Auto-Update: 2024-09-03T20:00:17.780747+00:00

This commit is contained in:
cad-safe-bot 2024-09-03 20:03:15 +00:00
parent 9577783856
commit f5020b2d0b
70 changed files with 3199 additions and 307 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-8863",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-11-09T23:15:08.740",
"lastModified": "2023-11-17T18:05:28.717",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:00.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-200"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45781",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-14T22:15:28.483",
"lastModified": "2023-11-20T20:38:43.463",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:01.533",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48619",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T03:15:08.633",
"lastModified": "2024-01-19T15:27:59.073",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:01.357",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28134",
"sourceIdentifier": "cve@checkpoint.com",
"published": "2023-11-12T23:15:09.313",
"lastModified": "2023-11-17T20:14:54.230",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:02.300",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32602",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.180",
"lastModified": "2023-11-15T18:49:21.803",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:03.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37117",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T07:15:12.077",
"lastModified": "2024-01-19T01:57:04.067",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:04.220",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45167",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-10T04:15:07.070",
"lastModified": "2023-11-16T19:15:25.573",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:04.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45284",
"sourceIdentifier": "security@golang.org",
"published": "2023-11-09T17:15:08.813",
"lastModified": "2023-11-17T16:39:27.450",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:05.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47384",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-14T20:15:08.417",
"lastModified": "2023-11-21T19:58:59.553",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:05.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-401"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48058",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-13T16:15:28.080",
"lastModified": "2023-11-16T17:34:52.187",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:06.833",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48060",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-13T16:15:28.150",
"lastModified": "2023-11-16T17:35:04.087",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:07.643",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49233",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T17:15:14.400",
"lastModified": "2024-09-03T17:15:14.400",
"vulnStatus": "Received",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50124",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T21:15:10.630",
"lastModified": "2024-01-19T14:42:04.497",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:08.537",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24790",
"sourceIdentifier": "security@golang.org",
"published": "2024-06-05T16:15:10.560",
"lastModified": "2024-06-18T17:59:12.547",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:07.483",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27729",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T19:15:18.573",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:35:07.920",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": " La vulnerabilidad de Cross Site Scripting en Friendica v.2023.12 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro location de la funci\u00f3n de eventos del calendario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/friendica/friendica/pull/13927",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33773",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:38:05.627",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-09-03T19:35:11.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer en /bin/boa en D-Link DIR-619L Rev.B 2.06B1 a trav\u00e9s de formWlanGuestSetup permite a usuarios remotos autenticados activar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s del par\u00e1metro \"p\u00e1gina web\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33892",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-02T18:16:18.637",
"lastModified": "2024-08-12T16:15:14.720",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-03T19:18:42.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,22 +81,98 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.0s0",
"versionEndExcluding": "21.2s10",
"matchCriteriaId": "04E2B00A-5F5D-455D-84DA-4ABFA82A1863"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.0s0",
"versionEndExcluding": "22.1s3",
"matchCriteriaId": "1873C613-5DB5-4BFB-A538-860E1BF6555B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.hms-networks.com/cyber-security",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33893",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-02T18:16:18.743",
"lastModified": "2024-08-12T16:15:14.830",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-03T19:02:35.070",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,135 @@
"value": "Los dispositivos Cosy+ que ejecutan un firmware 21.x inferior a 21.2s10 o un firmware 22.x inferior a 22.1s3 son vulnerables a XSS cuando muestran los registros debido a una sanitizaci\u00f3n de entrada inadecuada. Esto se solucion\u00f3 en las versiones 21.2s10 y 22.1s3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.0",
"versionEndIncluding": "21.2s10",
"matchCriteriaId": "0D2D5C2F-AA95-47DF-BD24-8A2C355BBEC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.0",
"versionEndIncluding": "22.1s3",
"matchCriteriaId": "9048EBCA-4083-4C50-8499-A6FA6346AAA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.hms-networks.com/cyber-security",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33895",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-02T18:16:18.933",
"lastModified": "2024-08-12T16:15:15.007",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-03T19:02:31.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,134 @@
"value": "Los dispositivos Cosy+ que ejecutan un firmware 21.x inferior a 21.2s10 o un firmware 22.x inferior a 22.1s3 utilizan una clave \u00fanica para cifrar los par\u00e1metros de configuraci\u00f3n. Esto se solucion\u00f3 en las versiones 21.2s10 y 22.1s3, la clave ahora es \u00fanica por dispositivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.0",
"versionEndIncluding": "21.2s10",
"matchCriteriaId": "0D2D5C2F-AA95-47DF-BD24-8A2C355BBEC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.0",
"versionEndIncluding": "22.1s3",
"matchCriteriaId": "9048EBCA-4083-4C50-8499-A6FA6346AAA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.hms-networks.com/cyber-security",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33896",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-02T18:16:19.023",
"lastModified": "2024-08-12T16:15:15.090",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-03T19:02:37.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,134 @@
"value": "Los dispositivos Cosy+ que ejecutan un firmware 21.x inferior a 21.2s10 o un firmware 22.x inferior a 22.1s3 son vulnerables a la inyecci\u00f3n de c\u00f3digo debido a una lista negra de par\u00e1metros incorrecta. Esto se solucion\u00f3 en las versiones 21.2s10 y 22.1s3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.0",
"versionEndIncluding": "21.2s10",
"matchCriteriaId": "0D2D5C2F-AA95-47DF-BD24-8A2C355BBEC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.0",
"versionEndIncluding": "22.1s3",
"matchCriteriaId": "9048EBCA-4083-4C50-8499-A6FA6346AAA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.hms-networks.com/cyber-security",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34224",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:38:36.660",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-09-03T19:35:12.227",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Cross Site Scripting en /php-lms/classes/Users.php?f=save en Computer Laboratory Management System usando PHP y MySQL 1.0 permite a atacantes remotos inyectar script web o HTML de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros de nombre, segundo nombre y apellido."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/dovankha/CVE-2024-34224",

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-38456",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T18:15:08.260",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HIGH-LEIT V05.08.01.03 and HIGH-LEIT V04.25.00.00 to 4.25.01.01 for Windows from Vivavis contain an insecure file and folder permissions vulnerability in prunsrv.exe. A regular user (non-admin) can exploit the weak folder and file permissions to escalate privileges and execute arbitrary code in the context of NT AUTHORITY\\SYSTEM."
}
],
"metrics": {},
"references": [
{
"url": "https://www.schutzwerk.com/blog/schutzwerk-sa-2024-001/",
"source": "cve@mitre.org"
},
{
"url": "https://www.vivavis.com/en/solution/scada-en/high-leit/",
"source": "cve@mitre.org"
},
{
"url": "https://www.vivavis.com/en/vivavis-high-leit-rce-vulnerability-cve-2024-38456/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38661",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-25T15:15:13.630",
"lastModified": "2024-06-25T18:50:42.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:03:36.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,158 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/ap: Se corrigi\u00f3 el fallo en la funci\u00f3n interna del AP modificar_bitmap() Un fallo del sistema como este Direcci\u00f3n de error: 200000cb7df6f000 TEID: 200000cb7df6f403 Fallo en el modo de espacio de inicio al usar el kernel ASCE. AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d Ups: 0038 ilc:3 [#1] M\u00f3dulos SMP PREEMPT vinculados en: mlx5_ib... CPU: 8 PID: 7556 Comm: bash No contaminado 6.9.0-rc7 #8 Nombre de hardware: IBM 3931 A01 704 (LPAR) Krnl PSW: 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8) R:0 T:1 IO:1 EX:1 Clave:0 M:1 W:0 P:0 AS:3 CC :2 PM:0 RI:0 EA:3 Krnl GPRS: 0000000000000001 ffffffffffffffc0 000000000000001 00000048f96b75d3 000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7 df6fce0 000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff 000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8 K C\u00f3digo rnl: 0000014b75e7b5fc: a7840047 brc 8,0000014b75e7b68a 0000014b75e7b600: 18b2 lr %r11,%r2 # 0000014b75e7b602: a7f4000a brc 15,0000014b75e7b616 >0000014b75e7b606: eb22d00000e6 laog %r2,%r2,0(%r13) 0000014b75e7b60c: a7680001 l hola %r6,1 0000014b75e7b610: 187b lr %r7,%r11 0000014b75e7b612: 84960021 brxh %r9,%r6, 0000014b75e7b654 0000014b75e7b616: 18e9 lr %r14,%r9 Seguimiento de llamadas: [<0000014b75e7b606>] ap_parse_bitmap_str+0x10e/0x1f8 ([<0000014b75e7b5dc>] bitmap_str+0xe4/0x1f8) [<0000014b75e7b758>] apmask_store+0x68/0x140 [<0000014b75679196>] kernfs_fop_write_iter+0x14e/0x1e8 [<0000014b75598524>] vfs_write+0x1b4/0x448 [<0000014b7559894c>] ksys_write+0x74/0x100 [<0000014b7618a440>] syscall+0x268/0x328 [<0000014b761a3558>] system_call+0x70/0x98 INFORMACI\u00d3N: lockdep est\u00e1 activado apagado. \u00daltima direcci\u00f3n del \u00faltimo evento de \u00faltima hora: [<0000014b75e7b636>] ap_parse_bitmap_str+0x13e/0x1f8 P\u00e1nico del kernel: no se sincroniza: Excepci\u00f3n fatal: p\u00e1nico_on_oops ocurri\u00f3 cuando /sys/bus/ap/a[pq]mask se actualiz\u00f3 con un valor de m\u00e1scara relativo (como +0x10-0x12,+60,-90) con uno de los valores num\u00e9ricos que excede INT_MAX. La soluci\u00f3n es simple: use valores largos sin signo para las variables internas. Las comprobaciones correctas ya est\u00e1n implementadas en la funci\u00f3n, pero se us\u00f3 un int simple para las variables internas con posibilidad de desbordamiento."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.316",
"matchCriteriaId": "86D353F1-8F3A-45CF-8A7A-0DB46F77D2BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.278",
"matchCriteriaId": "7FDBF235-DA18-49A1-8690-6C7272FD0701"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.219",
"matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.161",
"matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.94",
"matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.34",
"matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.5",
"matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2062e3f1f2374102f8014d7ca286b9aa527bd558",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4c0bfb4e867c1ec6616a5049bd3618021e127056",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67011123453b91ec03671d40712fa213e94a01b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7360cef95aa1ea2b5efb7b5e2ed32e941664e1f0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7c72af16abf2ec7520407098360bbba312289e05",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7dabe54a016defe11bb2a278cd9f1ff6db3feba6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c5f5911c1b13170d3404eb992c6a0deaa8d81ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d4f9d5a99a3fd1b1c691b7a1a6f8f3f25f4116c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3886",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-31T05:15:13.353",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:48:14.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tagdiv:tagdiv_composer:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.1",
"matchCriteriaId": "FED1C33B-12BC-4681-9EBF-E7E4AB59ED46"
}
]
}
]
}
],
"references": [
{
"url": "https://tagdiv.com/newspaper/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9db9c1-c6b5-459e-9820-ec4ee47b244e?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39301",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-25T15:15:14.240",
"lastModified": "2024-06-25T18:50:42.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:06:28.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,164 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/9p: corrige el valor uninit en p9_client_rpc() Syzbot con la ayuda de KMSAN inform\u00f3 el siguiente error: ERROR: KMSAN: valor uninit en trace_9p_client_res include/trace/events/ 9p.h:146 [en l\u00ednea] ERROR: KMSAN: valor uninit en p9_client_rpc+0x1314/0x1340 net/9p/client.c:754 trace_9p_client_res include/trace/events/9p.h:146 [en l\u00ednea] p9_client_rpc+0x1314/0x1340 net/9p/client.c:754 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c: 122 Legacy_get_tree+0x114/0x290 fs/fs_context.c:662 vfs_get_tree+0xa7/0x570 fs/super.c:1797 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352 path_mount+0x742/0x1f20 fs/namespace.c:3679 montar fs/namespace.c:3692 [en l\u00ednea] __do_sys_mount fs/namespace.c:3898 [en l\u00ednea] __se_sys_mount+0x725/0x810 fs/namespace.c:3875 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875 do_syscall_64+0xd5/ 0x1f0 Entry_SYSCALL_64_after_hwframe+0x6d/0x75 Uninit se cre\u00f3 en: __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598 __alloc_pages_node include/linux/gfp.h:238 [en l\u00ednea] alloc_pages_node include/linux/gfp.h:261 [en l\u00ednea] p\u00e1gina mm /slub.c:2175 [en l\u00ednea] allocate_slab mm/slub.c:2338 [en l\u00ednea] new_slab+0x2de/0x1400 mm/slub.c:2391 ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525 __slab_alloc mm/slub.c :3610 [en l\u00ednea] __slab_alloc_node mm/slub.c:3663 [en l\u00ednea] slab_alloc_node mm/slub.c:3835 [en l\u00ednea] kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852 p9_tag_alloc net/9p/client.c:278 [ en l\u00ednea] p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641 p9_client_rpc+0x27e/0x1340 net/9p/client.c:688 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031 1b9/0x28e0fs /9p/v9fs.c:410 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122 Legacy_get_tree+0x114/0x290 fs/fs_context.c:662 vfs_get_tree+0xa7/0x570 fs/super.c:1797 do_new_mount+0x71f/ 0x15e0 fs/namespace.c:3352 path_mount+0x742/0x1f20 fs/namespace.c:3679 do_mount fs/namespace.c:3692 [en l\u00ednea] __do_sys_mount fs/namespace.c:3898 [en l\u00ednea] __se_sys_mount+0x725/0x810 fs/namespace .c: 3875 __x64_sys_mount+0xe4/0x150 fs/namespace.c: 3875 do_syscall_64+0xd5/0x1f0 entry_syscall_64_after_hwframe+0x6d/0x75 if p9_check_errors () fails en p9_client no se inicialice correctamente. Sin embargo, trace_9p_client_res() termina intentando imprimirlo de todos modos antes de que finalice p9_client_rpc(). Solucione este problema asignando valores predeterminados a los campos p9_fcall como 'etiqueta' y (en caso de que KMSAN descubra algo nuevo) 'id' durante la etapa de asignaci\u00f3n de etiquetas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-665"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.2",
"versionEndExcluding": "4.19.316",
"matchCriteriaId": "CCF5D1C7-721B-4F6D-A174-0C49C221A367"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.278",
"matchCriteriaId": "7FDBF235-DA18-49A1-8690-6C7272FD0701"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.219",
"matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.161",
"matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.94",
"matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.34",
"matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.5",
"matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/124947855564572713d705a13be7d0c9dae16a17",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2101901dd58c6da4924bc5efb217a1d83436290b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/25460d6f39024cc3b8241b14c7ccf0d6f11a736a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6c1791130b781c843572fb6391c4a4c5d857ab17",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/72c5d8e416ecc46af370a1340b3db5ff0b0cc867",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/89969ffbeb948ffc159d19252e7469490103011b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca71f204711ad24113e8b344dc5bb8b0385f5672",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe5c604053c36c62af24eee8a76407d026ea5163",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39461",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-25T15:15:14.500",
"lastModified": "2024-06-25T18:50:42.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:12:22.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: bcm: rpi: Assign ->num before accessing ->hws Commit f316cdff8d67 (\"clk: Annotate struct clk_hw_onecell_data with __counted_by\") anot\u00f3 el miembro hws de 'struct clk_hw_onecell_data' con __counted_by, que informa al sanitizante de los l\u00edmites sobre la cantidad de elementos en hws, para que pueda advertir cuando se accede a hws fuera de los l\u00edmites. Como se se\u00f1al\u00f3 en ese cambio, el miembro __counted_by debe inicializarse con la cantidad de elementos antes de que ocurra el primer acceso a la matriz; de lo contrario, habr\u00e1 una advertencia de cada acceso antes de la inicializaci\u00f3n porque la cantidad de elementos es cero. Esto ocurre en raspberrypi_discover_clocks() debido a que ->num se asigna despu\u00e9s de que se haya accedido a ->hws: UBSAN: array-index-out-of-bounds in drivers/clk/bcm/clk-raspberrypi.c:374:4 index 3 est\u00e1 fuera del rango para el tipo 'struct clk_hw *[] __counted_by(num)' (tambi\u00e9n conocido como 'struct clk_hw *[]') Mueva la inicializaci\u00f3n ->num antes del primer acceso de ->hws, lo que borra la advertencia."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.34",
"matchCriteriaId": "AC0C6E24-8240-425A-BD1A-F78E6D3A67FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.5",
"matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6dc445c1905096b2ed4db1a84570375b4e00cc0f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9562dbe5cdbb16ac887d27ef6f179980bb99193c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cdf9c7871d58d3df59d2775982e3533adb8ec920",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39468",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-25T15:15:15.270",
"lastModified": "2024-07-05T08:15:03.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:14:51.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,140 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: soluciona el punto muerto en smb2_find_smb_tcon() Desbloquea cifs_tcp_ses_lock antes de llamar a cifs_put_smb_ses() para evitar dicho punto muerto."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "C6FAA8A5-3F50-4B9F-9EEA-8430F59C03AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.94",
"matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.34",
"matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.5",
"matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/02c418774f76a0a36a6195c9dbf8971eb4130a15",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/21f5dd36e655d25a7b45b61c1e537198b671f720",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/225de871ddf994f69a57f035709cad9c0ab8615a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8d0f5f1ccf675454a833a573c53830a49b7d1a47",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b055752675cd1d1db4ac9c2750db3dc3e89ea261",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b09b556e48968317887a11243a5331a7bc00ece5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39471",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-25T15:15:15.490",
"lastModified": "2024-06-25T18:50:42.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:16:01.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amdgpu: agregue un controlador de error para evitar lecturas fuera de los l\u00edmites si sdma_v4_0_irq_id_to_seq devuelve -EINVAL, el proceso debe detenerse para evitar lecturas fuera de los l\u00edmites, por lo que debe regresar directamente -EINVAL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.278",
"matchCriteriaId": "2B755DA3-6492-4165-BE2F-55FB23D6D019"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.219",
"matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.161",
"matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.94",
"matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.34",
"matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.5",
"matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/011552f29f20842c9a7a21bffe1f6a2d6457ba46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0964c84b93db7fbf74f357c1e20957850e092db3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5594971e02764aa1c8210ffb838cb4e7897716e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5b0a3dc3e87821acb80e841b464d335aff242691",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8112fa72b7f139052843ff484130d6f97e9f052f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8b2faf1a4f3b6c748c0da36cda865a226534d520",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ea906e9ac61e3152bef63597f2d9f4a812fc346a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40473",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:28.373",
"lastModified": "2024-08-15T13:39:29.240",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:13.383",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41241",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T18:15:37.703",
"lastModified": "2024-08-08T15:21:29.210",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:14.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-41435",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T19:15:14.340",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "YugabyteDB v2.21.1.0 was discovered to contain a buffer overflow via the \"insert into\" parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/ycybfhb/1427881e7db911786837d32b0669e06b",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yugabyte/yugabyte-db/issues/22967",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-41436",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T19:15:14.460",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ClickHouse v24.3.3.102 was discovered to contain a buffer overflow via the component DB::evaluateConstantExpressionImpl."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/ycybfhb/db127ae9d105a4d20edc9f010a959016",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ClickHouse/ClickHouse/issues/65520",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41700",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-08-20T12:15:07.143",
"lastModified": "2024-08-20T15:44:20.567",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-03T19:37:12.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:barix:sip_client_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EEBDE9E-57D1-4C54-8675-9C521938F0D7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42005",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T15:15:56.220",
"lastModified": "2024-08-07T20:48:00.083",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:10.293",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42568",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:07.643",
"lastModified": "2024-08-21T13:46:29.497",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:11.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-42901",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T18:15:08.507",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CSV injection vulnerability in Lime Survey v6.5.12 allows attackers to execute arbitrary code via uploading a crafted CSV file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LimeSurvey/LimeSurvey/pull/3884",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42901",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-42902",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T18:15:08.583",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the js_localize.php function of LimeSurvey v6.6.2 and before allows attackers to execute arbitrary code via injecting a crafted payload into the lng parameter of the js_localize.php function"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://bugs.limesurvey.org/view.php?id=19639",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/LimeSurvey/LimeSurvey/blob/6434b12ded1c4b6516200c453441d0896e11eee0/vendor/kcfinder/js_localize.php#L19",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42902",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-42903",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T18:15:08.663",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Host header injection vulnerability in the password reset function of LimeSurvey v.6.6.1+240806 and before allows attackers to send users a crafted password reset link that will direct victims to a malicious domain."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LimeSurvey/LimeSurvey/compare/6.6.0+240729...6.6.1+240806",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/LimeSurvey/LimeSurvey/pull/3920",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42903",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-42904",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T18:15:08.740",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in SysPass 3.2.x allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name parameter at /Controllers/ClientController.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/nuxsmin/sysPass/blob/9d0e169d2163897238877fb65130db47fe1ddcfa/app/modules/api/Controllers/ClientController.php#L89",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nuxsmin/sysPass/blob/master/lib/SP/DataModel/ClientData.php#L98",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42904",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42940",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:18.500",
"lastModified": "2024-08-15T19:33:37.670",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:15.163",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42941",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:18.603",
"lastModified": "2024-08-15T19:33:07.637",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T19:35:15.967",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42948",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:19.287",
"lastModified": "2024-08-15T19:31:38.217",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:12.773",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42978",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:20.960",
"lastModified": "2024-08-16T13:30:54.670",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:13.590",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42987",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:21.820",
"lastModified": "2024-08-16T13:26:27.123",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-03T18:35:13.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42991",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T16:15:06.910",
"lastModified": "2024-09-03T16:35:06.743",
"vulnStatus": "Received",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43396",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-20T21:15:14.897",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:19:33.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:khoj:khoj:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.15.0",
"matchCriteriaId": "0590C0BC-7CF8-48D9-B353-ABF6BB2CCE04"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/khoj-ai/khoj/commit/1c7a562880eeb7354325545d2cf6c5d1d1134812",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/khoj-ai/khoj/commit/55be90cdd2f9d6a09c8bf9ceea52fc36b9201626",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/khoj-ai/khoj/security/advisories/GHSA-cf72-vg59-4j4h",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43412",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T17:15:14.680",
"lastModified": "2024-09-03T17:15:14.680",
"vulnStatus": "Received",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43413",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T19:15:14.590",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute JavaScript via the DataSet functionality. Users can design a DataSet with a HTML column which contains JavaScript, which is intended functionality. The JavaScript gets executed on the Data Entry page and in any Layouts which reference it. This behavior has been changed in 4.1.0 to show HTML/CSS/JS as code on the Data Entry page. There are no workarounds for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/xibosignage/xibo-cms/commit/009527855d8bfd0ffb95f5c88ed72b7b5bdebfa1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-pfxp-vxh7-2h9f",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,84 @@
{
"id": "CVE-2024-43803",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T19:15:14.800",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Bare Metal Operator (BMO) implements a Kubernetes API for managing bare metal hosts in Metal3. The `BareMetalHost` (BMH) CRD allows the `userData`, `metaData`, and `networkData` for the provisioned host to be specified as links to Kubernetes Secrets. There are fields for both the `Name` and `Namespace` of the Secret, meaning that versions of the baremetal-operator prior to 0.8.0, 0.6.2, and 0.5.2 will read a `Secret` from any namespace. A user with access to create or edit a `BareMetalHost` can thus exfiltrate a `Secret` from another namespace by using it as e.g. the `userData` for provisioning some host (note that this need not be a real host, it could be a VM somewhere).\n\nBMO will only read a key with the name `value` (or `userData`, `metaData`, or `networkData`), so that limits the exposure somewhat. `value` is probably a pretty common key though. Secrets used by _other_ `BareMetalHost`s in different namespaces are always vulnerable. It is probably relatively unusual for anyone other than cluster administrators to have RBAC access to create/edit a `BareMetalHost`. This vulnerability is only meaningful, if the cluster has users other than administrators and users' privileges are limited to their respective namespaces.\n\nThe patch prevents BMO from accepting links to Secrets from other namespaces as BMH input. Any BMH configuration is only read from the same namespace only. The problem is patched in BMO releases v0.7.0, v0.6.2 and v0.5.2 and users should upgrade to those versions. Prior upgrading, duplicate the BMC Secrets to the namespace where the corresponding BMH is. After upgrade, remove the old Secrets. As a workaround, an operator can configure BMO RBAC to be namespace scoped for Secrets, instead of cluster scoped, to prevent BMO from accessing Secrets from other namespaces."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-653"
}
]
}
],
"references": [
{
"url": "https://github.com/metal3-io/baremetal-operator/commit/3af4882e9c5fadc1a7550f53daea21dccd271f74",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/metal3-io/baremetal-operator/commit/bedae7b997d16f36e772806681569bb8eb4dadbb",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/metal3-io/baremetal-operator/commit/c2b5a557641bc273367635124047d6c958aa15f7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/metal3-io/baremetal-operator/pull/1929",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/metal3-io/baremetal-operator/pull/1930",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/metal3-io/baremetal-operator/pull/1931",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/metal3-io/baremetal-operator/security/advisories/GHSA-pqfh-xh7w-7h3p",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43964",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T18:15:13.930",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:30:23.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dsgvo-for-wp:dsgvo_all_in_one_for_wp:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.5",
"matchCriteriaId": "7B90D1E6-0272-49A7-97AA-07705C3FC33D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/dsgvo-all-in-one-for-wp/wordpress-dsgvo-all-in-one-for-wp-plugin-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44716",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T18:15:14.200",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:32:45.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,73 @@
"value": "Una vulnerabilidad de Cross Site Scripting (XSS) en DedeBIZ v6.3.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedebiz:dedebiz:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DFDC21D-6CC8-4EA7-A41D-E9D7F1B667DA"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/DedeBIZ/DedeV6/releases/tag/6.3.0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/Jingyi-u/DedeBIZ",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44717",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T18:15:14.333",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:32:54.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,73 @@
"value": "Una vulnerabilidad de Cross Site Scripting (XSS) en DedeBIZ v6.3.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedebiz:dedebiz:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DFDC21D-6CC8-4EA7-A41D-E9D7F1B667DA"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/DedeBIZ/DedeV6/releases/tag/6.3.0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/Jingyi-u/DedeBIZ2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44776",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T18:15:14.440",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:33:26.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "Una vulnerabilidad de redirecci\u00f3n abierta en el par\u00e1metro de p\u00e1gina de vTiger CRM v7.4.0 permite a los atacantes redirigir a los usuarios a un sitio malicioso a trav\u00e9s de una URL creada espec\u00edficamente para ello."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:7.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3929CDEE-B429-4C81-B70A-1AC975979606"
}
]
}
]
}
],
"references": [
{
"url": "http://vtiger.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://packetstormsecurity.com/files/180461/vTiger-CRM-7.4.0-Open-Redirection.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44777",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T18:15:14.540",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:33:38.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:7.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3929CDEE-B429-4C81-B70A-1AC975979606"
}
]
}
]
}
],
"references": [
{
"url": "http://vtiger.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44778",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T18:15:14.633",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:34:36.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:7.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3929CDEE-B429-4C81-B70A-1AC975979606"
}
]
}
]
}
],
"references": [
{
"url": "http://vtiger.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44779",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T18:15:14.730",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T18:33:51.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:7.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3929CDEE-B429-4C81-B70A-1AC975979606"
}
]
}
]
}
],
"references": [
{
"url": "http://vtiger.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45307",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T19:15:15.033",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SudoBot, a Discord moderation bot, is vulnerable to privilege escalation and exploit of the `-config` command in versions prior to 9.26.7. Anyone is theoretically able to update any configuration of the bot and potentially gain control over the bot's settings. Every version of v9 before v9.26.7 is affected. Other versions (e.g. v8) are not affected. Users should upgrade to version 9.26.7 to receive a patch. A workaround would be to create a command permission overwrite in the Database. A SQL statement provided in the GitHub Security Advisor can be executed to create a overwrite that disallows users without `ManageGuild` permission to run the `-config` command. Run the SQL statement for every server the bot is in, and replace `<guild_id>` with the appropriate Guild ID each time."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/onesoft-sudo/sudobot/commit/ef46ca98562f3c1abef4ff7dd94d8f7b8155ee50",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/onesoft-sudo/sudobot/security/advisories/GHSA-crgg-w3rr-r9h4",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2024-45310",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T19:15:15.243",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in runc v1.1.14 and v1.2.0-rc3.\n\nSome workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual\nuser on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-363"
},
{
"lang": "en",
"value": "CWE-61"
}
]
}
],
"references": [
{
"url": "https://github.com/opencontainers/runc/commit/63c2908164f3a1daea455bf5bcd8d363d70328c7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/opencontainers/runc/commit/8781993968fd964ac723ff5f360b6f259e809a3e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/opencontainers/runc/commit/f0b652ea61ff6750a8fcc69865d45a7abf37accf",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/opencontainers/runc/pull/4359",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/opencontainers/runc/security/advisories/GHSA-jfvp-7x6p-h2pv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,17 +2,25 @@
"id": "CVE-2024-45440",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T11:15:27.083",
"lastModified": "2024-08-29T13:25:27.537",
"lastModified": "2024-09-03T18:15:08.967",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "core/authorize.php in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of hash_salt is file_get_contents of a file that does not exist."
},
{
"lang": "es",
"value": "core/authorize.php en Drupal 11.x-dev permite la divulgaci\u00f3n de ruta completa (incluso cuando el registro de errores es Ninguno) si el valor de hash_salt es file_get_contents de un archivo que no existe."
}
],
"metrics": {},
"references": [
{
"url": "https://senscybersecurity.nl/CVE-2024-45440-Explained/",
"source": "cve@mitre.org"
},
{
"url": "https://www.drupal.org/project/drupal/issues/3457781",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45586",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-09-03T10:15:06.180",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T19:55:47.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,9 +55,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -69,10 +101,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symphonyfintech:xts_mobile_trader:2.0.0.1:p160:*:*:*:*:*:*",
"matchCriteriaId": "F9A70A22-6504-4FA0-B578-42CAAAFBBB3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symphonyfintech:xts_web_trader:2.0.0.1:p160:*:*:*:*:*:*",
"matchCriteriaId": "8D137712-15D9-4AD6-BFC3-D0B7584C208A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0281",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45587",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-09-03T10:15:06.373",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T19:55:46.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,9 +55,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -69,10 +101,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symphonyfintech:xts_mobile_trader:2.0.0.1:p160:*:*:*:*:*:*",
"matchCriteriaId": "F9A70A22-6504-4FA0-B578-42CAAAFBBB3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symphonyfintech:xts_web_trader:2.0.0.1:p160:*:*:*:*:*:*",
"matchCriteriaId": "8D137712-15D9-4AD6-BFC3-D0B7584C208A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0281",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45588",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-09-03T11:15:15.333",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-03T19:46:35.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,9 +55,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -69,10 +101,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symphonyfintech:xts_mobile_trader:2.0.0.1:p160:*:*:*:*:*:*",
"matchCriteriaId": "F9A70A22-6504-4FA0-B578-42CAAAFBBB3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symphonyfintech:xts_web_trader:2.0.0.1:p160:*:*:*:*:*:*",
"matchCriteriaId": "8D137712-15D9-4AD6-BFC3-D0B7584C208A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0281",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6119",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2024-09-03T16:15:07.177",
"lastModified": "2024-09-03T16:15:07.177",
"vulnStatus": "Received",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7345",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-03T15:15:16.707",
"lastModified": "2024-09-03T15:15:16.707",
"vulnStatus": "Received",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7346",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-03T15:15:16.913",
"lastModified": "2024-09-03T15:15:16.913",
"vulnStatus": "Received",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7592",
"sourceIdentifier": "cna@python.org",
"published": "2024-08-19T19:15:08.180",
"lastModified": "2024-09-03T15:15:17.127",
"lastModified": "2024-09-03T18:35:15.763",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-7619",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-03T18:15:09.223",
"lastModified": "2024-09-03T18:15:09.223",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7654",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-03T15:15:17.223",
"lastModified": "2024-09-03T15:15:17.223",
"vulnStatus": "Received",
"lastModified": "2024-09-03T19:40:46.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-03T18:00:16.937452+00:00
2024-09-03T20:00:17.780747+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-03T17:59:27.440000+00:00
2024-09-03T19:55:47.997000+00:00
```
### Last Data Feed Release
@ -33,48 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261762
261774
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `12`
- [CVE-2023-49233](CVE-2023/CVE-2023-492xx/CVE-2023-49233.json) (`2024-09-03T17:15:14.400`)
- [CVE-2024-42991](CVE-2024/CVE-2024-429xx/CVE-2024-42991.json) (`2024-09-03T16:15:06.910`)
- [CVE-2024-43412](CVE-2024/CVE-2024-434xx/CVE-2024-43412.json) (`2024-09-03T17:15:14.680`)
- [CVE-2024-6119](CVE-2024/CVE-2024-61xx/CVE-2024-6119.json) (`2024-09-03T16:15:07.177`)
- [CVE-2024-38456](CVE-2024/CVE-2024-384xx/CVE-2024-38456.json) (`2024-09-03T18:15:08.260`)
- [CVE-2024-41435](CVE-2024/CVE-2024-414xx/CVE-2024-41435.json) (`2024-09-03T19:15:14.340`)
- [CVE-2024-41436](CVE-2024/CVE-2024-414xx/CVE-2024-41436.json) (`2024-09-03T19:15:14.460`)
- [CVE-2024-42901](CVE-2024/CVE-2024-429xx/CVE-2024-42901.json) (`2024-09-03T18:15:08.507`)
- [CVE-2024-42902](CVE-2024/CVE-2024-429xx/CVE-2024-42902.json) (`2024-09-03T18:15:08.583`)
- [CVE-2024-42903](CVE-2024/CVE-2024-429xx/CVE-2024-42903.json) (`2024-09-03T18:15:08.663`)
- [CVE-2024-42904](CVE-2024/CVE-2024-429xx/CVE-2024-42904.json) (`2024-09-03T18:15:08.740`)
- [CVE-2024-43413](CVE-2024/CVE-2024-434xx/CVE-2024-43413.json) (`2024-09-03T19:15:14.590`)
- [CVE-2024-43803](CVE-2024/CVE-2024-438xx/CVE-2024-43803.json) (`2024-09-03T19:15:14.800`)
- [CVE-2024-45307](CVE-2024/CVE-2024-453xx/CVE-2024-45307.json) (`2024-09-03T19:15:15.033`)
- [CVE-2024-45310](CVE-2024/CVE-2024-453xx/CVE-2024-45310.json) (`2024-09-03T19:15:15.243`)
- [CVE-2024-7619](CVE-2024/CVE-2024-76xx/CVE-2024-7619.json) (`2024-09-03T18:15:09.223`)
### CVEs modified in the last Commit
Recently modified CVEs: `25`
Recently modified CVEs: `56`
- [CVE-2022-48772](CVE-2022/CVE-2022-487xx/CVE-2022-48772.json) (`2024-09-03T17:51:34.200`)
- [CVE-2023-43901](CVE-2023/CVE-2023-439xx/CVE-2023-43901.json) (`2024-09-03T16:35:01.500`)
- [CVE-2023-45560](CVE-2023/CVE-2023-455xx/CVE-2023-45560.json) (`2024-09-03T16:35:02.247`)
- [CVE-2023-5992](CVE-2023/CVE-2023-59xx/CVE-2023-5992.json) (`2024-09-03T17:15:14.487`)
- [CVE-2024-38385](CVE-2024/CVE-2024-383xx/CVE-2024-38385.json) (`2024-09-03T17:59:27.440`)
- [CVE-2024-42311](CVE-2024/CVE-2024-423xx/CVE-2024-42311.json) (`2024-09-03T17:38:24.210`)
- [CVE-2024-43817](CVE-2024/CVE-2024-438xx/CVE-2024-43817.json) (`2024-09-03T17:41:46.407`)
- [CVE-2024-43818](CVE-2024/CVE-2024-438xx/CVE-2024-43818.json) (`2024-09-03T17:45:30.000`)
- [CVE-2024-43819](CVE-2024/CVE-2024-438xx/CVE-2024-43819.json) (`2024-09-03T17:47:10.540`)
- [CVE-2024-43821](CVE-2024/CVE-2024-438xx/CVE-2024-43821.json) (`2024-09-03T17:49:54.280`)
- [CVE-2024-43822](CVE-2024/CVE-2024-438xx/CVE-2024-43822.json) (`2024-09-03T17:49:33.007`)
- [CVE-2024-43823](CVE-2024/CVE-2024-438xx/CVE-2024-43823.json) (`2024-09-03T17:49:03.910`)
- [CVE-2024-43824](CVE-2024/CVE-2024-438xx/CVE-2024-43824.json) (`2024-09-03T17:48:39.160`)
- [CVE-2024-44920](CVE-2024/CVE-2024-449xx/CVE-2024-44920.json) (`2024-09-03T16:35:07.800`)
- [CVE-2024-44921](CVE-2024/CVE-2024-449xx/CVE-2024-44921.json) (`2024-09-03T17:35:01.983`)
- [CVE-2024-45435](CVE-2024/CVE-2024-454xx/CVE-2024-45435.json) (`2024-09-03T17:23:36.073`)
- [CVE-2024-45622](CVE-2024/CVE-2024-456xx/CVE-2024-45622.json) (`2024-09-03T16:35:09.647`)
- [CVE-2024-7691](CVE-2024/CVE-2024-76xx/CVE-2024-7691.json) (`2024-09-03T16:35:11.383`)
- [CVE-2024-7692](CVE-2024/CVE-2024-76xx/CVE-2024-7692.json) (`2024-09-03T16:35:12.363`)
- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-09-03T16:15:07.343`)
- [CVE-2024-8381](CVE-2024/CVE-2024-83xx/CVE-2024-8381.json) (`2024-09-03T16:35:13.350`)
- [CVE-2024-8384](CVE-2024/CVE-2024-83xx/CVE-2024-8384.json) (`2024-09-03T16:35:14.610`)
- [CVE-2024-8385](CVE-2024/CVE-2024-83xx/CVE-2024-8385.json) (`2024-09-03T16:35:15.653`)
- [CVE-2024-8387](CVE-2024/CVE-2024-83xx/CVE-2024-8387.json) (`2024-09-03T16:35:16.810`)
- [CVE-2024-8389](CVE-2024/CVE-2024-83xx/CVE-2024-8389.json) (`2024-09-03T16:35:17.947`)
- [CVE-2024-42568](CVE-2024/CVE-2024-425xx/CVE-2024-42568.json) (`2024-09-03T18:35:11.160`)
- [CVE-2024-42940](CVE-2024/CVE-2024-429xx/CVE-2024-42940.json) (`2024-09-03T19:35:15.163`)
- [CVE-2024-42941](CVE-2024/CVE-2024-429xx/CVE-2024-42941.json) (`2024-09-03T19:35:15.967`)
- [CVE-2024-42948](CVE-2024/CVE-2024-429xx/CVE-2024-42948.json) (`2024-09-03T18:35:12.773`)
- [CVE-2024-42978](CVE-2024/CVE-2024-429xx/CVE-2024-42978.json) (`2024-09-03T18:35:13.590`)
- [CVE-2024-42987](CVE-2024/CVE-2024-429xx/CVE-2024-42987.json) (`2024-09-03T18:35:13.793`)
- [CVE-2024-42991](CVE-2024/CVE-2024-429xx/CVE-2024-42991.json) (`2024-09-03T19:40:46.783`)
- [CVE-2024-43396](CVE-2024/CVE-2024-433xx/CVE-2024-43396.json) (`2024-09-03T18:19:33.167`)
- [CVE-2024-43412](CVE-2024/CVE-2024-434xx/CVE-2024-43412.json) (`2024-09-03T19:40:46.783`)
- [CVE-2024-43964](CVE-2024/CVE-2024-439xx/CVE-2024-43964.json) (`2024-09-03T18:30:23.437`)
- [CVE-2024-44716](CVE-2024/CVE-2024-447xx/CVE-2024-44716.json) (`2024-09-03T18:32:45.427`)
- [CVE-2024-44717](CVE-2024/CVE-2024-447xx/CVE-2024-44717.json) (`2024-09-03T18:32:54.357`)
- [CVE-2024-44776](CVE-2024/CVE-2024-447xx/CVE-2024-44776.json) (`2024-09-03T18:33:26.287`)
- [CVE-2024-44777](CVE-2024/CVE-2024-447xx/CVE-2024-44777.json) (`2024-09-03T18:33:38.413`)
- [CVE-2024-44778](CVE-2024/CVE-2024-447xx/CVE-2024-44778.json) (`2024-09-03T18:34:36.987`)
- [CVE-2024-44779](CVE-2024/CVE-2024-447xx/CVE-2024-44779.json) (`2024-09-03T18:33:51.297`)
- [CVE-2024-45440](CVE-2024/CVE-2024-454xx/CVE-2024-45440.json) (`2024-09-03T18:15:08.967`)
- [CVE-2024-45586](CVE-2024/CVE-2024-455xx/CVE-2024-45586.json) (`2024-09-03T19:55:47.997`)
- [CVE-2024-45587](CVE-2024/CVE-2024-455xx/CVE-2024-45587.json) (`2024-09-03T19:55:46.413`)
- [CVE-2024-45588](CVE-2024/CVE-2024-455xx/CVE-2024-45588.json) (`2024-09-03T19:46:35.080`)
- [CVE-2024-6119](CVE-2024/CVE-2024-61xx/CVE-2024-6119.json) (`2024-09-03T19:40:46.783`)
- [CVE-2024-7345](CVE-2024/CVE-2024-73xx/CVE-2024-7345.json) (`2024-09-03T19:40:46.783`)
- [CVE-2024-7346](CVE-2024/CVE-2024-73xx/CVE-2024-7346.json) (`2024-09-03T19:40:46.783`)
- [CVE-2024-7592](CVE-2024/CVE-2024-75xx/CVE-2024-7592.json) (`2024-09-03T18:35:15.763`)
- [CVE-2024-7654](CVE-2024/CVE-2024-76xx/CVE-2024-7654.json) (`2024-09-03T19:40:46.783`)
## Download and Usage

View File

@ -126497,7 +126497,7 @@ CVE-2018-8859,0,0,3f2c108d04b0e2409d8592bb97f5817e167c3c0c4d60dd9de0e61445122f44
CVE-2018-8860,0,0,b0ccb5112d48d5cfc4ac532d641687bb8c27f2de032ccae36e11c7aadd86a8f7,2018-06-13T13:09:31.863000
CVE-2018-8861,0,0,c8f9c83b5a25be5af9c29541b61b0c1691ea62a6790c814a20c716a472e3a3c1,2019-10-09T23:42:58.380000
CVE-2018-8862,0,0,38f645de00c79d4faab41a457d903578b05346eed4fcd0b695b7c436258036ef,2019-10-09T23:42:58.520000
CVE-2018-8863,0,0,87f618f9b73763ee6073d913ab2c363b3758c0aa01062dff6f0d16a2ff437ec4,2023-11-17T18:05:28.717000
CVE-2018-8863,0,1,1ffa2735c70c4c643d7e2657fb29695855cd7ba825a3509dac39cbea0e9e93e5,2024-09-03T18:35:00.770000
CVE-2018-8864,0,0,a65012defa6a7f67eab1b342715f2ee30ddf3ea5343b9417fd54d82d6bfc02e6,2019-10-09T23:42:58.677000
CVE-2018-8865,0,0,eb9955ab4a6b7b90ca79100f0c997638467adfe161b0353ac06f39abad4881d1,2020-09-29T19:11:13.863000
CVE-2018-8866,0,0,4d7da105aa6635fbcb2017ddfdaab70790ec8154a8ddb0c5120b0f2e17df3401,2019-10-03T00:03:26.223000
@ -210215,7 +210215,7 @@ CVE-2022-45770,0,0,830adc34ed7593d9c2a98a380d91aee283cf4be891ade5e674d6dc02b5ccf
CVE-2022-45771,0,0,f57e11996df680d36d6ee15297678c1626a529867f59888f6666ef95cd0412c0,2022-12-06T20:12:52.217000
CVE-2022-45778,0,0,2a24bcaca554e03cd441cdd71a1faeaafcb1f99d1037b48c68ca1f9e5f08d4ff,2023-08-08T14:21:49.707000
CVE-2022-4578,0,0,aa6c106534bfa13ee28380b3434820a0de580f23343a4401bab8223bee9a469f,2023-11-07T03:58:12.600000
CVE-2022-45781,0,0,58d254bd82a4e476ad98b32763d76177d02f1f0b6c31232ca967ed865e268687,2023-11-20T20:38:43.463000
CVE-2022-45781,0,1,da84c01ebfb1c03b3506dc072e517289535c28e545ac728a29eac2026d4477ff,2024-09-03T18:35:01.533000
CVE-2022-45782,0,0,dd561fff23d74b93b7359a0d88729353306bce64e4c1833f5f9a95892d6f22ea,2023-08-08T14:22:24.967000
CVE-2022-45783,0,0,7df6e5d9ac3a3dbeabd2aa93b48ca5fec43a263ffb99f2c8b4ef908c80e7ec96,2023-02-14T14:19:45.407000
CVE-2022-45786,0,0,979e99f4d51053bca01ffbdd38ac2307b003bb479adf9243e1cefb7355476ba3,2023-11-07T03:54:49.353000
@ -212126,7 +212126,7 @@ CVE-2022-48614,0,0,7f61c334e19e5fb35649c6bfdc4f21b8639cb0bab20190138981aaf8437a5
CVE-2022-48615,0,0,75bfc14f9a191ab8c781255b295d8ffd7a4c2678de5994a763d2ea2c9a94b86f,2023-12-15T15:02:28.517000
CVE-2022-48616,0,0,afb900d120cd7b289f2194cbaf2576a6e84f1b1e2bbe110d7b98c720789806c4,2023-12-15T15:27:11.247000
CVE-2022-48618,0,0,a6eef9a5f4b698c3f9f4220d3055015e15fce5a5eb3c7a14f2b80748deaf545c,2024-08-14T15:22:47.173000
CVE-2022-48619,0,0,2928b772c1aeee7ee52ae396b86a77a24d733dd9768a530500eee761c2aaa44a,2024-01-19T15:27:59.073000
CVE-2022-48619,0,1,f26c39736beb7aa7b0647551e799c08b4224ce3618497e170167759683b4f6cb,2024-09-03T19:35:01.357000
CVE-2022-4862,0,0,2553413418f6ad24271b84c4b6265dbfaea53531b172d691e897d8db042ae05f,2024-08-28T11:15:13.723000
CVE-2022-48620,0,0,5698c281f8e8068516c8dfe700ee9a98bc0bfd9312d73b253920c8e72d6c9959,2024-03-23T03:15:08.797000
CVE-2022-48621,0,0,1cd5ad66125265477c8dc07522592260d4eec4c99a5ef37987104225c1fc205f,2024-02-20T19:50:53.960000
@ -212290,7 +212290,7 @@ CVE-2022-48769,0,0,9da3594b688f3419de5209099af92b325945b83e31f6492d68a0030e2619b
CVE-2022-4877,0,0,7be088f764e81f3d159b624bbe89e382d534c3a5b5b12bd3cddcbca9b765980c,2024-05-17T02:17:00.577000
CVE-2022-48770,0,0,c1d7d83fd1642cff8a855525ca26bcc6079d73fb16b8d7f896bc8d7f51eac629,2024-06-20T12:43:25.663000
CVE-2022-48771,0,0,a8deacbe046a73aa8a794ce68776d42685618f7346517abbe96cfaf42a525dde,2024-06-20T12:43:25.663000
CVE-2022-48772,0,1,2e22416ee24a4aec0baa61bfdfa55464132f154c9e7fba592c8c6e7aae8a9b41,2024-09-03T17:51:34.200000
CVE-2022-48772,0,0,2e22416ee24a4aec0baa61bfdfa55464132f154c9e7fba592c8c6e7aae8a9b41,2024-09-03T17:51:34.200000
CVE-2022-48773,0,0,dc19342bce35f737a0d55bbca86132f56db1115e6627671efed3de2bb7534729,2024-08-21T17:45:26.867000
CVE-2022-48774,0,0,da71c85f24cdf9bc921c3d339b713f4ee60d227e6dab069d48721a29377e0e3f,2024-07-16T13:43:58.773000
CVE-2022-48775,0,0,2acb46b961b5a6a98400ee899a0271b90d0006fde257656a51a219503be9ebd4,2024-08-21T17:47:10.263000
@ -221110,7 +221110,7 @@ CVE-2023-2813,0,0,15b671f64d453b6daaa812c86c38b923ee0306238dd8226b785e08cf284b16
CVE-2023-28130,0,0,9e5c7d68ae781e4702faa4741f6c9ca91d4a375561cb250199a4cac75ccf8499,2024-08-23T15:35:02.097000
CVE-2023-28131,0,0,6a261341302567d63924e06d70096cab1d12ecabad3196aa7a98114485ed515a,2023-05-25T21:15:09.067000
CVE-2023-28133,0,0,430d71b69bc3693074f1df1c4d893c1b989573e5502f986f209e8ebd775e7532,2023-08-01T16:44:44.847000
CVE-2023-28134,0,0,c626b84e230219bdaa3f37a3b0fb442c69d155af0679eb523091db837c6ad9b4,2023-11-17T20:14:54.230000
CVE-2023-28134,0,1,576f6af660a0ee3aa38c70c3503252de88efa9a953963e8f36a68afea7fd081f,2024-09-03T19:35:02.300000
CVE-2023-2814,0,0,76e99b83570fd43fb0ee384d6b32871ce348dd67e3390997d401f82a906008fe,2024-05-17T02:23:16.980000
CVE-2023-28140,0,0,9af84c63583f551c116bcdf29edadf97cdb2c443daf0cb135661f79446c2521e,2023-04-28T13:52:12.577000
CVE-2023-28141,0,0,9109dd65b1c93e1472bf6a0875f5cbc021d2f4ce4a03097c958653f63a02f9d0,2023-04-28T14:04:12.760000
@ -224578,7 +224578,7 @@ CVE-2023-32597,0,0,f5c385d4202ec198d55d06078f193ff67984c8b0aab3bad6005dfbe5766c3
CVE-2023-32598,0,0,ee67ecc8f000425bd4fc9221a5d2535cb74d789ab00701a7071eb095dcb60756,2023-08-28T13:34:58.463000
CVE-2023-3260,0,0,d099d470e2515faaf7f6f21e1288cd362ba1c0dc705b69ccdaebfbc6bd6e4b59,2023-08-25T05:15:45.643000
CVE-2023-32600,0,0,b74c37bc6766e5b02ae672b3be92a3956792de245d267c6631747005c77e3ae1,2023-08-10T15:56:31.620000
CVE-2023-32602,0,0,8fecee7123c04b6885f8c9eeb44d10648d04a37c9ac73fdc57d70148a45d7974,2023-11-15T18:49:21.803000
CVE-2023-32602,0,1,bb9495336223c4b7880dc9d9dc917746491de4a4e0a7f06d1a0dc660325b73ef,2024-09-03T18:35:03.480000
CVE-2023-32603,0,0,e6c2101de13708b2218f921e975bb8e177ada382bd14ad0dd289abc7fa18a7f8,2023-08-28T13:35:12.593000
CVE-2023-32604,0,0,a1ce5f5676767b9d9f5996dc0ed8720625976a5ab9982b86de1600ca3557208c,2023-06-30T17:59:30.717000
CVE-2023-32605,0,0,31686f94a815477c36a8ab56be80207c20556009c92c6df898706d77476742c2,2023-06-30T17:59:17.467000
@ -227814,7 +227814,7 @@ CVE-2023-3708,0,0,87ff8f6499e91a0522ae67a0f594b23c6bd308f05529249ff2cefd5b4a4d4b
CVE-2023-3709,0,0,967acb8dbc18a4f447000860ce0f40e7a092c029be384db85324aab766bf7ff8,2023-11-07T04:19:26.107000
CVE-2023-3710,0,0,3b0c58a2706c12ae381777fcbd272f01a4a4f84b15e106ef047aa505a4056566,2023-09-19T20:42:18.100000
CVE-2023-3711,0,0,d1e752d0e305079185ef97fb2cc21361b799d80c6c099ca50bea92b0ed898042,2023-09-19T20:35:35.727000
CVE-2023-37117,0,0,ccccc641d561a508929ec5640368f5d1761d489e8d69feabc5a6218c7f136a1c,2024-01-19T01:57:04.067000
CVE-2023-37117,0,1,dfd63ed6bc45d360c57dc494d52d2dc24d569198a6f5f30ee67431e404e0e855,2024-09-03T19:35:04.220000
CVE-2023-3712,0,0,1c90126a89a75a9cba5fc7ceb6d3e4f302a535a7d30910619abb0b09c71197d8,2023-09-19T19:58:56.997000
CVE-2023-37122,0,0,aac1fd525e3cda650b1b3dc25fff146d36b274c3b0747922655307edfad33459,2023-07-11T13:30:38.823000
CVE-2023-37124,0,0,5745a4015beefa9048d60cd83867218fc0bc045a848321276fdddf4f802d7512,2023-07-11T13:30:53.563000
@ -233027,7 +233027,7 @@ CVE-2023-43898,0,0,65ee5d2edb55a6599b1cc66bd6446e03ba8a186ed62b80594b82ae9097cb1
CVE-2023-43899,0,0,9026560185610b5e4371b1de060312db36c04226bc6c17e3fc124750fda34ae2,2023-10-11T19:43:22.707000
CVE-2023-4390,0,0,4289c3520f599e07f344a7e17cd6139c8fc4ad9a1fe36fe7420cafc9dea389db,2023-11-08T17:28:21.687000
CVE-2023-43900,0,0,93180892ae45688fb322ce9133dd15e7a7bc4790bc6404142999fe19892415b5,2023-11-17T19:36:27.767000
CVE-2023-43901,0,1,e4fed9eed0ea5ac0d5aef5039e597450c679c098eab40cc146878f3f3282a4e4,2024-09-03T16:35:01.500000
CVE-2023-43901,0,0,e4fed9eed0ea5ac0d5aef5039e597450c679c098eab40cc146878f3f3282a4e4,2024-09-03T16:35:01.500000
CVE-2023-43902,0,0,7594a5857fd2a9221428fa0769e34c4a914bec98b194b7b812487f1c843e0cb0,2023-11-17T22:07:30.403000
CVE-2023-43905,0,0,2628cf6cc6fc8b5fbf15ea4bf2dbbaf2b65181744bbfddb569d0b223dc3aefb7,2023-11-03T18:07:46.893000
CVE-2023-43906,0,0,ff14d8a22a132aecd242d338700d98c93de3c23cabb88a79d907b46e4d330c6a,2023-11-03T18:02:02.433000
@ -233765,7 +233765,7 @@ CVE-2023-45162,0,0,9c680a1575cb70c8538ecd1d5918efb41f21ed490aef5e184babc8e2fd8e0
CVE-2023-45163,0,0,2ec6cd3dc9cf0f531f432ea3be4e54b5a409cdb3500106a8471383465f57f3fe,2023-11-21T18:15:08.543000
CVE-2023-45165,0,0,4fdb9b80923feed65143bdf1c9ee9ba277c4339f142333eb4fad2caa4c4e7593,2023-12-29T05:54:59.177000
CVE-2023-45166,0,0,6f9b228eee7d5aa51c16c459d9e93450b3f6829caf90bf06fcbc2c4c3e01c972,2023-12-19T02:19:16.323000
CVE-2023-45167,0,0,865aef81082afc34fa02161a4589d9e67ff1de5b7f0c8601f2a70ffb726dd3cf,2023-11-16T19:15:25.573000
CVE-2023-45167,0,1,2032728e037a8ae9e4dfab10a703c6b206ae43090f8a4324f98a5789bf66f3ec,2024-09-03T18:35:04.040000
CVE-2023-45168,0,0,c4cd2d6b1328fd03ef244d75623f3c9f75b2f00ba203e342cef61b0bf83e8852,2023-12-06T18:58:31.920000
CVE-2023-45169,0,0,d8a6de384e4221c2a4a8e9a24e129aac664abcdbff5ecc9038dc84e4d6d33565,2024-01-16T21:23:19.303000
CVE-2023-4517,0,0,8906d4181dd8649eb496d0ff364adad537c1af5b7515ca17a4f195b856313118,2023-10-17T16:10:09.867000
@ -233865,7 +233865,7 @@ CVE-2023-45280,0,0,587e5e1ce24b098e3665aa207a0ea7ded3e3371b3bf4c75269401122fcd38
CVE-2023-45281,0,0,cd0978c74ba2a3ae2f0cd409990a0511bfb93e86139e2ad7fb10f6ba5d1be143,2023-10-25T14:47:01.093000
CVE-2023-45282,0,0,6ed2c2cc801c83a19d22a9f4cb86f11cebdf6066eee12a34876ad1251c661720,2023-11-02T01:23:35.490000
CVE-2023-45283,0,0,cd5d279d60eb7cff2b94547ec8e6d00135f36cff01f6563cfb3f789184507d96,2023-12-14T10:15:07.947000
CVE-2023-45284,0,0,296a8e74a018b740721ec9a08fbed9da9cca9f8197890454d7b831817e9fc7d6,2023-11-17T16:39:27.450000
CVE-2023-45284,0,1,73d119dc77c426359595c7c8f0829890e7bf623858b010da63a96abc58828085,2024-09-03T19:35:05.593000
CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a300d,2024-01-20T04:15:08.013000
CVE-2023-45286,0,0,d44939332093de0621571dd50fbbf72433dd32913bd42846a1498c4ee2848685,2024-01-04T19:15:08.737000
CVE-2023-45287,0,0,d2da2c58b3609253e3286b1b93fa0d97abe9bcd02db4f7cc4811b975b121f7c4,2024-01-12T14:15:48.310000
@ -234002,7 +234002,7 @@ CVE-2023-45556,0,0,db85ed98aeb416cea9488882d45fed885a8812d949c883fc9c4f62e114ac2
CVE-2023-45558,0,0,d6708e681a02b48a0789b7c9d32fbd2a11333c3cfe882523b9ab3d88137cba62,2023-11-17T16:16:58.577000
CVE-2023-45559,0,0,720f8b84c0f7c56dc9144358c5610b670d7113ae5edca03b6ed0b37249523ad6,2024-01-10T14:31:19.180000
CVE-2023-4556,0,0,5748749c8f599409eef990839edc42760a57148e868c649fa3a4cccdfc0802a0,2024-05-17T02:31:39.290000
CVE-2023-45560,0,1,df7c39ec288278203e2f002c283cfce071944984c49c0d6b60874c92f1430d3e,2024-09-03T16:35:02.247000
CVE-2023-45560,0,0,df7c39ec288278203e2f002c283cfce071944984c49c0d6b60874c92f1430d3e,2024-09-03T16:35:02.247000
CVE-2023-45561,0,0,0d0d372219ce69780a8216cca3f10434818ded1d45225f97d1b5059604c443c0,2024-01-08T19:32:10.703000
CVE-2023-4557,0,0,c682f8e4cb27add8ecc058eea7cc020afa90b141a50536741e3282b5edbb2ad8,2024-05-17T02:31:39.397000
CVE-2023-45572,0,0,9b6409a61d21cb9278322e7d00148b13379cd12429eaac8256cf576a20169172,2024-02-20T21:16:22.087000
@ -235386,7 +235386,7 @@ CVE-2023-47373,0,0,cda1e4e15d83f26b4fce6ff8231d6eea3e8308c2435831cd2070a7da1d31d
CVE-2023-47379,0,0,1aec4ee6764d65d3c988c851e88f5069da5bd36b1cb0e4532b604d5894479238,2023-11-15T20:12:54.297000
CVE-2023-4738,0,0,6abeb04a69b804afc44b4202944aa2be3ce2ddf99d2684401ef9ab8a1fe3df99,2024-02-01T16:16:44.740000
CVE-2023-47380,0,0,01f205c3ec26967cc7a7e2481e73ba781e302cc4db36594b8dfee4c61d179e15,2023-12-01T03:47:35.237000
CVE-2023-47384,0,0,80257a9d9f854140b8c11a6271f8ebae1616f2ae93aa4cf598179d59bdadfdf9,2023-11-21T19:58:59.553000
CVE-2023-47384,0,1,f53877456ef98dcd66880bc9c5a1e668557e8211c704f37b483df002f3e72c1e,2024-09-03T18:35:05.747000
CVE-2023-4739,0,0,8851a68677861bec2b126daf75f53ab3e185ad3fb3a686a7030f9ac4276c4b04,2024-05-17T02:31:45.320000
CVE-2023-47390,0,0,5322fa306207ec35d8a46e7de27b115b3db41955e4e039012f9d154cf8568383,2023-11-17T21:40:14.553000
CVE-2023-47392,0,0,26ac41735ed28fbcc150c48595dbf9fc5abb546c9bfe683e1b0ead875fd6abbd,2024-08-29T20:35:27.427000
@ -235785,9 +235785,9 @@ CVE-2023-48053,0,0,7ec37396133ed7de03fa459f52f6097f430a3ce32b93058cad45305b88f0f
CVE-2023-48054,0,0,12620e1b4db7763e3da8696511c7c7e82e9b979089e3eabc8b343308cc2f07fe,2023-11-22T00:07:20.520000
CVE-2023-48055,0,0,cc9dcb360f502f61075ff20bdfefe47ca6c0d0de5f56b135a3b6569c143e732a,2023-11-22T18:24:27.087000
CVE-2023-48056,0,0,fe6114272a3c54e063b5388803e03861eade9425a11a38623d660b07560034ba,2023-11-22T18:24:16.740000
CVE-2023-48058,0,0,5985c18602ad2b555b91533d15426eea053d74c22bcaaa0c9ab71b7e746799d2,2023-11-16T17:34:52.187000
CVE-2023-48058,0,1,66a3f1c862eb603d80fc54e7a1e65fd7bae1169a45a4ed88a0a8ad90c45dfdf8,2024-09-03T19:35:06.833000
CVE-2023-4806,0,0,2685e58a5764c5bf1daaca3b07c5ebfffafb62401c0066519d32269bcd1cae48,2024-01-25T14:15:26.360000
CVE-2023-48060,0,0,e6c127144a812f85454ba28504cbe75b4613f3cf0939a0d68422bd9aa4dc8e15,2023-11-16T17:35:04.087000
CVE-2023-48060,0,1,fea1d282cced2562e6c31897934f5482f80df5de60fcee98c3efce46bed4f5cd,2024-09-03T19:35:07.643000
CVE-2023-48063,0,0,ea9189f47de248a9b67965af3b522898bbda97ce156221191808cdec464e23d4,2023-11-16T17:35:21.507000
CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09c13,2023-11-16T17:35:37.623000
CVE-2023-4807,0,0,e5b936a23ade66145c3fbb6cbefd83803816607bf8eb550b768975f024d1305a,2023-09-21T17:15:24.233000
@ -236733,7 +236733,7 @@ CVE-2023-4923,0,0,ce7fc500dde57469ac63f0d59e3b430b03bd8f45530b68eebb245625ccf8cf
CVE-2023-49230,0,0,4ac429fff5dad6e7c2619e17899b81d72294b4ca67a40312f774f6a762a4a586,2024-01-04T17:17:22.257000
CVE-2023-49231,0,0,c62fd1865f2eec72e7e6740f19af9d0cb475298622080bf6c81c19f47c897674,2024-08-27T19:35:08.170000
CVE-2023-49232,0,0,9ca3b1a982e1c7a2ec1772835ea21cbd9593765c02546da72550a094ad870e5e,2024-08-01T13:45:09.797000
CVE-2023-49233,1,1,b8871d85d8cfe318194f49ff7d4b394ec2bcc0803f44dfaabffd4f7a1520435a,2024-09-03T17:15:14.400000
CVE-2023-49233,0,1,2e130d2c980caae3bf40de63030574ce330b6edff6713c81b9bccb3d4e623d38,2024-09-03T19:40:46.783000
CVE-2023-49234,0,0,42b8e485b1c2a4cac6ef6d6ad94acb217368faece94ca890be93bbb463698a19,2024-04-05T17:15:07.690000
CVE-2023-49235,0,0,251e067594908fcdc9ea0af907df30c24f21af889b96692ba9e2877adfcb0e54,2024-01-12T19:51:24.593000
CVE-2023-49236,0,0,043e2d596773c1427321050092baafadbd74f95bf10543e717d7f7b30af8f0a7,2024-01-12T20:39:27.197000
@ -237316,7 +237316,7 @@ CVE-2023-5012,0,0,cc6b17889699d89afa9974863a8fa3d641d17e5c4ed13ad8d9d87523a80516
CVE-2023-50120,0,0,a0048914c501d3b30ef6d95d580e483b46f28ea55ef806ed5f695b803f715459,2024-01-18T17:18:05.327000
CVE-2023-50121,0,0,6977dae472ab17b7dd7b318a6578effe58002d82624512798beb33ccb3a64bb7,2024-01-12T18:47:56.143000
CVE-2023-50123,0,0,77f556a56634a71e12af296beaee07922e7cce417dad451881dd404e1e10de9e,2024-01-19T15:10:06.827000
CVE-2023-50124,0,0,5e91b5d714cc8d6172a3d6e5e2d92e50ae1aa81c97d14d919c7dc6443e2eb357,2024-01-19T14:42:04.497000
CVE-2023-50124,0,1,e3bbcab3533bf8a1b10ced859399675c101bb190b06004d3105691e24c62e35b,2024-09-03T19:35:08.537000
CVE-2023-50125,0,0,464bf8d9ef4a6bdc55a67c9e3bf419a70ceb0201a26d328aae7bde66c83a57ff,2024-01-19T15:32:56.977000
CVE-2023-50126,0,0,b54bf68e65ede75fbcef7411e1b0eef3f487f5aad8b1b823fdcb2f5426f2cd25,2024-01-19T14:33:53.067000
CVE-2023-50127,0,0,cbe7b5b587d374c958dafad2ac56ad946c76785410982b4d771312bc50878719,2024-01-18T20:21:22.963000
@ -240004,7 +240004,7 @@ CVE-2023-5988,0,0,e8870fe285335fc9ce27fd61b5356b88284d0d9de295811057ae9832cb67e1
CVE-2023-5989,0,0,f8509da0ba0d97be9b7e7d1f7b5f79dd1d2578aa08df6f41d5225f6bb32f42c1,2024-01-04T14:40:49.677000
CVE-2023-5990,0,0,15ce5aec00c7b53e458575c1bf06462b3643079b31aca67ca329b5e17aebb001,2023-12-08T14:32:27.447000
CVE-2023-5991,0,0,53ad6ba66617388676db7532ed8835e282a5dd8dfff15947bac31665750497dd,2024-01-02T20:49:50.667000
CVE-2023-5992,0,1,42591a947f24e572e31b88a1db5a60b5564db5e1b2ac1c3acbfe08f65a33df6e,2024-09-03T17:15:14.487000
CVE-2023-5992,0,0,42591a947f24e572e31b88a1db5a60b5564db5e1b2ac1c3acbfe08f65a33df6e,2024-09-03T17:15:14.487000
CVE-2023-5993,0,0,e89bca2c7b548c3aac923b412136cfbbc334d9d5a4c9f1dbaa71ffb351f185cc,2024-02-27T14:19:41.650000
CVE-2023-5995,0,0,49ebc12e173e36ba429d419d7bb5a81e25257494b22e8bb07655f1b6b93c344b,2023-12-06T18:52:42.327000
CVE-2023-5996,0,0,a39512b4e26586438bfe4d642c83b3e78017d2d0d5d7007b3e44874f38592e9c,2024-01-31T17:15:22.350000
@ -246081,7 +246081,7 @@ CVE-2024-24787,0,0,d01b1be209abf6a135a8c9ff38f241150f7e8624b3b2cb4fb60d5dab36912
CVE-2024-24788,0,0,50cca427c738d8b849be7f4d8278b66e2ec62c8bbcec404a7069521daaae7bf3,2024-06-14T13:15:50.670000
CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000
CVE-2024-2479,0,0,cb8d87b601d3415108e34edcc0a0f20a1a33c04cebcd204ba7867f3afc9f8e4e,2024-05-17T02:38:14.640000
CVE-2024-24790,0,0,af83ae6b0946a22f5ed087cd11baba620114297a30c56195a078e322298023bd,2024-06-18T17:59:12.547000
CVE-2024-24790,0,1,40e64c7b168c7e144a991720d8feb3de39d1142cc802b1d1c2ed9288c202a88b,2024-09-03T18:35:07.483000
CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73f89,2024-07-08T14:17:39.083000
CVE-2024-24792,0,0,fc8d65092f6cca5efb8fd01d1ad855c18addacabc045b62e3e589a869025923e,2024-08-01T13:47:30.627000
CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000
@ -248333,7 +248333,7 @@ CVE-2024-27718,0,0,beb42594b734cb0048140d2e82ce6fc0ea6e9f180fe4b67058b308a104f4f
CVE-2024-27719,0,0,fe8b836b0fe7e61cc41cd2c649b06140ddc642945672fc471d8dbd746e0bc2f0,2024-08-27T19:35:19.763000
CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c74d,2024-05-20T13:00:34.807000
CVE-2024-27728,0,0,60809830dda72755597fa9fd74cfe701dd5e424bcaf4e985376fe34c8dec441f,2024-08-20T14:35:06.747000
CVE-2024-27729,0,0,ebfc21812e929fc7a4596a0d8e7f868174feb579c24c8114e70bb1b1da144d44,2024-08-19T13:00:23.117000
CVE-2024-27729,0,1,d1492c51fda05770345f2ce2e1508f8053d02a9a73adc923b5df8f5cf5b590e6,2024-09-03T18:35:07.920000
CVE-2024-2773,0,0,33c85832b0bc105a89445abc4897cecb571d3be80bbcd7cdf96b1db070b9a733,2024-05-17T02:38:29.487000
CVE-2024-27730,0,0,82b96d0d6f0f9b69196bf99ad3fe2d0ba16b7f0a2b1ba49b6b00d0024d7b68bc,2024-08-19T13:00:23.117000
CVE-2024-27731,0,0,39540f54488b2cd9d6b926f43bbb09e055458695dd05a9252673e688d8667c7e,2024-08-19T13:00:23.117000
@ -252485,7 +252485,7 @@ CVE-2024-33768,0,0,b1c48e63fb04c842ea9858e17e5e39e3ff9e03db9d53c98333b940714f472
CVE-2024-3377,0,0,1510516d64045a935995422c6fdaee7a2e23965b26ec5e4515131d4dcc176720,2024-05-17T02:39:53.543000
CVE-2024-33771,0,0,de5d2b98d044b2716ef74c05bc54a011b73685f9a10e074c8f5b2d8fa561dceb,2024-08-08T19:35:19.960000
CVE-2024-33772,0,0,f0b993d69416991d779357f1c269614dbca746050b50a37f5428d607eb22cb25,2024-07-03T01:58:42.817000
CVE-2024-33773,0,0,c7722b551c6505584361864d25c2fc2534d918de5122176041a5bccbc9806e89,2024-05-14T16:12:23.490000
CVE-2024-33773,0,1,b68e4febd1be5ec4f91df7fa5f28d779b0ea17026f88ecba55746c94ee35ee34,2024-09-03T19:35:11.330000
CVE-2024-33774,0,0,6f292020d7adae9637fe533dad1837a596af7348622d3ee140dd37eaf1c8cffe,2024-08-20T19:35:03.870000
CVE-2024-33775,0,0,7ea36af513c1579a89db448065ac36bc3c10f0e65b879ce7520d408ffbf766c8,2024-07-03T01:58:43.587000
CVE-2024-3378,0,0,8befaa6be8f3b8c8430cad46a1e49c322e7c667fd428df502463d5be35761acf,2024-06-06T19:43:40.377000
@ -252564,11 +252564,11 @@ CVE-2024-33880,0,0,bcb151ac36e10d12c5d5d00d4ca8fc6bf0944d42e8b79463d3142d311e312
CVE-2024-33881,0,0,e4d10f61fc565fc8bb5fef52d9f0697958357e8d77d4357eec47a5d0b1ff7b9d,2024-07-03T01:59:07.727000
CVE-2024-33883,0,0,17dc0e905e19f7ba35c55f2bf6a3e6826331627411f3c0ad10d5ffc69e46f693,2024-08-01T13:52:11.050000
CVE-2024-33891,0,0,1989e665b70cca966ca59362172b98f189cf8e652408c4337ef1f2abce15995f,2024-07-03T01:59:08.507000
CVE-2024-33892,0,0,189463f5e7e1fcc5e379cdcec3aefd3aae7806780e4de5a419e93d582d98828a,2024-08-12T16:15:14.720000
CVE-2024-33893,0,0,902aa9dc4b0ad003daa325fa26889b8d8f7f9f59dc293c25a22d686159cf27f5,2024-08-12T16:15:14.830000
CVE-2024-33892,0,1,13c12d3664e3054f13810a03bd12f2139d46feac6c1a8ac65e5f95255e3aa312,2024-09-03T19:18:42.870000
CVE-2024-33893,0,1,9523a63f2160daa4396893e9738a838b95fb9bca89b2f42f5488b776825034c3,2024-09-03T19:02:35.070000
CVE-2024-33894,0,0,2185bbeec74aacc0192ac4c0f14cc0154df27885b0566a150aabe2fcb3f08630,2024-08-12T16:15:14.917000
CVE-2024-33895,0,0,beca9895974ff19a7b4105e1a15064a0a2f0cded488095072a7e89d76a867d1a,2024-08-12T16:15:15.007000
CVE-2024-33896,0,0,b92e2b9e6fde660d20dc6a8719f4518b562cf4907b8ce3bf4482dce33af0a466,2024-08-12T16:15:15.090000
CVE-2024-33895,0,1,04ba0b007ee4b02eaf9ac803d97de9384b439a729983817e69ee63aaf5768dba,2024-09-03T19:02:31.517000
CVE-2024-33896,0,1,8d1d8374b6336dd7da119946080ba4c57ec39623b8d4b7ec76ee16ffac44a26f,2024-09-03T19:02:37.870000
CVE-2024-33897,0,0,5f29caf40c34fce30a3d5fc99dcad4918a565b17d95f7f797317cd61579a00f5,2024-08-12T16:15:15.177000
CVE-2024-33898,0,0,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363225,2024-08-01T13:52:11.823000
CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000
@ -252841,7 +252841,7 @@ CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe803144809139
CVE-2024-34221,0,0,b1a1df4238383ced5339c3a2ec6ba475623284464666a2d2287a54d486b49638,2024-07-03T01:59:41.290000
CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000
CVE-2024-34223,0,0,e20a175c7dfda07a23d9be727c891b1d9b5fe04956f12c400e7a65f5770b7fda,2024-05-14T16:12:23.490000
CVE-2024-34224,0,0,f4b792085c33fe751ba37a69e3ef609b6c4267fa901657944ebf702e373cd8dc,2024-05-14T16:12:23.490000
CVE-2024-34224,0,1,bc6821e7a1a1197e8806ef37396dfb61f1b6fcbd255743a94622a514f32eb2a4,2024-09-03T19:35:12.227000
CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000
CVE-2024-34226,0,0,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000
CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000
@ -255628,7 +255628,7 @@ CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d0
CVE-2024-38381,0,0,ee33917db8774af9612c5adf177e6b2737bf00c90dedbbd650da44274e8d8882,2024-07-15T07:15:07.803000
CVE-2024-38382,0,0,3919dacb5e73c6be5ccd3007a5a8da0df1d9f75f4778e95ad3c0cd3b2e76ba9e,2024-09-03T12:59:02.453000
CVE-2024-38384,0,0,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000
CVE-2024-38385,0,1,ad39ce50ee10d7c4352abf70f77a4305b91c93b47f7bafc6237b8077dda885d1,2024-09-03T17:59:27.440000
CVE-2024-38385,0,0,ad39ce50ee10d7c4352abf70f77a4305b91c93b47f7bafc6237b8077dda885d1,2024-09-03T17:59:27.440000
CVE-2024-38386,0,0,fc460a6e3c0a24bed380a1dc8c133e1fa8ff78082345d759f996f921c6748798,2024-09-03T12:59:02.453000
CVE-2024-38388,0,0,59d748481b79bef641da29fa14283366526c194312c93d8df5bfc773a451913c,2024-06-21T11:22:01.687000
CVE-2024-3839,0,0,7c6a8e24e8992e3cadc889bd78886524b88f88c58f4f3536293ab700e2d6e3b8,2024-07-03T02:06:38.637000
@ -255666,6 +255666,7 @@ CVE-2024-38449,0,0,8da6f80ac88bb7ae3e1140e6ee8382a2d6cd1d0a7f86d02f23b41c1048f2d
CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000
CVE-2024-38453,0,0,08958525d96155b2873daad7721dd5cb57bde45d4e8e94a2b3e4a3f3b7e8c89f,2024-07-09T16:22:44.900000
CVE-2024-38454,0,0,72d14562f500903ed20ecf4e44aff777a96cc5f26825831fa62629cb8dc6e476,2024-07-26T14:11:13.043000
CVE-2024-38456,1,1,1b9fc43ec0dd3fb4a99002253870cd7dfa854df82800b27c29dab4a5273dbe01,2024-09-03T19:40:46.783000
CVE-2024-38457,0,0,ac67632609b8fd7c3fbda3f9db3be7abc7196581c8bf10f0e9bce6b0ade96067,2024-08-01T13:54:51.367000
CVE-2024-38458,0,0,28915f52712031b6bb83554d3c73faadc4da0723052fb8d5b29167854742690d,2024-08-20T17:35:10.187000
CVE-2024-38459,0,0,4ef78a4d5c93482a3188b8be60d5fc2896531e30b015b11c8a864501b9d2680f,2024-07-03T02:05:04.377000
@ -255856,7 +255857,7 @@ CVE-2024-3865,0,0,d6f5dd3766d85f1a043ebf5d3172442b73d2c19e5b446b7220941e0632bb3f
CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000
CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
CVE-2024-38661,0,0,b032ab35a3535059aadbe94298691231b9c402b611efa81b633478c3528450c0,2024-06-25T18:50:42.040000
CVE-2024-38661,0,1,b3548dc9d015869558d5e6ce591bb61c7302091308e2952841787fdc0fd16368,2024-09-03T18:03:36.033000
CVE-2024-38662,0,0,587269b0aade9b66f2b27453b59929a1dd57dcfa88975eb87dd718f6e7386b22,2024-06-24T18:34:17.547000
CVE-2024-38663,0,0,76edf2df49fecd967d78d8fa91a81453e6903492924f9f2a65b88c7cc552bf4f,2024-06-24T19:26:47.037000
CVE-2024-38664,0,0,418ee48bd44d13024e4f172458676dafa0328cf20a417e7f77e8ce1f228430db,2024-06-26T13:52:23.033000
@ -255976,7 +255977,7 @@ CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38858,0,0,2f858b37341b9cd82cec2df6dc84acb547b815109da6bbf39427e4186c1a6ff3,2024-09-03T12:59:02.453000
CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000
CVE-2024-3886,0,0,c9781270684dfecde05d4dd03c06ac2c50e99ad99e90851ac263b22a77ac880f,2024-09-03T12:59:02.453000
CVE-2024-3886,0,1,637917caac7fdeed5913d854d310583d9de4da2bf7f910a461c6efc8f1bacf15,2024-09-03T18:48:14.927000
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
CVE-2024-38868,0,0,20a1c9841ff14ff70d00fe853dbcc813a462591f801cc93dbb4fe7d6525275ca,2024-09-03T12:59:02.453000
CVE-2024-38869,0,0,c0f887639cd5f8290b163362347e9df211e2de0bfae6dfee57ed54004469d16e,2024-08-30T18:15:07.150000
@ -256166,7 +256167,7 @@ CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e0
CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000
CVE-2024-3930,0,0,54b8e4aa07087aa149fa9bad599c7a18dec56c1b93dd2d2499327bc3c7940bbd,2024-07-31T12:57:02.300000
CVE-2024-39300,0,0,06c907e887f3a9a49c8c034a570476f82ab0d4832c162f4aa9ed409176b9d3d3,2024-09-03T14:57:54.137000
CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000
CVE-2024-39301,0,1,05ede2147c0414ce0c80c5aedca5b458241dd00889546d94391bc82da8555dc6,2024-09-03T18:06:28.743000
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
CVE-2024-39303,0,0,e1d113aa825245b6d1e52862ebbf0ca8379af72327c1818fa556c736e7b07e25,2024-08-21T15:54:35.650000
CVE-2024-39304,0,0,b5f772f01b3427664c53f2fa0501efa536f799b20c5d68d0936fe6db6ed2d717,2024-07-29T14:12:08.783000
@ -256278,18 +256279,18 @@ CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc
CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000
CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000
CVE-2024-39460,0,0,4f78962312c460642ba8951e77b013301d272c348dd713c542bd0b2b628a69cf,2024-06-27T12:47:19.847000
CVE-2024-39461,0,0,cecb9bb9a4945e2f0e4a10c8862685b90a08a104cc3bac781d0de62df1e3d355,2024-06-25T18:50:42.040000
CVE-2024-39461,0,1,bf1816ecd185e36f42cd6844b143d10650e3a0c645cde3f5c825da5e93746f58,2024-09-03T18:12:22.633000
CVE-2024-39462,0,0,d6fa49df9f42ed202e5a3cc2f250dce01e83d58a2dd9514f13116e83ffa785aa,2024-07-03T02:05:49.283000
CVE-2024-39463,0,0,713b50bfe2837ba8a6b7f130ffd09bd30c780ec37cdb812163048776185cb1be,2024-08-19T21:01:55.557000
CVE-2024-39464,0,0,1645ce9c2dd695016de0c94e603fefd07a2e7caabc24d8ebfab3af1a26f6b184,2024-08-19T21:02:16.113000
CVE-2024-39465,0,0,b6ba07e557ee2621a86675b0febc6290289dae6bc23b121747f5f8e006230695,2024-08-19T21:04:27.467000
CVE-2024-39466,0,0,4ace459e94329b49137143c03c0ecc682c63ce5f8628b924663a1f0d72bdb734,2024-08-19T20:59:54.867000
CVE-2024-39467,0,0,24b2e918bb6f2bd61687825dd13d0cc0cecac046d19a687da10524a29da67531,2024-06-25T18:50:42.040000
CVE-2024-39468,0,0,ae6a017e6c367f752286f52d1aab45d1166b4dcdd4ca3930857e995f1f6e7677,2024-07-05T08:15:03.410000
CVE-2024-39468,0,1,fe65e5461a178671b63563fed452cd3d149a6d1ea9a2f482096f102a32ce8219,2024-09-03T18:14:51.117000
CVE-2024-39469,0,0,4f76bc2884fab99f2e647535e4f5ff6741622700979dba4d1d6ae85a7edb0f27,2024-07-05T08:15:03.467000
CVE-2024-3947,0,0,5ac97013084fcc39672b6ea95b043d5a77dd21abc36167b8c6988b355b186d2c,2024-05-30T13:15:41.297000
CVE-2024-39470,0,0,bacd3945ff873a25d6e7500de402ec7a7623e0c3a8a8e559c02c703a2cb142fc,2024-08-19T20:58:03.040000
CVE-2024-39471,0,0,89f000b418cb95dfd2a08e65629c84af8b993dbc826d3e812ee14f26f967887b,2024-06-25T18:50:42.040000
CVE-2024-39471,0,1,9d8fa05e51e1d625e09bf60c0276da56fc90de0e15a591ededbd50b323972684,2024-09-03T18:16:01.660000
CVE-2024-39472,0,0,88e3c5b4d425f11a9fb34fa56b701a01ea58f8b9e68aad9de5a6d814a13d9eb6,2024-08-19T05:15:06.543000
CVE-2024-39473,0,0,b24af8dffbe76f90c2262850990b3e2af991f249a99e7e85721ef205ffeb0fd3,2024-07-08T17:12:06.610000
CVE-2024-39474,0,0,a491eba0634050f6f37acc391f292160897c8af5129613d2334d2af2784daa7e,2024-07-08T17:11:56.177000
@ -256741,7 +256742,7 @@ CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcd
CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33
CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000
CVE-2024-40472,0,0,7d325ed778605ea62befe2fe23f0c336d0e6ecc42db2791564a81ce5488761f0,2024-08-15T13:25:05.657000
CVE-2024-40473,0,0,fae125d6208bbe8cec385e28019f920962566f6a2e33ffb0f8e49b21974c8449,2024-08-15T13:39:29.240000
CVE-2024-40473,0,1,05b96087c5a9fe5e093777523be442d4ad8d581754f0f27097948b56347b12ef,2024-09-03T19:35:13.383000
CVE-2024-40474,0,0,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829b18,2024-08-15T13:40:01.357000
CVE-2024-40475,0,0,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000
CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000
@ -257237,7 +257238,7 @@ CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
CVE-2024-41240,0,0,d3e33d561272d83576d26975ab2c3d7593213b6e30b5373619538759272a67a5,2024-08-13T15:35:13.190000
CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
CVE-2024-41241,0,1,bc10aae1d0c7fd20afd007314cc92399fc76bd43827bb6f9d631dff7290876ee,2024-09-03T19:35:14.190000
CVE-2024-41242,0,0,136c7b7d22b080b31a334ec64795d2be9a741e5bc601d37387485bacabb32da5,2024-08-08T15:21:56.590000
CVE-2024-41243,0,0,952dd949cd58ac35f0a1a9ee0037ce6943213f0d14c4ea16f43a084423f1a4c5,2024-08-08T15:19:38.640000
CVE-2024-41244,0,0,892fb6545cc28ccf50cd66c9f6ebdecb8c20baeba0848d57269be31999372da5,2024-08-08T15:20:24.533000
@ -257318,6 +257319,8 @@ CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb2
CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000
CVE-2024-4143,0,0,3e703fdfd0a07e589cb7985eb968c1c228e0bf41a25245c7c0c730d1481e87d2,2024-08-01T13:59:25.697000
CVE-2024-41432,0,0,8f4c9c137a73ce4492827c5d064849c429a9c8bcf4d56d4aa0a1d934e4b0578d,2024-08-08T15:02:52.647000
CVE-2024-41435,1,1,b44f33459c0d46f6ba6f988258f34a3a8021bbe3d1d02a80725880c11c119a2f,2024-09-03T19:40:46.783000
CVE-2024-41436,1,1,9e4876534ed421e264e6d8fe5b43e57a8803d90194cf75f0ee0c2a6c74e55693,2024-09-03T19:40:46.783000
CVE-2024-41437,0,0,fef9bc933390244a77d828781007c83a4899c964ddf0b6340d9dcc001af583ec,2024-08-23T02:07:29.513000
CVE-2024-41438,0,0,996a6cc02fa9447bba099c45bfb4b15a572a20ecb18cd6121c0e71f3f9fd5f1a,2024-08-01T13:58:40.670000
CVE-2024-41439,0,0,7b3c1664f9930e6509340f8cc42233a6bb9a46e8c57c131a2fcdb17cb5a1f1dc,2024-08-23T02:06:11.380000
@ -257435,7 +257438,7 @@ CVE-2024-41697,0,0,0540803de9a680c67310f1ae9b5e7c398a016eeccd46a222f00e008911dbb
CVE-2024-41698,0,0,44626727d5dcc01685c4add2e1a257537f9fb95333df311d84fbe8f994e63279,2024-08-20T15:44:20.567000
CVE-2024-41699,0,0,b59b81f7c7e454dc4b7e36e478993fab56e5c5855897af1d1b83794370bf6551,2024-08-20T15:44:20.567000
CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000
CVE-2024-41700,0,0,a7f9e7305f1d2e8075673e7b110cc5ea52c2a8fbb033df0ca15600a098e40c3d,2024-08-20T15:44:20.567000
CVE-2024-41700,0,1,7aa2a27b900bb08294b1d245c649acf058cd8fd4d113148ed5a31104a453bba9,2024-09-03T19:37:12.273000
CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000
CVE-2024-41702,0,0,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000
CVE-2024-41703,0,0,29901ab4cabc93049b48fd8098e657030eabcae692264b06be359724aef180d8,2024-08-23T21:35:07.573000
@ -257611,7 +257614,7 @@ CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b9079070
CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
CVE-2024-42005,0,0,a7f5615408f39d5455fecdacdea4974d1dedbdfa4135e3f25797c09478531f93,2024-08-07T20:48:00.083000
CVE-2024-42005,0,1,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000
CVE-2024-42006,0,0,cac16dcebbdfd7db60164c8c9c083b31913f86e474f6e93c1530c3119039cdca,2024-08-21T13:26:54.577000
CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000
CVE-2024-42008,0,0,54c5efe7cc13cbb13be4a33dc9811a7d441226bfd6f8fc26ec0019f7ccb6db29,2024-08-06T16:30:24.547000
@ -257864,7 +257867,7 @@ CVE-2024-42308,0,0,6d17eb1d30ed4c277ed040e1cbcd780b2faf7a8a39bdbdb95054b558731ed
CVE-2024-42309,0,0,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000
CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000
CVE-2024-42310,0,0,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25caf0,2024-08-22T16:01:46.263000
CVE-2024-42311,0,1,eb71587cbf92c585852c3f2bf1b53b5b14ac311404c1605c56f92f75f9539278,2024-09-03T17:38:24.210000
CVE-2024-42311,0,0,eb71587cbf92c585852c3f2bf1b53b5b14ac311404c1605c56f92f75f9539278,2024-09-03T17:38:24.210000
CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000
CVE-2024-42313,0,0,9c1d5c48d055f58f1d9db953b1d9df536df6f372c5b4c034423cf0ca1e8ccaa9,2024-08-22T16:01:59.467000
CVE-2024-42314,0,0,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000
@ -258015,7 +258018,7 @@ CVE-2024-42564,0,0,9221095140948579dd9be97bef335789b409d7edd1ec30ff0fce26ad8aad5
CVE-2024-42565,0,0,9f6b7c0014c65509d2d4abc5ba1e001f285093a2f06d33550336698e6b8fe8e4,2024-08-20T21:35:05.227000
CVE-2024-42566,0,0,98ae4d4c54aadbbb33d8445750ac45a5fb4d45d2ba72f710ffd19034073726bc,2024-08-21T13:47:05.013000
CVE-2024-42567,0,0,fa925fac4049dc81680b6b86d83a2403e69ca3e4e76faf0a9fa11845b2f9f031,2024-08-21T13:46:48.087000
CVE-2024-42568,0,0,6e34876cdb41f52a18fce2fc511397baae5d2ee6e14fed378e5f6f52ff4bd0ea,2024-08-21T13:46:29.497000
CVE-2024-42568,0,1,d91dc12709eff1532e9284d095e7e1ef97d6afce18657a0eb3bd95d416d93e8a,2024-09-03T18:35:11.160000
CVE-2024-42569,0,0,5026f067debe788e67d575992a3e55ef859cbe857db320c1377c114f0c0171d4,2024-08-20T16:35:27.333000
CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000
CVE-2024-42570,0,0,f4fb85a858f58c2f291542defe868101fdd651787665eab2245b6ac99f2a7d38,2024-08-21T13:46:00.837000
@ -258168,6 +258171,10 @@ CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bf
CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000
CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000
CVE-2024-42900,0,0,a581afacf971ea3c7e1f415a11d8d3e50a8cfeb83f82ad9071f65c9958d77bb9,2024-08-29T13:25:27.537000
CVE-2024-42901,1,1,7dacdc4e16b128e226d8724cc8388a6439f86e9530d858a1607a786607115b81,2024-09-03T19:40:46.783000
CVE-2024-42902,1,1,9ec33f56abfe4faabb7d9151ffea5254b69b33ec55994f59970b2e00b31fd2df,2024-09-03T19:40:46.783000
CVE-2024-42903,1,1,f8ec8d0a5ac73bcf3e6980f24f76b67bb3854cedda63f18407522c17dba84153,2024-09-03T19:40:46.783000
CVE-2024-42904,1,1,53fb99804779cbe86bb4482b4fae924f3c061640de033d1aa2634bf0cf1cab4d,2024-09-03T19:40:46.783000
CVE-2024-42905,0,0,ddc067821c332a4c26091e24326b09fd2b356b1e4a19dc86f0c28846472da9f5,2024-08-29T13:25:27.537000
CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000
CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000
@ -258180,15 +258187,15 @@ CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59
CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000
CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000
CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000
CVE-2024-42940,0,0,097785b0d8b1a2c5e9dc9f93304a2dd55a9659adb94f015efea3fb7466159ea6,2024-08-15T19:33:37.670000
CVE-2024-42941,0,0,4823e4e899032fc94bff489b9cbadb70ea6c991fd28db39b71d862913b0d21ef,2024-08-15T19:33:07.637000
CVE-2024-42940,0,1,460809cfcb551dcde52417163d4e7b810c2b7db0714b9f924b6035176c36051d,2024-09-03T19:35:15.163000
CVE-2024-42941,0,1,8ce54d238969d552867802791c81f341612243d1f64f9ec3fd8ed6c6d4e193fd,2024-09-03T19:35:15.967000
CVE-2024-42942,0,0,0d379d2b330ef368d2233a2c22bd7b9b2e9ba76c6efe50a78c36eca466e50821,2024-08-16T18:15:40.017000
CVE-2024-42943,0,0,65be748316e28c3e012b02c07cb2acdc9089785ab234cef5a5ac32b87966aa45,2024-08-16T18:35:13.570000
CVE-2024-42944,0,0,f6c484d3a149f0abfd628917712128d294643148c09cc797b6deeefa656227a8,2024-08-15T19:35:13.737000
CVE-2024-42945,0,0,527c2acfc2ac79e3ae4484bb113cde41f1a0c19bbf139705416ac7d653f09941,2024-08-16T18:15:36.950000
CVE-2024-42946,0,0,d0f7e8d7d1788119449618db3b1da4ffbfa720ab07647edae28d1ada00373d08,2024-08-16T17:35:08.227000
CVE-2024-42947,0,0,e7d01f7003d2f409e61d4e637f7500689fb65c07673a6b4b02e4e7886d96fafe,2024-08-16T13:32:05.103000
CVE-2024-42948,0,0,2167f79bb14301e7998438c80225da1d9af3750f4b140d069a0f87d1b1360383,2024-08-15T19:31:38.217000
CVE-2024-42948,0,1,4727dd22a0403edbc3fcca21716cc1b2ada4ce207acf040c2c79859709e837d9,2024-09-03T18:35:12.773000
CVE-2024-42949,0,0,44c6441194e695d5a683578273dc6ba440e5cf17bcd806ba53209d34b464cf71,2024-08-16T18:15:30.507000
CVE-2024-4295,0,0,848d1af2676088d8bdb79c5f7e3bd4f81684dc40347bc492c56560372b53041d,2024-06-11T17:15:18.997000
CVE-2024-42950,0,0,eb11eb812b7cc23c3e2677512c793bb40fc92f136b1df58b0cc1f22b415bf06e,2024-08-21T17:35:04.793000
@ -258207,7 +258214,7 @@ CVE-2024-42973,0,0,ea510c6d08cc16bdb4d726fb68ca476e64ed97e5805f96a8d49cb53ef02d8
CVE-2024-42974,0,0,938719a5c39f954ba2ac313637062853a8371b455f4b682f3eb1a2aeb5004821,2024-08-16T18:11:47.980000
CVE-2024-42976,0,0,b55ce95834b0b84d45bcbcea47b22be13c2eeb921a6b297cd9c701de5bff705f,2024-08-16T17:35:09.687000
CVE-2024-42977,0,0,284c1cb74b11c8add0a4a2fd16aa0430e19948019ec5006358de30f607388a3a,2024-08-19T20:35:17.330000
CVE-2024-42978,0,0,b1f4d5128465b01f205b47353b8c0b280ab205530bf41f8f4bc128c131592e31,2024-08-16T13:30:54.670000
CVE-2024-42978,0,1,7f0bf0c687f04da83ed3192c78fe85643b350fb1ecb2a064e81c90dfb54e9756,2024-09-03T18:35:13.590000
CVE-2024-42979,0,0,8fe829910a5c801caddb18b0a08003433bde998168b919898eba6ac640ceb18a,2024-08-16T18:11:41.197000
CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000
CVE-2024-42980,0,0,7e801fbf565a01d89dabe5f7d87c75f44f68a5184d751fb7293ca24dd403d821,2024-08-16T18:35:15.747000
@ -258217,9 +258224,9 @@ CVE-2024-42983,0,0,c725dcbfb5bb576199cbbf3ee9c5a740bda0a1873727d4ce4b2ca1e69a43a
CVE-2024-42984,0,0,2fd3b2ae263fff500fb556980428a38b378e10c4993fb651d635c225d8b2007e,2024-08-16T18:10:53.680000
CVE-2024-42985,0,0,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000
CVE-2024-42986,0,0,0b2d204ff26f9eb28ce17ac6820e07d93d61424a006dadbf321ab643bf7229ed,2024-08-19T21:35:07.937000
CVE-2024-42987,0,0,be14eefacd9f282e13e394cb1aeefe62ea3c84389f7783546c46d3192df9881f,2024-08-16T13:26:27.123000
CVE-2024-42987,0,1,78d20dcc8dedb262666f57c924ed05a38397e8611300fdadb69763919f535881,2024-09-03T18:35:13.793000
CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000
CVE-2024-42991,1,1,4edb5a96c13b47031d1b0e0b2d74de2d9bffafbaa5d3081a778649ad0036cf72,2024-09-03T16:35:06.743000
CVE-2024-42991,0,1,d97d29613811bcdf88ecdfccb97b5b151211b69eda2b0841143da106c3926182,2024-09-03T19:40:46.783000
CVE-2024-42992,0,0,922ec86108ffde155b16bab8bce05d736126b3c84831d9a4ac12e72887280de3,2024-08-26T15:15:08.593000
CVE-2024-42994,0,0,46088bee324f9fb8a88606d17f14c9f666ebd59ae6a0d59deea5611547b28ba5,2024-08-19T13:00:23.117000
CVE-2024-42995,0,0,5fe3b52ce312f2adad41265b1d44f25534179e7b5138e6f382ca4cb8e97a4739,2024-08-19T13:00:23.117000
@ -258447,7 +258454,7 @@ CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3
CVE-2024-43381,0,0,a01674578db7c1648bbba4f532305ea57cf2109d65478c5f7b839cc278dc42fc,2024-08-19T13:00:23.117000
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000
CVE-2024-43396,0,0,72cb7f8de5e6cc0fddf41576db9b3a5c979441bdbeba09448d4bb5c685d81cca,2024-08-21T12:30:33.697000
CVE-2024-43396,0,1,d3e4db1d56053a512790a84d8c3ae6e21035877ac8c09fe39077f7231484b09e,2024-09-03T18:19:33.167000
CVE-2024-43397,0,0,5caa94926889523c153ff1aaf47669fe6c71771da877710063b3b97c2bc5d0dc,2024-08-26T18:28:42.230000
CVE-2024-43398,0,0,4d6e82045f81d26be52a0544b93b6b51c3a3ff0c00d0592d874e8bb80bdcc430,2024-08-23T16:18:28.547000
CVE-2024-43399,0,0,72972aa8210630cb7e9ed019395b1964574a7b9fdb0cdecaf47d033016a56fac,2024-08-20T16:21:22.747000
@ -258463,7 +258470,8 @@ CVE-2024-43409,0,0,a42b7406eee825ee22fc12b5886825141398e49597504678e6e46efb8ce72
CVE-2024-4341,0,0,c1be2299b8a85166f5701f470f8a0c3853c6b802dab3cad3703461b748b378a9,2024-08-30T15:44:26.727000
CVE-2024-43410,0,0,34c0de7d3aba2e2bf754c89b4a746899ed92baa2a863da3cba07091015a18558,2024-08-21T17:25:08.560000
CVE-2024-43411,0,0,17fae2b6c19a1c99d860c5f9c414f25b1a9d716a3875184bd3648e5d7c5063c5,2024-08-21T17:25:08.560000
CVE-2024-43412,1,1,8c4e1dbccd1de9460cafe6981d506bab83348c1ebd68f975624ba29cff54163a,2024-09-03T17:15:14.680000
CVE-2024-43412,0,1,813a1099bb9533a185d77877cc77ab41d88b24364f9ceed8819b5c32492baff2,2024-09-03T19:40:46.783000
CVE-2024-43413,1,1,d4eedb3f93b9f281936d112b8853232f3d6b5962ec3d27ce866c075648b941e7,2024-09-03T19:40:46.783000
CVE-2024-43414,0,0,480c6b9e5d15f4492b80d223686b068600d65271b741c851d7e1d6b64a6b2b74,2024-08-27T18:33:14.247000
CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000
CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000
@ -258528,6 +258536,7 @@ CVE-2024-43797,0,0,03970116fb7b7c3797102be1254e62f5745cf667f63b1b76b355e49508846
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
CVE-2024-43801,0,0,3057bc3523c59b7a2ce3a49766bca817655c19ea20647a6ae5a515942f4aa7c4,2024-09-03T12:59:02.453000
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
CVE-2024-43803,1,1,d39ec93af35560ca8e8a0de326d7fde6d56bf46a552a9709abae1dbb94d4c159,2024-09-03T19:40:46.783000
CVE-2024-43804,0,0,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000
CVE-2024-43805,0,0,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
@ -258539,15 +258548,15 @@ CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9
CVE-2024-43813,0,0,0eeebfc2e52232a1c410e398d59e84b3ed93d69c2f86a7c29afdb248f4d5f622,2024-08-23T15:35:12.617000
CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000
CVE-2024-43816,0,0,44d0571961b52b51ae89fc464c69e8f5e9bafc93420d249ab2ac48cf3e8eb3af,2024-08-19T12:59:59.177000
CVE-2024-43817,0,1,40ac22692ed786254f5ec48928bcf93ac877c29f85c735a88d69b269b19e064f,2024-09-03T17:41:46.407000
CVE-2024-43818,0,1,35c2bdbf6b44331bfad13ba292b1bcff385bce9bcaa39838af608c0ac2a399e6,2024-09-03T17:45:30
CVE-2024-43819,0,1,c540ec24ae72694a69ea632607cf72344d3776889a3cd4d93490f0cee277e9c2,2024-09-03T17:47:10.540000
CVE-2024-43817,0,0,40ac22692ed786254f5ec48928bcf93ac877c29f85c735a88d69b269b19e064f,2024-09-03T17:41:46.407000
CVE-2024-43818,0,0,35c2bdbf6b44331bfad13ba292b1bcff385bce9bcaa39838af608c0ac2a399e6,2024-09-03T17:45:30
CVE-2024-43819,0,0,c540ec24ae72694a69ea632607cf72344d3776889a3cd4d93490f0cee277e9c2,2024-09-03T17:47:10.540000
CVE-2024-4382,0,0,f0af8887b52c70037c2b23db1dd5fba9df47b870975ecf7200df960162cfbaf4,2024-07-17T02:56:01.750000
CVE-2024-43820,0,0,e42a9e25f8870accab8ab9292be15932a2243b27a055b186da94f91a1ed606d5,2024-08-19T12:59:59.177000
CVE-2024-43821,0,1,6b0e9cb35a5b6e032d8dc153d9b81ba7d6475c202a42151c153b72b7503122ed,2024-09-03T17:49:54.280000
CVE-2024-43822,0,1,4b30c97c59fde25edad2ddef4aadc560c3590e445036e23d418a5d9b0009bfe3,2024-09-03T17:49:33.007000
CVE-2024-43823,0,1,415804e4f8eed1337d29cbbb761efe6861f75ea20f4e23a3083e452f5f4746c1,2024-09-03T17:49:03.910000
CVE-2024-43824,0,1,96ac4b3d40968a435b003b39f652f4b72c5c89619f936eca147dfa5683737ac9,2024-09-03T17:48:39.160000
CVE-2024-43821,0,0,6b0e9cb35a5b6e032d8dc153d9b81ba7d6475c202a42151c153b72b7503122ed,2024-09-03T17:49:54.280000
CVE-2024-43822,0,0,4b30c97c59fde25edad2ddef4aadc560c3590e445036e23d418a5d9b0009bfe3,2024-09-03T17:49:33.007000
CVE-2024-43823,0,0,415804e4f8eed1337d29cbbb761efe6861f75ea20f4e23a3083e452f5f4746c1,2024-09-03T17:49:03.910000
CVE-2024-43824,0,0,96ac4b3d40968a435b003b39f652f4b72c5c89619f936eca147dfa5683737ac9,2024-09-03T17:48:39.160000
CVE-2024-43825,0,0,130af7d96288110e02aee1e7600bdbf8c5cd66dfe2f98ab074c672e68f4722cd,2024-08-19T12:59:59.177000
CVE-2024-43826,0,0,a71e01ef1f7bf0e81ff2e96aa2e3536879a0a625a8e0f17873ad3f06283b51ad,2024-08-19T12:59:59.177000
CVE-2024-43827,0,0,cf65368434e7a2b682a9d717038e50932b650d5aee79f4ae380ff9863f20dec9,2024-08-19T12:59:59.177000
@ -258683,7 +258692,7 @@ CVE-2024-43958,0,0,3f3bf4212bc2e74c074c138fa03eac2a971b658d4caf8d2e0f7172d721ab1
CVE-2024-43960,0,0,980e57c6c61444ba89ee403d9dc5147321c211af37703070f5947ad7256ca9de,2024-08-30T16:12:24.113000
CVE-2024-43961,0,0,fc0c25e77def1081886110717c1745e96221babc8d9d376dd02221e26610d343,2024-08-30T13:00:05.390000
CVE-2024-43963,0,0,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26fb3,2024-08-30T16:10:16.647000
CVE-2024-43964,0,0,bc32f4a153e6dcf4e86584279d8891537ac8aafde77ba6c4ee6c0bc4b7914cd2,2024-08-30T13:00:05.390000
CVE-2024-43964,0,1,a296e79bf666a02822318fa0afa97e1b25cabc20d3cd08936c2b6152e8d8f9a3,2024-09-03T18:30:23.437000
CVE-2024-43965,0,0,08b6ad4a1a4b1ffdd93dbbd7fa720075997c0aeeaa32e6ecff18f58a8c42dd84,2024-08-30T13:00:05.390000
CVE-2024-43966,0,0,cd3d16dd9709908a4a64e6a13b6fef840bd6c4e6049b114619dc3ea375d7306a,2024-08-26T15:15:23.727000
CVE-2024-43967,0,0,dd198820d01657feb4461b4126ff9f2ed88f09f4d5c22ed753dc2e0d9ac5168d,2024-08-26T19:10:09.607000
@ -258780,18 +258789,18 @@ CVE-2024-44684,0,0,4cb0a872cb69ba898ae81494ba96c9916273701b152177e4d724930be877a
CVE-2024-4469,0,0,8f4eafe1629cfec30e07bc480cd9bd60074526e695dc3e7699a9034cc841795d,2024-05-31T13:01:46.727000
CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037c4,2024-05-21T12:37:59.687000
CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000
CVE-2024-44716,0,0,02e3d7babc62c8f42dbca2c8825df8517009101b3d1d6afa8e0e3e2356687be3,2024-08-30T13:00:05.390000
CVE-2024-44717,0,0,dee9b73c7e1050c45e1039cf251f198a0d3363f43b50bb034142fe420de59848,2024-08-30T13:00:05.390000
CVE-2024-44716,0,1,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000
CVE-2024-44717,0,1,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
CVE-2024-44776,0,0,28ae5db6f882f425142c0c1059cbd5a1c8ad65f7a4cfef3ef61dc0e39bea3c2e,2024-08-30T13:00:05.390000
CVE-2024-44777,0,0,cde3cdcf6f920db7b620a51993a8b22bac61a970df2497f8ed04c8a930b1d684,2024-08-30T13:00:05.390000
CVE-2024-44778,0,0,b9a70f6baf6650c2b46a06a0e800c00e23e3974e584b00056b1edabec019ca8a,2024-08-30T13:00:05.390000
CVE-2024-44779,0,0,d8dca58f9573a9e3148ac3bd2a234855a27b46badb233b8d9f53c3bb1a39ecbc,2024-08-30T13:00:05.390000
CVE-2024-44776,0,1,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000
CVE-2024-44777,0,1,6a3359ab703fdb561391b6cc1409dea8918b62f00651402e3928cb656c93cf1a,2024-09-03T18:33:38.413000
CVE-2024-44778,0,1,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d1d1,2024-09-03T18:34:36.987000
CVE-2024-44779,0,1,8defc64818470b86a1ed4aeff7b1d178fe09f0b4135b6d31847cdbae6f118693,2024-09-03T18:33:51.297000
CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
CVE-2024-44793,0,0,2168e0c02c7a858cbaff9cee44bb5e6a195abfb08b3b31876bea7f6d43977fff,2024-08-27T13:02:05.683000
@ -258818,8 +258827,8 @@ CVE-2024-44916,0,0,268f2c861c0c259cfc6a8f5831922421cd3f20b464855cae3b767189bdeba
CVE-2024-44918,0,0,3a0c5f40de5f64cdd7c350975f1e36ef79f8fc6234af40bbc8a6ef2e7aab0507,2024-09-03T12:59:02.453000
CVE-2024-44919,0,0,4ce1b96ddb0a7c15b96ca851eaf197d01501859f99507e5fc4c267c2fc748b54,2024-08-30T16:15:09.720000
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
CVE-2024-44920,0,1,84638f3c3ee39bcd12288ad180ed29f9fae2d4198dab0d886510f94c084ef06d,2024-09-03T16:35:07.800000
CVE-2024-44921,0,1,06f254602a1eef462ffbe3a380ba0f268b83e51110a6f26504911783cb01b895,2024-09-03T17:35:01.983000
CVE-2024-44920,0,0,84638f3c3ee39bcd12288ad180ed29f9fae2d4198dab0d886510f94c084ef06d,2024-09-03T16:35:07.800000
CVE-2024-44921,0,0,06f254602a1eef462ffbe3a380ba0f268b83e51110a6f26504911783cb01b895,2024-09-03T17:35:01.983000
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
CVE-2024-44930,0,0,7742e471af6d813844c83bc1edc4d2c34bd92450c44640698d5e16549d2fbbfc,2024-08-30T13:00:05.390000
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
@ -258925,8 +258934,10 @@ CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2
CVE-2024-45304,0,0,1414ce8fe9746c46bc2063f6428cc45402e10f1afbb5a5e378e238c2ed3a1fbe,2024-09-03T12:59:02.453000
CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000
CVE-2024-45306,0,0,2089f2b015e15041c3f3807cc6f2c8eb1cf893208c28e4b1ca171ff53a3a8feb,2024-09-03T12:59:02.453000
CVE-2024-45307,1,1,e801e49c6c50ed1fcc6ff63385ec5286c080c9a6dd9686a6fd9413b8c4e80206,2024-09-03T19:40:46.783000
CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000
CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000
CVE-2024-45310,1,1,cf559c2fb608db5e942d7bd154cefbc5964353e2198d862886f1fbdd9c82a973,2024-09-03T19:40:46.783000
CVE-2024-45311,0,0,f2b6c9c3379c0b3e8f8cccd4dc03bdd41e4b0a8129b775b47dd7144af13cbd61,2024-09-03T12:59:02.453000
CVE-2024-45312,0,0,3ab127ae457c159e255763a9cac499b257dedfb3025d06ab78788175895c278c,2024-09-03T12:59:02.453000
CVE-2024-45313,0,0,7f2c32db2a1d116c11ba8b1d5ff95be26c7a6f4c5dba7ff892eb13c5baf4c8a1,2024-09-03T12:59:02.453000
@ -258945,10 +258956,10 @@ CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b91
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000
CVE-2024-45435,0,1,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797c28,2024-09-03T17:23:36.073000
CVE-2024-45435,0,0,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797c28,2024-09-03T17:23:36.073000
CVE-2024-45436,0,0,285ce8c7d8a1a73359dbcdd8ed12fdef35f675e020b230adf62e4aee88352a8c,2024-08-30T16:08:54.840000
CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c1564,2024-05-24T13:03:11.993000
CVE-2024-45440,0,0,48f137caa1abb077b1075de2faba6a6806a147fc385fe9803d57e1539cd03295,2024-08-29T13:25:27.537000
CVE-2024-45440,0,1,9239656ddb6aeda0c2c6efeace5c8dd620d5a27bf71f1e1bdb521249d601edd3,2024-09-03T18:15:08.967000
CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000
CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000
CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000
@ -258971,15 +258982,15 @@ CVE-2024-4555,0,0,2d6c47296afeedb2c6a7f60677f2d88681b96e578cfefc1913928dc16b7bb8
CVE-2024-4556,0,0,7d09fa247082252ffb6b7dda6aa600cf3ff3bf7dd0d9af7b07da29fff8c7a6fb,2024-08-28T12:57:17.117000
CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000
CVE-2024-4558,0,0,f33120bad100499bf0c3c5e20b119cff8d6ade1c8324fe8cac904ff1ff2e147b,2024-07-30T02:15:08.293000
CVE-2024-45586,0,0,b8ce1496f42f310fc06dda19fe6806cc42bc567bbac86c9dad77a5e8a4e1a8a3,2024-09-03T12:59:02.453000
CVE-2024-45587,0,0,c4a9778ef4ee9816c403430d16b2806e32ead26df3172aecb7ac4e291c3286d5,2024-09-03T12:59:02.453000
CVE-2024-45588,0,0,0ffd9eefdcf3d7feb480c3bca8c40ca444611aa8a2be4a24eb029adcb6854f63,2024-09-03T12:59:02.453000
CVE-2024-45586,0,1,253f3929c9559f666d167aab4975b63db8e2ad8bdf18b88e44b362bb2cf83eda,2024-09-03T19:55:47.997000
CVE-2024-45587,0,1,f81a3d1e32cfab4a3904b18a9c45828659a1f3efbee3c4d2c9d6c663d5201cf7,2024-09-03T19:55:46.413000
CVE-2024-45588,0,1,67f6c95f1a9b044787da66a3c815c562847f160833229ff27d23d876e7dd3a1a,2024-09-03T19:46:35.080000
CVE-2024-4559,0,0,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa04589,2024-07-03T02:07:46.003000
CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000
CVE-2024-45621,0,0,b1d8555717f8cc1664b959fa6eacae6272c01d212d833a21d986fc1607f3d4e8,2024-09-03T12:59:02.453000
CVE-2024-45622,0,1,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000
CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000
CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000
CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000
CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000
@ -260310,7 +260321,7 @@ CVE-2024-6115,0,0,15dd6157449ec10d31fd4366fb8ca14f8fe35af7e4b7d4c1bf3f3f7159a1a6
CVE-2024-6116,0,0,f2ada37f40e94dafdc5d43df86df5904a49741c82bcc90227e41dbb655a1d08c,2024-08-23T02:19:51.723000
CVE-2024-6117,0,0,d5912ee8b7e4ddbb2a8f1ef197795383d392b808369f9562b5d5244a004a10d9,2024-08-30T17:41:50.753000
CVE-2024-6118,0,0,1a4b8c8391abe6767f17dfe565807cd043bd462cdba8832490fc6733cc9b8f4a,2024-08-30T17:44:20.537000
CVE-2024-6119,1,1,5139386c00935bf2ac969420dc9b85c8911cd08ed4139f0e2f838370dff41cdd,2024-09-03T16:15:07.177000
CVE-2024-6119,0,1,2304fd67a37a6bd7def45cb507d7047dd0d656047e08a67f5c9499fa04745f71,2024-09-03T19:40:46.783000
CVE-2024-6120,0,0,887a4e2aeba7d554804c74306237ee98da6982710d9ab44cbcf47e59767187c6,2024-06-24T20:03:04.363000
CVE-2024-6121,0,0,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000
CVE-2024-6122,0,0,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000
@ -261180,8 +261191,8 @@ CVE-2024-7339,0,0,57ec1e872e2326d7636a6cda3d278abfe9440d76240320c6c9e4335e8a9416
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000
CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000
CVE-2024-7345,0,0,a5eaa19ca53f5d0b57b22b36c84d07e072c5cc9572a36e49d9c06c1da1ca69db,2024-09-03T15:15:16.707000
CVE-2024-7346,0,0,f770afc67134ec2034e59f159f66e8a5984a271b07a7194247a0b4b3b1e5d3c2,2024-09-03T15:15:16.913000
CVE-2024-7345,0,1,ccfa03705386d8f7bae9ad7f21044a239b8248d01b7db311bd409a35a072ecd6,2024-09-03T19:40:46.783000
CVE-2024-7346,0,1,1950683ea95df19f4a455da83d9415fa0612844b0d2a8d2ce9d42ed9292f5758,2024-09-03T19:40:46.783000
CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5f7,2024-08-20T19:25:17.513000
CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000
CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
@ -261352,7 +261363,7 @@ CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e6
CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000
CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000
CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000
CVE-2024-7592,0,0,5f1d5f4650e90138279fca5841fce1bfd247e68df66e0a4d15fc694fc47d170d,2024-09-03T15:15:17.127000
CVE-2024-7592,0,1,d502cd413fcc1f77d45b4f7c5165989a71f5beed854dec165a878dd54a330ae9,2024-09-03T18:35:15.763000
CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000
CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000
CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000
@ -261367,6 +261378,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
CVE-2024-7619,1,1,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000
CVE-2024-7625,0,0,cf7951ec684c41cac7f2f6e12b1507a1eac20d5a4914135abea68670c2031228,2024-08-15T13:01:10.150000
@ -261391,7 +261403,7 @@ CVE-2024-7647,0,0,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1
CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000
CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000
CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000
CVE-2024-7654,0,0,d2682b299edf95c6658ad8c9301b586518797bfa6c71489de67e4567d5625c69,2024-09-03T15:15:17.223000
CVE-2024-7654,0,1,48e372226ddbdad2b2169e3b27af2de6c8634648c09e2ca3ab2c1c166ee3bf55,2024-09-03T19:40:46.783000
CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000
CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000
CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000
@ -261417,8 +261429,8 @@ CVE-2024-7684,0,0,d5d03d6072e24fe97ebcaeddd6f0cfafbf610fe9d74f716df9c156507bb771
CVE-2024-7685,0,0,ef97cee3c3f9504d8f3d2a571167ba3304a1e5ad3165b46e778fa46938b19988,2024-08-20T13:53:51.947000
CVE-2024-7686,0,0,f064743866c554c4f2e90ed0b10058d3ac9c7fa057a74b3ddc10388a40d22334,2024-08-20T14:03:12.533000
CVE-2024-7690,0,0,d641c397b389582990875041f83e3f7cf4b821780cef851109280aeeabb26909,2024-09-03T14:35:08.507000
CVE-2024-7691,0,1,be3e7969d66daef31c8f4d2ca08f6fc545d3ce4a9f5e0f354c807322de787fd3,2024-09-03T16:35:11.383000
CVE-2024-7692,0,1,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b483,2024-09-03T16:35:12.363000
CVE-2024-7691,0,0,be3e7969d66daef31c8f4d2ca08f6fc545d3ce4a9f5e0f354c807322de787fd3,2024-09-03T16:35:11.383000
CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b483,2024-09-03T16:35:12.363000
CVE-2024-7693,0,0,f2cd1103366bcfd179be09779784b86ac2f98679921c4f629dd8dbd0c14eefbf,2024-08-12T13:41:36.517000
CVE-2024-7694,0,0,7ad6784b26040f06619a4364e66ebaeeebc13317865a5794a53c5e6dcb080aaf,2024-08-12T13:41:36.517000
CVE-2024-7697,0,0,ec740217e8324af4933e81b05285aef1954371b3c254be0eabb50b05e6bbef72,2024-08-21T06:15:13.187000
@ -261622,7 +261634,7 @@ CVE-2024-8083,0,0,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa
CVE-2024-8084,0,0,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000
CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800dfb,2024-08-27T13:17:34.187000
CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000
CVE-2024-8088,0,1,0e34ecb2e337ae3a8395dc18d49e45879b242135953d92e92bf685b3a17972e3,2024-09-03T16:15:07.343000
CVE-2024-8088,0,0,0e34ecb2e337ae3a8395dc18d49e45879b242135953d92e92bf685b3a17972e3,2024-09-03T16:15:07.343000
CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000
CVE-2024-8105,0,0,6cd123057443a6d5affcf89562c6f3c6a2170e0a192f0587b00965446f3cfd3c,2024-08-30T21:15:14.577000
CVE-2024-8108,0,0,60015ebbd181aea00918abf3b3af4bc88fba5109d0b4aa167c5902152afce1db,2024-09-03T12:59:02.453000
@ -261752,12 +261764,12 @@ CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
CVE-2024-8374,0,0,4f80f55becbb7c7a1bdcff55c8c8caebb4200525c557f5f15c3a81de804dfdac,2024-09-03T12:59:02.453000
CVE-2024-8380,0,0,50231b6cf68aafd45090da0e392d43e9cc47c26432970ae1967b30772bd6b092,2024-09-03T12:59:02.453000
CVE-2024-8381,0,1,e7a1bf0fa21e3d466a6fe92dcf40cfe4bc9e0605365847dc55036f65d031a9b8,2024-09-03T16:35:13.350000
CVE-2024-8381,0,0,e7a1bf0fa21e3d466a6fe92dcf40cfe4bc9e0605365847dc55036f65d031a9b8,2024-09-03T16:35:13.350000
CVE-2024-8382,0,0,efd4d504583c7fd076b33c9f6fec5965d98116cc01276bd9e89c0d8d9e8a8b82,2024-09-03T15:12:16.467000
CVE-2024-8383,0,0,3b3d2bcfdb78cbde0419304113974833c25c316d6ce2ddd82d4ef47afd00074a,2024-09-03T15:12:16.467000
CVE-2024-8384,0,1,5362a6ace2b158a32cc1b8122c1c95d212b2ab5fdc71dfd06d7a76d1a9880d06,2024-09-03T16:35:14.610000
CVE-2024-8385,0,1,3eda89923dec7f419638dbbbda1a0bd1a1d6a52329ca274edcb6c542c6f6acdb,2024-09-03T16:35:15.653000
CVE-2024-8384,0,0,5362a6ace2b158a32cc1b8122c1c95d212b2ab5fdc71dfd06d7a76d1a9880d06,2024-09-03T16:35:14.610000
CVE-2024-8385,0,0,3eda89923dec7f419638dbbbda1a0bd1a1d6a52329ca274edcb6c542c6f6acdb,2024-09-03T16:35:15.653000
CVE-2024-8386,0,0,dda2399ada658560d8a6dac1ee98f2a881d2fb65f5accf10b74309695e1e8264,2024-09-03T15:12:16.467000
CVE-2024-8387,0,1,a3a4ffd386669c751e51534334429c7aa7719b496d6c236587ca9f3124ab594b,2024-09-03T16:35:16.810000
CVE-2024-8387,0,0,a3a4ffd386669c751e51534334429c7aa7719b496d6c236587ca9f3124ab594b,2024-09-03T16:35:16.810000
CVE-2024-8388,0,0,fe5700fbfa44251541892935d34e117d24a52d265fc210840d61b4c99ed842ff,2024-09-03T15:12:16.467000
CVE-2024-8389,0,1,2a0ca530b7b6eb915d2e5cb6434892ad982bd6d94765b32fce372846982f2195,2024-09-03T16:35:17.947000
CVE-2024-8389,0,0,2a0ca530b7b6eb915d2e5cb6434892ad982bd6d94765b32fce372846982f2195,2024-09-03T16:35:17.947000

Can't render this file because it is too large.