38:41.683000
CVE-2024-7120,0,0,61740476c5bf721de3ec3243fb937e4e04eb802316b459df4612d60639785741,2024-07-26T12:38:41.683000
CVE-2024-7121,1,1,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
CVE-2024-7123,1,1,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
CVE-2024-7127,0,0,2d5095b19bb58c78333178ffe1af1d8a0764d078ec0f076ba87011d70eec91c9,2024-07-30T13:32:45.943000
CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000
CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000
@ -259173,7 +259182,7 @@ CVE-2024-7255,0,0,fd2a8f993022fe32cb5a87546341ab7eeda32776ebc3f07d5c930f36c0483b
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
CVE-2024-7264,0,0,4c56e36858354627d468029972bf040b2893210da9a48750dcecdce8ded0e49b,2024-07-31T12:57:02.300000
CVE-2024-7265,0,1,4852b8603d632d3bcc462f4769d3804068de49a6ee8bed893f3f302a5915432f,2024-08-08T15:15:18.970000
CVE-2024-7265,0,0,4852b8603d632d3bcc462f4769d3804068de49a6ee8bed893f3f302a5915432f,2024-08-08T15:15:18.970000
CVE-2024-7266,0,0,13217b610e89f9ee7a69aac89fa6f3b4c4d01ffc1f01ed5bb07f55671f0fe0b4,2024-08-07T15:17:46.717000
CVE-2024-7267,0,0,6e1f5892f7c4e286f75fc26af918a704fab9776a05a707e81dd3145cf4750869,2024-08-07T15:17:46.717000
CVE-2024-7273,0,0,08b55eeeed04c0bbb7f14e00803b2981c3933c2f80c54832a95f5208a289acec,2024-07-31T12:57:02.300000
@ -259260,6 +259269,7 @@ CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e
CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
CVE-2024-7394,1,1,aa547388be77617afc1aa944157a4aef3ae297017c9a6a716edae6da822967e6,2024-08-08T17:15:20.023000
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
@ -259295,10 +259305,12 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56
CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
CVE-2024-7477,1,1,9658812f50f693193f3789c680003d82b8e649f1acdf9e61a5fec82a5b61d372,2024-08-08T16:15:09.363000
CVE-2024-7480,1,1,c0703a6875a48d6b92b73b5bc819e0fe258554602ee77b1d655c728deab1735b,2024-08-08T16:15:09.567000
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
CVE-2024-7490,1,1,1b6f0cb56995b872a494e0feae1eccecf86d62b08ad77087a0b36dade00843ff,2024-08-08T15:15:19.057000
CVE-2024-7490,0,1,5e9c56a2b83cf7efea01311fcfb0bebbdeb54c4fc1c14fe0c7fe52afb8561c53,2024-08-08T17:15:20.163000
CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
CVE-2024-7494,0,0,03118698edd12e94cf1110a03a023e325330cda1b40488ab50e531b2e6ace73f,2024-08-06T16:30:24.547000
CVE-2024-7495,0,0,1d4e0bc3bd3cd1f2a04f242134024d84adf5fd40eab5c711a130f9e16780f0f1,2024-08-06T16:30:24.547000
@ -259314,7 +259326,7 @@ CVE-2024-7518,0,0,c1e659d59fab5a21f46030485c8364ef9c7b859fae166f3d9aaf16371f61ae
CVE-2024-7519,0,0,24768d8764f4f28adc1fbfcbb529254838657a3f1d1db417909b6d021fab1d2f,2024-08-07T21:35:12.903000
CVE-2024-7520,0,0,9d3ddc13e8867f7cb7b24f4793529c9a0d25e1f46dbf94c7eeb8a1b835d8a2d8,2024-08-06T23:15:59.803000
CVE-2024-7521,0,0,aa36585855cd5bcdfb01758853aa628523870b5b6ffb7787fa3857543ac3a56f,2024-08-06T23:15:59.877000
CVE-2024-7522,0,0,200c4a9f71deddb043126c358d302b0c8073deb45dd7d157681cf39a0d3beff5,2024-08-06T23:15:59.960000
CVE-2024-7522,0,1,84fe71da8cf075dcd103677abb54562bdd9f546fb1c9071f317f44135906c9bd,2024-08-08T16:35:14.220000
CVE-2024-7523,0,0,3f3f003d656a1184662cec79c06d3948dd3038503ae3513bf0fe3c1956b37613,2024-08-06T16:30:24.547000
CVE-2024-7524,0,0,07a71bf262380d8c7908b6af8aedab2300b78cb30b40198df3e8d289589265d2,2024-08-06T16:30:24.547000
CVE-2024-7525,0,0,5fd9dfbbd9f6275593c22928d26dda0f3c930c37af4b3bb59cc2fdc6afd8c61a,2024-08-06T23:16:00.030000

Can't render this file because it is too large.