Auto-Update: 2024-08-15T23:55:17.544518+00:00

This commit is contained in:
cad-safe-bot 2024-08-15 23:58:12 +00:00
parent 1721cddc63
commit fa6328298e
29 changed files with 2685 additions and 143 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-20971",
"sourceIdentifier": "security@android.com",
"published": "2023-03-24T20:15:10.913",
"lastModified": "2023-06-28T18:15:11.803",
"lastModified": "2024-08-15T22:15:05.817",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In updatePermissionTreeSourcePackage of PermissionManagerServiceImpl.java, there is a possible way to obtain dangerous permissions without user consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-225880325"
"value": "In removePermission of PermissionManagerServiceImpl.java, there is a possible way to obtain dangerous permissions without user consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {
@ -66,7 +66,11 @@
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
"url": "https://android.googlesource.com/platform/frameworks/base/+/6c22d6c1e69676c5c68d21928aa5486bfd1bd131",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-21351",
"sourceIdentifier": "security@android.com",
"published": "2023-10-30T17:15:51.303",
"lastModified": "2023-11-04T03:22:15.930",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-15T22:15:05.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Activity Manager, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
"value": "In multiple locations, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
@ -70,11 +70,12 @@
],
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/android-14",
"source": "security@android.com",
"tags": [
"Vendor Advisory"
]
"url": "https://android.googlesource.com/platform/frameworks/base/+/26522c0e82fd3a9bcbd01409217291d97dcdabcf",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0084",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:11.220",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T22:00:16.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -51,10 +81,105 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.11",
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "16.6",
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.2",
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0085",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:11.483",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T22:03:21.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -51,10 +81,133 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.11",
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "16.6",
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.2",
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A83E0A15-0D3D-453F-B11F-F0B493ECD208"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.2",
"matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0086",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:11.717",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T22:05:10.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -51,10 +81,105 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.11",
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "16.6",
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.2",
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0089",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:11.940",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T22:08:51.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-665"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -51,10 +81,160 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "470",
"versionEndExcluding": "475.06",
"matchCriteriaId": "32EB51D2-1F34-4D1D-8B23-4029E350140F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "535",
"versionEndExcluding": "538.67",
"matchCriteriaId": "6A930DF9-CB95-4BE4-999C-D75AB2C8C4AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "550",
"versionEndExcluding": "552.55",
"matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "555",
"versionEndExcluding": "555.99",
"matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.11",
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "16.6",
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.2",
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.99",
"matchCriteriaId": "5C8E669A-9DE1-42BD-94B1-98437BB66002"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0090",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:12.170",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T22:17:49.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -51,10 +81,321 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "470",
"versionEndExcluding": "475.06",
"matchCriteriaId": "32EB51D2-1F34-4D1D-8B23-4029E350140F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "535",
"versionEndExcluding": "538.67",
"matchCriteriaId": "6A930DF9-CB95-4BE4-999C-D75AB2C8C4AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "550",
"versionEndExcluding": "552.55",
"matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "555",
"versionEndExcluding": "555.99",
"matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "470",
"versionEndExcluding": "470.256.02",
"matchCriteriaId": "D66C0B72-0A3F-4D61-8BF5-B0BED03014E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "535",
"versionEndExcluding": "535.180.01",
"matchCriteriaId": "3EC43E03-3909-4AB5-A9FD-198E55167AD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "550",
"versionEndExcluding": "550.90.07",
"matchCriteriaId": "9BEA1462-AA33-4ED9-91CD-737525B9E2C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "555",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "B0AB9E55-DB20-4FA4-8900-61C224514B49"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.11",
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "16.6",
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.2",
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.99",
"matchCriteriaId": "5C8E669A-9DE1-42BD-94B1-98437BB66002"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.2",
"matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0091",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:12.430",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T22:20:16.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -51,10 +81,293 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "550",
"versionEndExcluding": "552.55",
"matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "555",
"versionEndExcluding": "555.99",
"matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "550",
"versionEndExcluding": "550.90.07",
"matchCriteriaId": "9BEA1462-AA33-4ED9-91CD-737525B9E2C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "555",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "B0AB9E55-DB20-4FA4-8900-61C224514B49"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.11",
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "16.6",
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.2",
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.99",
"matchCriteriaId": "5C8E669A-9DE1-42BD-94B1-98437BB66002"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.2",
"matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0092",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:12.647",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T22:22:52.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -51,10 +81,283 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "470",
"versionEndExcluding": "475.06",
"matchCriteriaId": "32EB51D2-1F34-4D1D-8B23-4029E350140F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "535",
"versionEndExcluding": "538.67",
"matchCriteriaId": "6A930DF9-CB95-4BE4-999C-D75AB2C8C4AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "550",
"versionEndExcluding": "552.55",
"matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "555",
"versionEndExcluding": "555.99",
"matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "470",
"versionEndExcluding": "470.256.02",
"matchCriteriaId": "D66C0B72-0A3F-4D61-8BF5-B0BED03014E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "535",
"versionEndExcluding": "535.180.01",
"matchCriteriaId": "3EC43E03-3909-4AB5-A9FD-198E55167AD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "550",
"versionEndExcluding": "550.90.07",
"matchCriteriaId": "9BEA1462-AA33-4ED9-91CD-737525B9E2C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "555",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "B0AB9E55-DB20-4FA4-8900-61C224514B49"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.11",
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "16.6",
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.2",
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29526088-0276-428D-AD82-F3F91666A9DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.2",
"matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0093",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:12.863",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T22:23:20.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -51,10 +81,105 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.11",
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "16.6",
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.2",
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
"versionEndExcluding": "555.52.04",
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-21302",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-08T02:15:37.827",
"lastModified": "2024-08-14T05:15:12.820",
"lastModified": "2024-08-15T23:15:06.727",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nUpdate: August 13, 2024\nMicrosoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are encouraged to review KB5042562: Guidance for blocking rollback of virtualization-based security related updates to assess if this opt-in policy meets the needs of their environment before implementing this mitigation. There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to security updates once available. For more information see Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.\nRecommended Actions:\nMicrosoft has released an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update.\n\nFor Windows 10 1809 and later, Windows 11 version 21H2 and later, and Windows Server 2019 and later, administrators can deploy a Microsoft-signed revocation policy (SkuSiPolicy.p7b) to block vulnerable, unpatched versions of VBS system files from being loaded by the operating system. For more information, refer to KB5042562: Guidance for blocking rollback of virtualization-based security related..."
"value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nUpdate: August 13, 2024\nMicrosoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are encouraged to review KB5042562: Guidance for blocking rollback of virtualization-based security related updates to assess if this opt-in policy meets the needs of their environment before implementing this mitigation. There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. For more information see Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.\nRecommended Actions:\nMicrosoft has released an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update.\n\nFor Windows 10 1809 and later, Windows 11 version 21H2 and later, and Windows Server 2019 and later, administrators can deploy a Microsoft-signed revocation policy (SkuSiPolicy.p7b) to block vulnerable, unpatched versions of VBS system files from being loaded by the operating system. For more information, refer to KB5042562: Guidance for blocking rollback of virtualization-based security related..."
},
{
"lang": "es",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-31333",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.123",
"lastModified": "2024-08-15T22:15:06.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In _MMU_AllocLevel of mmu_common.c, there is a possible arbitrary code execution due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34727",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.190",
"lastModified": "2024-08-15T22:15:06.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In sdpu_compare_uuid_with_attr of sdp_utils.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/6afad4b377b5bc3f38b28296e746b674173f99d8",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2024-34731",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.263",
"lastModified": "2024-08-15T22:15:06.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of TranscodingResourcePolicy.cpp, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/4b68b00993849b6a7f0e6d075bc2c8bb2e184e61",
"source": "security@android.com"
},
{
"url": "https://android.googlesource.com/platform/hardware/interfaces/+/0ff19d1f89614fce9454fb415bcbfcbcf3caf76e",
"source": "security@android.com"
},
{
"url": "https://android.googlesource.com/platform/hardware/interfaces/+/d63d09261806f7f1aa01406867f2a9e169356fca",
"source": "security@android.com"
},
{
"url": "https://android.googlesource.com/platform/system/nfc/+/1037992b9abcde1e3560bd895f62644a68563b3d",
"source": "security@android.com"
},
{
"url": "https://android.googlesource.com/platform/system/security/+/d3805312d73433e34ef69a645b553a2969c5dc93",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34734",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.337",
"lastModified": "2024-08-15T22:15:06.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In onForegroundServiceButtonClicked of FooterActionsViewModel.kt, there is a possible way to disable the active VPN app from the lockscreen due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/207584fb6f820eba14251251d7e9331bfd57adb8",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34736",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.400",
"lastModified": "2024-08-15T22:15:06.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In setupVideoEncoder of StagefrightRecorder.cpp, there is a possible asynchronous playback when B-frame support is enabled. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/6cfd048292b2cc706811a22c9078208cfa8e6d24",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34737",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.467",
"lastModified": "2024-08-15T22:15:06.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ensureSetPipAspectRatioQuotaTracker of ActivityClientController.java, there is a possible way to generate unmovable and undeletable pip windows due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/8b473b3f79642f42eeeffbfe572df6c6cbe9d79e",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34738",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.623",
"lastModified": "2024-08-15T22:15:06.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of AppOpsService.java, there is a possible way for unprivileged apps to read their own restrictRead app-op states due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/21d764807b3dcd402d63e2b4c9fbae1c9965400a",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34739",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.690",
"lastModified": "2024-08-15T22:15:06.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In shouldRestrictOverlayActivities of UsbProfileGroupSettingsManager.java, there is a possible escape from SUW due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/50e1f8f36e32928d10e72324c05a203a6db9f7fb",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-34740",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.753",
"lastModified": "2024-08-15T22:15:06.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In attributeBytesBase64 and attributeBytesHex of BinaryXmlSerializer.java, there is a possible arbitrary XML injection due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/e8b6505647be558ed3a167a1e13c53dfc227d22b",
"source": "security@android.com"
},
{
"url": "https://android.googlesource.com/platform/frameworks/libs/modules-utils/+/700c28908051ceb55e1456d2d21229bc17c6895a",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34741",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.820",
"lastModified": "2024-08-15T22:15:06.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In setForceHideNonSystemOverlayWindowIfNeeded of WindowState.java, there is a possible way for message content to be visible on the screensaver while lock screen visibility settings are restricted by the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/abfaf702ef833dc4d374492d45c615c6e6de7f01",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34742",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.890",
"lastModified": "2024-08-15T22:15:06.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In shouldWrite of OwnersData.java, there is a possible edge case that prevents MDM policies from being persisted due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/688e5c3012eb0a4ea88361588cf5026c10e4a42c",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34743",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.957",
"lastModified": "2024-08-15T22:15:06.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In setTransactionState of SurfaceFlinger.cpp, there is a possible way to perform tapjacking due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/native/+/3f85323b27d95a57bfa87cbf68dd4a143f9f88ad",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-08-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7841",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T22:15:07.020",
"lastModified": "2024-08-15T22:15:07.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SourceCodester Clinics Patient Management System 1.0. This vulnerability affects unknown code of the file /pms/ajax/check_user_name.php. The manipulation of the argument user_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqlove555/cve/blob/main/sql.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274744",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274744",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.391540",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7842",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T22:15:07.310",
"lastModified": "2024-08-15T22:15:07.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Online Graduate Tracer System 1.0. This issue affects some unknown processing of the file /tracking/admin/export_it.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Tracer_info.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274745",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274745",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.391562",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7843",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T23:15:10.453",
"lastModified": "2024-08-15T23:15:10.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file /tracking/admin/exportcs.php. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Tracer_info2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274746",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274746",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.391563",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7844",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T23:15:10.740",
"lastModified": "2024-08-15T23:15:10.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Online Graduate Tracer System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /tracking/admin/add_acc.php. The manipulation of the argument name/user/position leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Tracer_XSS.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274747",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274747",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.391566",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-15T22:00:17.761064+00:00
2024-08-15T23:55:17.544518+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-15T21:46:11.737000+00:00
2024-08-15T23:15:10.740000+00:00
```
### Last Data Feed Release
@ -33,54 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260172
260188
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `16`
- [CVE-2024-42487](CVE-2024/CVE-2024-424xx/CVE-2024-42487.json) (`2024-08-15T21:15:16.997`)
- [CVE-2024-42488](CVE-2024/CVE-2024-424xx/CVE-2024-42488.json) (`2024-08-15T21:15:17.270`)
- [CVE-2024-43366](CVE-2024/CVE-2024-433xx/CVE-2024-43366.json) (`2024-08-15T21:15:17.520`)
- [CVE-2024-43367](CVE-2024/CVE-2024-433xx/CVE-2024-43367.json) (`2024-08-15T21:15:17.777`)
- [CVE-2024-6456](CVE-2024/CVE-2024-64xx/CVE-2024-6456.json) (`2024-08-15T21:15:18.047`)
- [CVE-2024-7838](CVE-2024/CVE-2024-78xx/CVE-2024-7838.json) (`2024-08-15T20:15:18.457`)
- [CVE-2024-7839](CVE-2024/CVE-2024-78xx/CVE-2024-7839.json) (`2024-08-15T21:15:18.237`)
- [CVE-2024-7866](CVE-2024/CVE-2024-78xx/CVE-2024-7866.json) (`2024-08-15T20:15:18.793`)
- [CVE-2024-7867](CVE-2024/CVE-2024-78xx/CVE-2024-7867.json) (`2024-08-15T20:15:18.967`)
- [CVE-2024-7868](CVE-2024/CVE-2024-78xx/CVE-2024-7868.json) (`2024-08-15T21:15:18.530`)
- [CVE-2024-31333](CVE-2024/CVE-2024-313xx/CVE-2024-31333.json) (`2024-08-15T22:15:06.123`)
- [CVE-2024-34727](CVE-2024/CVE-2024-347xx/CVE-2024-34727.json) (`2024-08-15T22:15:06.190`)
- [CVE-2024-34731](CVE-2024/CVE-2024-347xx/CVE-2024-34731.json) (`2024-08-15T22:15:06.263`)
- [CVE-2024-34734](CVE-2024/CVE-2024-347xx/CVE-2024-34734.json) (`2024-08-15T22:15:06.337`)
- [CVE-2024-34736](CVE-2024/CVE-2024-347xx/CVE-2024-34736.json) (`2024-08-15T22:15:06.400`)
- [CVE-2024-34737](CVE-2024/CVE-2024-347xx/CVE-2024-34737.json) (`2024-08-15T22:15:06.467`)
- [CVE-2024-34738](CVE-2024/CVE-2024-347xx/CVE-2024-34738.json) (`2024-08-15T22:15:06.623`)
- [CVE-2024-34739](CVE-2024/CVE-2024-347xx/CVE-2024-34739.json) (`2024-08-15T22:15:06.690`)
- [CVE-2024-34740](CVE-2024/CVE-2024-347xx/CVE-2024-34740.json) (`2024-08-15T22:15:06.753`)
- [CVE-2024-34741](CVE-2024/CVE-2024-347xx/CVE-2024-34741.json) (`2024-08-15T22:15:06.820`)
- [CVE-2024-34742](CVE-2024/CVE-2024-347xx/CVE-2024-34742.json) (`2024-08-15T22:15:06.890`)
- [CVE-2024-34743](CVE-2024/CVE-2024-347xx/CVE-2024-34743.json) (`2024-08-15T22:15:06.957`)
- [CVE-2024-7841](CVE-2024/CVE-2024-78xx/CVE-2024-7841.json) (`2024-08-15T22:15:07.020`)
- [CVE-2024-7842](CVE-2024/CVE-2024-78xx/CVE-2024-7842.json) (`2024-08-15T22:15:07.310`)
- [CVE-2024-7843](CVE-2024/CVE-2024-78xx/CVE-2024-7843.json) (`2024-08-15T23:15:10.453`)
- [CVE-2024-7844](CVE-2024/CVE-2024-78xx/CVE-2024-7844.json) (`2024-08-15T23:15:10.740`)
### CVEs modified in the last Commit
Recently modified CVEs: `45`
Recently modified CVEs: `11`
- [CVE-2024-27680](CVE-2024/CVE-2024-276xx/CVE-2024-27680.json) (`2024-08-15T21:35:11.063`)
- [CVE-2024-28020](CVE-2024/CVE-2024-280xx/CVE-2024-28020.json) (`2024-08-15T21:32:33.467`)
- [CVE-2024-28021](CVE-2024/CVE-2024-280xx/CVE-2024-28021.json) (`2024-08-15T21:29:46.697`)
- [CVE-2024-28022](CVE-2024/CVE-2024-280xx/CVE-2024-28022.json) (`2024-08-15T21:44:20.677`)
- [CVE-2024-28024](CVE-2024/CVE-2024-280xx/CVE-2024-28024.json) (`2024-08-15T21:46:11.737`)
- [CVE-2024-28623](CVE-2024/CVE-2024-286xx/CVE-2024-28623.json) (`2024-08-15T21:35:11.883`)
- [CVE-2024-28670](CVE-2024/CVE-2024-286xx/CVE-2024-28670.json) (`2024-08-15T20:35:07.023`)
- [CVE-2024-28680](CVE-2024/CVE-2024-286xx/CVE-2024-28680.json) (`2024-08-15T20:35:07.960`)
- [CVE-2024-28683](CVE-2024/CVE-2024-286xx/CVE-2024-28683.json) (`2024-08-15T20:35:08.767`)
- [CVE-2024-29374](CVE-2024/CVE-2024-293xx/CVE-2024-29374.json) (`2024-08-15T20:35:09.683`)
- [CVE-2024-29471](CVE-2024/CVE-2024-294xx/CVE-2024-29471.json) (`2024-08-15T20:35:10.563`)
- [CVE-2024-30632](CVE-2024/CVE-2024-306xx/CVE-2024-30632.json) (`2024-08-15T20:35:11.387`)
- [CVE-2024-30639](CVE-2024/CVE-2024-306xx/CVE-2024-30639.json) (`2024-08-15T20:35:12.280`)
- [CVE-2024-38191](CVE-2024/CVE-2024-381xx/CVE-2024-38191.json) (`2024-08-15T20:58:12.813`)
- [CVE-2024-38195](CVE-2024/CVE-2024-381xx/CVE-2024-38195.json) (`2024-08-15T20:56:25.100`)
- [CVE-2024-38196](CVE-2024/CVE-2024-381xx/CVE-2024-38196.json) (`2024-08-15T20:54:50.510`)
- [CVE-2024-38197](CVE-2024/CVE-2024-381xx/CVE-2024-38197.json) (`2024-08-15T20:40:58.547`)
- [CVE-2024-38198](CVE-2024/CVE-2024-381xx/CVE-2024-38198.json) (`2024-08-15T20:39:20.260`)
- [CVE-2024-38199](CVE-2024/CVE-2024-381xx/CVE-2024-38199.json) (`2024-08-15T20:32:42.193`)
- [CVE-2024-38201](CVE-2024/CVE-2024-382xx/CVE-2024-38201.json) (`2024-08-15T20:30:00.737`)
- [CVE-2024-38211](CVE-2024/CVE-2024-382xx/CVE-2024-38211.json) (`2024-08-15T20:29:19.557`)
- [CVE-2024-38214](CVE-2024/CVE-2024-382xx/CVE-2024-38214.json) (`2024-08-15T20:28:25.893`)
- [CVE-2024-38223](CVE-2024/CVE-2024-382xx/CVE-2024-38223.json) (`2024-08-15T20:18:28.240`)
- [CVE-2024-39338](CVE-2024/CVE-2024-393xx/CVE-2024-39338.json) (`2024-08-15T20:35:13.427`)
- [CVE-2024-40704](CVE-2024/CVE-2024-407xx/CVE-2024-40704.json) (`2024-08-15T20:03:13.530`)
- [CVE-2023-20971](CVE-2023/CVE-2023-209xx/CVE-2023-20971.json) (`2024-08-15T22:15:05.817`)
- [CVE-2023-21351](CVE-2023/CVE-2023-213xx/CVE-2023-21351.json) (`2024-08-15T22:15:05.977`)
- [CVE-2024-0084](CVE-2024/CVE-2024-00xx/CVE-2024-0084.json) (`2024-08-15T22:00:16.147`)
- [CVE-2024-0085](CVE-2024/CVE-2024-00xx/CVE-2024-0085.json) (`2024-08-15T22:03:21.767`)
- [CVE-2024-0086](CVE-2024/CVE-2024-00xx/CVE-2024-0086.json) (`2024-08-15T22:05:10.547`)
- [CVE-2024-0089](CVE-2024/CVE-2024-00xx/CVE-2024-0089.json) (`2024-08-15T22:08:51.187`)
- [CVE-2024-0090](CVE-2024/CVE-2024-00xx/CVE-2024-0090.json) (`2024-08-15T22:17:49.847`)
- [CVE-2024-0091](CVE-2024/CVE-2024-00xx/CVE-2024-0091.json) (`2024-08-15T22:20:16.097`)
- [CVE-2024-0092](CVE-2024/CVE-2024-00xx/CVE-2024-0092.json) (`2024-08-15T22:22:52.747`)
- [CVE-2024-0093](CVE-2024/CVE-2024-00xx/CVE-2024-0093.json) (`2024-08-15T22:23:20.247`)
- [CVE-2024-21302](CVE-2024/CVE-2024-213xx/CVE-2024-21302.json) (`2024-08-15T23:15:06.727`)
## Download and Usage

View File

@ -215075,7 +215075,7 @@ CVE-2023-20968,0,0,0593e274e5b52ee6771934e6e469a42d0bd47456ec2387701f9119e173a41
CVE-2023-20969,0,0,b160d8b885d289b1f85223a944d11b7d380fdf1fde03b82f112f0e796c2fe523,2023-03-28T19:35:58.747000
CVE-2023-2097,0,0,d09cb3c104dedf428e696f2a5cb54326b34cd90495c9a7cce84be619f12be408,2024-05-17T02:22:39.977000
CVE-2023-20970,0,0,ef1ea87115db6310ea7a76ba7d54c8d3388b4632e02be6294aad0d6280b77c94,2023-03-28T19:35:42.523000
CVE-2023-20971,0,0,1c2e8a6df0653c68baa541d592f4fe57dd6c54ac8ff3e6bd7fdcd1ef9cbe5be8,2023-06-28T18:15:11.803000
CVE-2023-20971,0,1,90572d5a1c7f944bc3e53ca1af637d18aadb16c69079356dd23663f1417d61ec,2024-08-15T22:15:05.817000
CVE-2023-20972,0,0,a3407678aaac2f5bd89628ba70850ccc381aa8a22dadd1ff6a3fbfff76b9dc4c,2023-06-28T18:15:11.877000
CVE-2023-20973,0,0,c50c8a3ede5e78f4a5173995928da423fbe73e991efefe568b731edd02365e85,2023-06-28T18:15:11.943000
CVE-2023-20974,0,0,6e6bea94a39b70db59271596adaee4e7f01db28e82a1d32e8c6b04a2c6f440ee,2023-06-28T18:15:12.007000
@ -215475,7 +215475,7 @@ CVE-2023-21348,0,0,6536205321d5fe5c8ecb581d119686017cf544a48b45f9971c9987430c9d5
CVE-2023-21349,0,0,6db4fdb58824ed6add2774434860256244faea3a5778dec5dee8a7389bbf3391,2023-11-03T18:59:35.570000
CVE-2023-2135,0,0,4975a001fe13471f3f36bbc1a515f8a00221f54cd705ee38f3b61a934cb9f011,2023-10-20T20:53:18.983000
CVE-2023-21350,0,0,190e6cfe06286946a16c7d06283fc13546904bc93f168f3bd1a752e5caa577dc,2023-11-04T03:22:37.570000
CVE-2023-21351,0,0,bde66ae4cfee1163a82bcd816ff3f3b6a2ea7700b5abdf22265c7ebc7264b852,2023-11-04T03:22:15.930000
CVE-2023-21351,0,1,e8a409ff20085cac260c3931894a69e60a8ecb955407043e6cf87afe466d1e44,2024-08-15T22:15:05.977000
CVE-2023-21352,0,0,bf9bbc836531e62cddd0e2eb36967636a5feba7eeb8a8cc199d223cecbe99cd0,2023-11-04T03:22:08.317000
CVE-2023-21353,0,0,c66984d1d99a5b13dc3ec131e5a274aa6bd6b74fe67d618fbf20f8803ecf6638,2023-11-04T03:22:00.393000
CVE-2023-21354,0,0,d6461086ceeb0e8c3fc21b5518c694b08fab2af77c245181d061ef4d315b3c02,2023-11-04T03:21:47.663000
@ -237091,7 +237091,7 @@ CVE-2023-4997,0,0,4afed0de14254e77a99b729070c5643ffbf1676389fe16cc856891c73125b6
CVE-2023-49970,0,0,5502d6fa1c46a421a8d44ecff9c8db4116bf0ff4c0f42a9e95eba6058d2868c7,2024-03-05T13:41:01.900000
CVE-2023-49971,0,0,374def7d9c689df8f58cc4989e4ea0ed3c5a8e848866980b25656660a7f6c663,2024-08-06T14:35:02.513000
CVE-2023-49973,0,0,ca1ed5b6df9a46488025a136b2ec31b6790ba3cc516f6b9d8e6dd1ad7f0f7877,2024-03-06T15:18:08.093000
CVE-2023-49974,0,1,083867d392522ad7619f542837964c1e212931b3849e0d016c825b75a8d2f854,2024-08-15T21:35:00.653000
CVE-2023-49974,0,0,083867d392522ad7619f542837964c1e212931b3849e0d016c825b75a8d2f854,2024-08-15T21:35:00.653000
CVE-2023-49976,0,0,b2b5a09955514926cb7972b7101cec2b04ca5d1f7f45f6c868e7087074f700e7,2024-03-06T15:18:08.093000
CVE-2023-49977,0,0,aed154d4bf8ea5599b21c1e323a82e3dc2e828c1921d60bc14254ee66b176359,2024-03-06T15:18:08.093000
CVE-2023-49978,0,0,255bd00c3d73b2dea40ba11475aa7facb0a30f1814b1a1bd06cd16bd820bf405,2024-08-03T20:35:02.260000
@ -241005,16 +241005,16 @@ CVE-2024-0080,0,0,f6769690c2666f11c1424e97f6e58ae7e55c4683c29ac1139187f1c55a77c5
CVE-2024-0081,0,0,1a679f72e4845d1a811c05ca00ebbbdbb905ceb8d7ef48bbc5ac1599b35a01be,2024-04-08T18:49:25.863000
CVE-2024-0082,0,0,ce9143c638db70c8c26385b56567a33835e7016fe077f197bee030d5c72d6953,2024-04-09T12:48:04.090000
CVE-2024-0083,0,0,775ef9ada9a038a0722ac6d7f9ad11b2376cae2e29dd60e4a728cf7eecbac3f1,2024-04-09T12:48:04.090000
CVE-2024-0084,0,0,d040d235a886da6cd73020ce83cf7d33bd532a93c349a2a7804c86334c82d25f,2024-06-17T12:43:31.090000
CVE-2024-0085,0,0,9c8defc833b7e92de910f7154d7b5a6e558b9da6f89ac12a36aee3834bad24d4,2024-06-17T12:43:31.090000
CVE-2024-0086,0,0,8fd0c98d7f7e385bc4d7614c658b29e7f0019c6ca8fa767f466f318385d504b7,2024-06-17T12:43:31.090000
CVE-2024-0084,0,1,3b0e89369ce1751f549cbc8f390baa24a7f12261a8e686c81832a54818b3c0e2,2024-08-15T22:00:16.147000
CVE-2024-0085,0,1,8b830b873f1af126df2d22903bac02c490bf90af3b6cd04c56de1525e8c367ff,2024-08-15T22:03:21.767000
CVE-2024-0086,0,1,9c2c1cea436bf67cddb2c576a9bcdcd4aa1a141f23da22f6322295a2121a5f0f,2024-08-15T22:05:10.547000
CVE-2024-0087,0,0,ee4ec49a8c6f66ace623fc3cc46aad5218e7bd7ce6ac821a1ba859dace8ffec0,2024-05-14T16:13:02.773000
CVE-2024-0088,0,0,c51c2fa370408ac9dadafbf3a08e15814979c02288c5ce3c426334da96087cf2,2024-05-14T16:13:02.773000
CVE-2024-0089,0,0,b857965e7d9020788a4d9ff43f048466937065a2608a8a84e5eeb5a23d176d7f,2024-06-17T12:43:31.090000
CVE-2024-0090,0,0,d0932eeb44825b6bf299ec6aaf3600cdc698b5d3009dc4ebddec62a8397b431b,2024-06-17T12:43:31.090000
CVE-2024-0091,0,0,74d2d7d23d4fca25986e7ff317ebb3882207c213b8427e74fa6ce6796a7a1682,2024-06-17T12:43:31.090000
CVE-2024-0092,0,0,7871e933ef9b46b3d1ce98010e4e25fe083d28b7ed3bec1bfc525d4664f0b3c5,2024-06-17T12:43:31.090000
CVE-2024-0093,0,0,9e8c3e59f9c9ac5e697befb0c0d9e386074cfa9869724abb3f9586d98a90d6dd,2024-06-17T12:43:31.090000
CVE-2024-0089,0,1,b356a120285bc1939b484809569cf3884e735309f3e458cb51981a234d2f8732,2024-08-15T22:08:51.187000
CVE-2024-0090,0,1,66d9625bf06553a1195e03f2cbcc052acd7accb893aebd1c3f5f3c62a122e5b4,2024-08-15T22:17:49.847000
CVE-2024-0091,0,1,945adbbd391135a4f0f04af841e8d7a109de63b97cf2361a4d5dccf97bad1cf2,2024-08-15T22:20:16.097000
CVE-2024-0092,0,1,77c25dd7fe99a406318d27d0cc983d9c5d44c0efca6575118ed278113abb8554,2024-08-15T22:22:52.747000
CVE-2024-0093,0,1,13c4bc707399b649a6f404289bc9802faf394b7474316e3739e9b5de35da0447,2024-08-15T22:23:20.247000
CVE-2024-0094,0,0,9e7cffdfba1e4614e0ab501866a5a54ea72a17fc0cc2c50918de3cdf4ed9f3ba,2024-06-17T12:43:31.090000
CVE-2024-0095,0,0,ff25aacb8117c141d07db85db39a98668feb5d2ce1fbc34c3c23906b636024fe,2024-06-17T12:43:31.090000
CVE-2024-0096,0,0,57a8b4d9757f61cb650ca749e79c4580db5c56554907ccd97b1e10b1d2011d31,2024-05-14T16:13:02.773000
@ -242831,9 +242831,9 @@ CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b
CVE-2024-20082,0,0,939e07ac5f7d9003c45edd70cf6af9d2fbc21054841b5895f6c66ae55e7316de,2024-08-14T15:35:04.003000
CVE-2024-20083,0,0,52f24323029e3ba78b5348b46f1326d2ec4dbf8da62d0eef76d56966d5671c89,2024-08-14T13:00:48.243000
CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000
CVE-2024-2011,0,1,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
CVE-2024-2012,0,1,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
CVE-2024-2013,0,1,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000
@ -243561,7 +243561,7 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73
CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000
CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000
CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000
CVE-2024-21302,0,0,a518fe1d9cd41393a6627122cfb813ee38d87458b8806dd865a2a42bbf757410,2024-08-14T05:15:12.820000
CVE-2024-21302,0,1,d9336565ea8df676235fa9f060c58bd7180b6aaf387827fbdd6b7b1c5f52675c,2024-08-15T23:15:06.727000
CVE-2024-21303,0,0,d58ef53ce2250cc88ff41c4958354d161d0e089fca6702a30570cf750b5a8215,2024-07-09T18:18:38.713000
CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000
CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000
@ -244699,7 +244699,7 @@ CVE-2024-22913,0,0,0c8b6c34e29795c7d7dae2efe2da07b63ec68a5280e3316e86b2a2826fa48
CVE-2024-22914,0,0,a1b39b94972a65d744b75ca9176cb7fc53b2a7dcb9c255507add1ee70bdd4a9b,2024-01-25T15:25:00.303000
CVE-2024-22915,0,0,58002f77f5b9ff7f33975074fb9cfcf4c4e1a939c3bae512fc22e732ac7275f5,2024-01-25T15:25:19.217000
CVE-2024-22916,0,0,7fc468417d1b514ab55cd3ad532c732548e17e78a99d7d9891769c8cff354c44,2024-01-24T17:04:22.573000
CVE-2024-22917,0,1,d827d36e2bae2c5ebdd29dede1f05f80c1087afddec129461640bf9812693ea9,2024-08-15T21:35:02.417000
CVE-2024-22917,0,0,d827d36e2bae2c5ebdd29dede1f05f80c1087afddec129461640bf9812693ea9,2024-08-15T21:35:02.417000
CVE-2024-22919,0,0,ab4482c61edecd1158b8763653952b1fb29fcb9f0c9aec13247fb053ecc1703e,2024-01-25T14:54:29.357000
CVE-2024-22920,0,0,a4e70f8dc7ff196d0f8fe2f46b66b45084abe2c6743f3e5bb2a799094a7564be,2024-01-25T20:26:16.860000
CVE-2024-22922,0,0,1ba32e986182936be0f21cbd2fe00d51afc7a660a8bd508ab3ea329b99649cd2,2024-01-29T15:58:07.447000
@ -244818,7 +244818,7 @@ CVE-2024-23157,0,0,11b0d8091c8fa8dd11dadbcf1fbb903ad812d8f095800e3ccd96bef2996bf
CVE-2024-23158,0,0,7c083896ae118c56bbbf5e942c8384ee2397bcd81ab6e0a549fde13b2ebb526d,2024-07-03T01:47:36.407000
CVE-2024-23159,0,0,4caf10c46ce8846c250a24031e5b623ee32b37adaf5a74b6dad704236bf3795e,2024-07-03T01:47:36.637000
CVE-2024-2316,0,0,b886d554fbb39a8ab156ebbf04afa7dff2abe542e80901fe75a178728a777e10,2024-05-17T02:38:09.927000
CVE-2024-23168,0,1,516b014321b2d23dd5e11228b3f4c27201251a7b2e88523a0fca984a63e33e9a,2024-08-15T21:35:03.230000
CVE-2024-23168,0,0,516b014321b2d23dd5e11228b3f4c27201251a7b2e88523a0fca984a63e33e9a,2024-08-15T21:35:03.230000
CVE-2024-2317,0,0,8e30ab648286b0ea978301e5a5beda2d9abdf16065d34269cbb1824bfad23955,2024-05-17T02:38:10.027000
CVE-2024-23170,0,0,2d2c8288a6a12ddbc7a1710ba6e09b64e14fe785fb79b86b20a944c1ecfef869,2024-02-22T03:15:08.297000
CVE-2024-23171,0,0,f88bf803a0c4fbc4509407858b9247c6d4fbb766b717bcd811063458329b2ee7,2024-01-18T20:23:45.707000
@ -245506,7 +245506,7 @@ CVE-2024-24028,0,0,c63943ee6dfc53b25a3ab5d44f70abf633bd3f12660446bcc8d4289144acf
CVE-2024-24029,0,0,f48b5fef1e233f5b2615b26a0c9b1d6622e82a3c72c6c352158b88f9b48f9c5e,2024-02-06T21:04:04.993000
CVE-2024-2403,0,0,6dbf3c7b9ae6279f2eb08793701f0e3b4c85c484143147f528659885f0bc2bec,2024-03-13T18:15:58.530000
CVE-2024-24034,0,0,2a4d3db6cf3b4e5048c500ebce4bb202246f9fdd0a665422910e0d80f673dc32,2024-02-08T13:44:21.670000
CVE-2024-24035,0,1,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98037,2024-08-15T21:35:04.070000
CVE-2024-24035,0,0,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98037,2024-08-15T21:35:04.070000
CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000
CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000
CVE-2024-24042,0,0,6dc779be2a8b1425083e370c5845f2cde7c5662e2542d528419ae61ff3ec779e,2024-03-19T13:26:46
@ -245676,7 +245676,7 @@ CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c7
CVE-2024-24469,0,0,ebeddfd52fa0c1e7530b09b05474fbfc79f2e6c0d68157610fdaa187714cf129,2024-02-07T22:02:57.743000
CVE-2024-2447,0,0,6305c2b7cb7de274154ca47c393d8343e28d151abe5d313800ccc312259a2658,2024-04-05T12:40:52.763000
CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e4ca,2024-02-06T21:07:34.547000
CVE-2024-24474,0,1,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
CVE-2024-24474,0,0,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000
CVE-2024-24476,0,0,f4b1eaee12a3672aa3ce2076a41e7e21bf4ac04a6f045fb2b55db6f5bb90f517,2024-08-02T00:15:19.267000
CVE-2024-24478,0,0,b94544886ad00605269b35b690b03335a5085810bb0290de0a4c36a28c5a785e,2024-08-02T00:15:19.350000
@ -245695,11 +245695,11 @@ CVE-2024-24497,0,0,4486a5209afad695cf15372283d911b20ffd5a0694006d7e7ad69dd4f26f2
CVE-2024-24498,0,0,0aa227dc68d56b6857000c562a4cac27071ca2f47030d798b9bd4912ab1310b0,2024-04-25T06:15:56.283000
CVE-2024-24499,0,0,e4ff37cd2db9d4d32f1157041bef41498f67a3696e29884293222c73e4e39b9b,2024-04-24T21:15:47.147000
CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46e1,2024-03-15T12:53:06.423000
CVE-2024-24506,0,1,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000
CVE-2024-24506,0,0,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000
CVE-2024-24507,0,0,db6d74810f343dc9083835da56a72771c241b14db21b5bd25cdd0f323d95a56d,2024-07-24T12:55:13.223000
CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000
CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000
CVE-2024-24512,0,1,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000
CVE-2024-24512,0,0,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000
CVE-2024-2452,0,0,cca6a173274889cd69a2095d63054482ce0ac9763c76eccaa731ce2a40b02048,2024-06-10T19:15:53.417000
CVE-2024-24520,0,0,3c774368f33e309a9aff5a70713a9d6c94a70066616aae4e879a98640fa83db5,2024-07-03T01:48:18.843000
CVE-2024-24524,0,0,61939d34114517af38312bcfbce13ad9e833fb758fc861ac1b9c4d60456d9a12,2024-07-03T01:48:19.690000
@ -246152,7 +246152,7 @@ CVE-2024-25138,0,0,5216fc591ac60d49fd017d17c222c81ab9d6ca5294460860349d6bb46cb75
CVE-2024-25139,0,0,c88b223ab467593ac8de29d9a0590df6a82e1476f4af9f7ff43561b04a15b98e,2024-08-05T14:35:05.477000
CVE-2024-2514,0,0,956e72a82145af5df3731620e2db9c4a0fa06ee5f96614ef673f99b0f16dc312,2024-05-17T02:38:16.170000
CVE-2024-25140,0,0,2efd0c5629a3b4005a26b66a24cac50566792a4a7f9314aa9d76f11ed38db984,2024-08-02T00:15:26.257000
CVE-2024-25141,0,1,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000
CVE-2024-25141,0,0,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000
CVE-2024-25142,0,0,19d4bb5bd9d9370afd571c0a6d80ffe65e65cfd553d5b4ccef4ef771df0d1e04,2024-06-17T12:42:04.623000
CVE-2024-25143,0,0,10a6bb922da86e2acb7fedc41f329f10932019b09aa65cbea04bcb9e229da526,2024-02-07T17:04:54.407000
CVE-2024-25144,0,0,8416cb9676120788fbc94760aa779f11f83eeafe55e75ecc3de9574dca979c73,2024-02-15T04:36:24.350000
@ -246179,7 +246179,7 @@ CVE-2024-25168,0,0,dad8d6efa703d292b2e1316077e648b5d024741360f9670fbd7a5b3f86b84
CVE-2024-25169,0,0,ddfaf7adafd107d54fdd755c9a7f5c8ead3bddd5d293a6320fdace627636b9a5,2024-02-29T13:49:47.277000
CVE-2024-2517,0,0,fd27584c55a08a26b7b1fdff8ab4423fb114835c3aa51e3c4abdd3a6801696e6,2024-05-17T02:38:16.440000
CVE-2024-25170,0,0,5a57c221aced5771a411a434828fd35e5d41dcc64fd1585dedec2f988b96ac80,2024-02-29T13:49:47.277000
CVE-2024-25175,0,1,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000
CVE-2024-25175,0,0,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000
CVE-2024-2518,0,0,67143896f82c167febad3b5ae58ed9a1bb65a46487dbef8c359c6c9e56cccd8d,2024-05-17T02:38:16.523000
CVE-2024-25180,0,0,7ba581c3caef0d3c03c0f8f2ecb5a0dce1d4af599fb0dc59bceacf92113e3f6b,2024-08-02T00:15:26.843000
CVE-2024-25187,0,0,235931cb55f2324cb5235f058c93cb713e862085431cae896b9108cfe9eba975,2024-04-02T12:50:42.233000
@ -246265,7 +246265,7 @@ CVE-2024-25318,0,0,816caedc6e45e8daf872d525cbac5de4c424378189abd90933e824060204b
CVE-2024-2532,0,0,dbd2e90a8b9f0e6a244b6c6163b20f8979fc7a3177b780d02e1509ee97c26b6a,2024-05-17T02:38:17.753000
CVE-2024-25320,0,0,af842a9080e1a2474b48f9d94aba0e31c99f072b88471f69ccaea451c1f5904e,2024-02-16T19:26:55.393000
CVE-2024-25325,0,0,5dc3e9eaa4b68d64dbfeed83e2113e7339ef26567f6f094d65da12c277401023,2024-03-12T12:40:13.500000
CVE-2024-25327,0,1,9be8a5c5832d3bb0b7e516f20a61af14feb4f1acbdf8b85612033608526c3789,2024-08-15T21:35:07.617000
CVE-2024-25327,0,0,9be8a5c5832d3bb0b7e516f20a61af14feb4f1acbdf8b85612033608526c3789,2024-08-15T21:35:07.617000
CVE-2024-2533,0,0,6520d041e2b7ba39d1700487d120781106e9a9e9b41da5c3ad12ec52a81a1e5b,2024-05-17T02:38:17.843000
CVE-2024-25331,0,0,4f27830f39927c3895bcf33b02286589a44e6189e721c70e2368b6ca05c425b4,2024-08-05T15:35:11.043000
CVE-2024-2534,0,0,4887af7a0ab37b01ddfa2f72430762a504040b1465853138458422ea16a2da1b,2024-05-17T02:38:17.933000
@ -246318,7 +246318,7 @@ CVE-2024-2543,0,0,90e05f36a3d2dfc0c0cb0570a48a9a80b8042b66097a9bbd3537fdf34c177b
CVE-2024-25434,0,0,26bac245bd5b6380c1089f8063086eb0c8545596793c0265b0d4261729bfcdb4,2024-03-04T13:58:23.447000
CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000
CVE-2024-25436,0,0,16fb2e1f886d8db1c20751b88d1af87dc346511e3a7b7468111bb026aa3d1366,2024-03-04T13:58:23.447000
CVE-2024-25438,0,1,7a94e2bcbb6935042e8614eb14df1b32d07f24ed5598dfbc3b09e64d13fe9544,2024-08-15T21:35:08.530000
CVE-2024-25438,0,0,7a94e2bcbb6935042e8614eb14df1b32d07f24ed5598dfbc3b09e64d13fe9544,2024-08-15T21:35:08.530000
CVE-2024-2544,0,0,ed2d05b42178fff9a17d6f22998085016a1e0e93b19acb35a0624153a8b064cb,2024-08-08T15:27:52.437000
CVE-2024-25442,0,0,eb84b12a8b6870c7b4be7ea073493dd91ec0cf779e81ffeb769d60880071c8d7,2024-02-20T02:15:51.217000
CVE-2024-25443,0,0,f9f46e03349c3c7bab20646f2d76799e4fab073653be96db01bac732191b3058,2024-02-20T02:15:51.313000
@ -246334,7 +246334,7 @@ CVE-2024-25453,0,0,6c26623f3a213339d332369aa2196301f829be136c6f86125273e619866f9
CVE-2024-25454,0,0,8ab63453c76a5630b02c9a4acc28cd19e727677c1ac1b8b1e1b94ff8d701b7fe,2024-02-12T21:39:19.300000
CVE-2024-25458,0,0,883238ad1910abf3be131d65578a9146b081aa618c9d002b21ea014aab5330f3,2024-08-15T16:35:03.913000
CVE-2024-2546,0,0,08a8dee38ee812f84c4c40bdcc0668312236b55abd93840557efb145295c9cba,2024-05-17T02:38:18.283000
CVE-2024-25461,0,1,8db6a140bbc64b5af9f21a58ef0d9e6bf050fd6cc1f8f9c53b140972b95af9fe,2024-08-15T20:35:03.633000
CVE-2024-25461,0,0,8db6a140bbc64b5af9f21a58ef0d9e6bf050fd6cc1f8f9c53b140972b95af9fe,2024-08-15T20:35:03.633000
CVE-2024-25466,0,0,4f8ddadef0f0c470fac1d08a20c254a296296fab619f433d46a2ccdc8a4b306f,2024-02-16T13:37:51.433000
CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e72c,2024-02-20T19:50:53.960000
CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d45fc,2024-02-26T13:42:22.567000
@ -246581,7 +246581,7 @@ CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb
CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded5337,2024-03-18T19:40:00.173000
CVE-2024-25873,0,0,8a4faa4943ee6e0e03bd7795594e92abaa0f28587f9f5694820c6cc3d79de9cd,2024-02-22T19:07:27.197000
CVE-2024-25874,0,0,6d2389bddde8527bf2136be3df99fb38d1df3f190ca0f8297eea242b1fbad855,2024-02-22T19:07:27.197000
CVE-2024-25875,0,1,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000
CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000
CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000
CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000
CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000
@ -246589,7 +246589,7 @@ CVE-2024-25891,0,0,84cfc5f312c597141ee54b1ce3a081aaaa3c04f515375840db467867fd6cd
CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000
CVE-2024-25893,0,0,6074afa7b83b45196c5c6ba86bd6a55a5db84fa3d221197e7e610730da7175c7,2024-02-22T19:07:27.197000
CVE-2024-25894,0,0,110687aa8f80df3297624f90f6f33809d75def9197abe56922d406f86b8dd02c,2024-08-01T13:47:55.813000
CVE-2024-25895,0,1,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000
CVE-2024-25895,0,0,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000
CVE-2024-25896,0,0,08f878ee14441b76754056ef0405ddf3a84202dc82f048a455b46423ba277c2d,2024-02-22T19:07:27.197000
CVE-2024-25897,0,0,3213328e6055109c729a79555e408be1167e003093cb1be559eee482ac1df1a8,2024-08-01T13:47:56.570000
CVE-2024-25898,0,0,44c4d18d364691615141c272c666cd64d62bb83c92d766f5a80a7a5cbee93172,2024-02-22T19:07:27.197000
@ -246692,7 +246692,7 @@ CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48a
CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000
CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000
CVE-2024-25992,0,0,9077f849d4dddde51329fbf2553fb349784d84e4a5aa50feb6dadd6e5e8acf0c,2024-03-12T12:40:13.500000
CVE-2024-25993,0,1,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
CVE-2024-25993,0,0,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000
CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000
CVE-2024-25996,0,0,b7b4bd77042e96294c38d7d1bda93598dd0d513f4128d7212ac13d0be2bb25f7,2024-03-12T12:40:13.500000
@ -247081,7 +247081,7 @@ CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000
CVE-2024-26540,0,0,6576c4885606d2c13376308bfe770084b7f2e54af2c02ae0a3e8966e16709f35,2024-03-15T12:53:06.423000
CVE-2024-26542,0,1,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec010e,2024-08-15T21:35:10.243000
CVE-2024-26542,0,0,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec010e,2024-08-15T21:35:10.243000
CVE-2024-26548,0,0,a14221a020c4eadf543d91f52da71379b261a56fd8977996e8b1456e032b4731,2024-03-01T14:04:26.010000
CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d6e,2024-04-10T13:23:38.787000
CVE-2024-26557,0,0,bce4bb7db30c44200534fa645c4e21a32632f06526ac89541f2afa8ce855d2c7,2024-03-22T12:45:36.130000
@ -247768,7 +247768,7 @@ CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5c
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000
CVE-2024-27218,0,0,b2b126ff7fe34ab697f8634bcd6e10d8f03d8a1ff2b55462d7717768f1583a4d,2024-03-15T20:15:08.960000
CVE-2024-27219,0,1,6380ac10382315d4da0453b5e48de21d3e106d94e656f543da93609a89c868c9,2024-08-15T20:35:06.643000
CVE-2024-27219,0,0,6380ac10382315d4da0453b5e48de21d3e106d94e656f543da93609a89c868c9,2024-08-15T20:35:06.643000
CVE-2024-2722,0,0,3d547fbfae7104f0dbf6c0b76ddd02751536ed8c09a63381f891ff8e3f28de99,2024-03-22T15:34:43.663000
CVE-2024-27220,0,0,6aa117866566feca4db0bf9d961972fe519fb1f249380c2ccd18e46e235df101,2024-03-15T20:15:09.010000
CVE-2024-27221,0,0,275da2c75e59fe51a6d2607d4b2206bfcadad2f1626d8a1a46fd3353d31e8ed1,2024-03-15T20:15:09.050000
@ -248078,7 +248078,7 @@ CVE-2024-2767,0,0,0bf7785127743211b004b316b19cc2da72c8338b0475b0f75d892aa6611c2d
CVE-2024-27673,0,0,b827936180312254f56c8c18e1a9e00f4dbc9d441e499ec6aaa928d4b3451535,2024-04-03T16:15:07.173000
CVE-2024-27674,0,0,21e90956bc1e5ed96e828710d1d2cfc02b0d7dccfda52db8ef3f15b53b564e06,2024-04-03T17:24:18.150000
CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6afb,2024-05-17T02:38:29.203000
CVE-2024-27680,0,1,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000
CVE-2024-27680,0,0,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000
CVE-2024-27683,0,0,907eeb18dbdd6bbefaa7b9be484cc98a16f164c9a600e2bae77550cea0d2db2c,2024-08-14T19:35:21.653000
CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330fdc,2024-03-04T15:35:25.673000
CVE-2024-27689,0,0,2f9863a2ed79e44545ccb0840f57d72c6748eaf9261e1b5cf11563ef5b1b6f39,2024-08-08T21:35:06.920000
@ -248358,11 +248358,11 @@ CVE-2024-28014,0,0,baa237796e504a857089db5ec5b80237d79b2645a24add79eb9cfcbdb3266
CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000
CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000
CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000
CVE-2024-28020,0,1,20d763f6a7d879da851798b82fa90e89f1e3cf4560e3c465ec8e7510e66b7ffc,2024-08-15T21:32:33.467000
CVE-2024-28021,0,1,698af9df63c869e8bcfc4e84d62db6e4d7ff182600a91f2bc02d26dab9f88c10,2024-08-15T21:29:46.697000
CVE-2024-28022,0,1,05ab2292ec2d5764d60dc41d68acf6b7ed0f81413d1d5304ceb85ddefc5f7d7d,2024-08-15T21:44:20.677000
CVE-2024-28020,0,0,20d763f6a7d879da851798b82fa90e89f1e3cf4560e3c465ec8e7510e66b7ffc,2024-08-15T21:32:33.467000
CVE-2024-28021,0,0,698af9df63c869e8bcfc4e84d62db6e4d7ff182600a91f2bc02d26dab9f88c10,2024-08-15T21:29:46.697000
CVE-2024-28022,0,0,05ab2292ec2d5764d60dc41d68acf6b7ed0f81413d1d5304ceb85ddefc5f7d7d,2024-08-15T21:44:20.677000
CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000
CVE-2024-28024,0,1,023885276663800ce2b5419331ef97f1151e80df5fff534e76aea30066f91b6f,2024-08-15T21:46:11.737000
CVE-2024-28024,0,0,023885276663800ce2b5419331ef97f1151e80df5fff534e76aea30066f91b6f,2024-08-15T21:46:11.737000
CVE-2024-28029,0,0,b95079061ab17fc2818c1925165793c8c13dcc14c8729d51ad302026ac5a145d,2024-03-25T16:06:44.403000
CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f31d,2024-04-04T12:48:41.700000
CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000
@ -248699,7 +248699,7 @@ CVE-2024-2860,0,0,46217b9da2b2fddda54a23d86fd9667171b5afae15a6ec5a04d81b349c2499
CVE-2024-2861,0,0,978a1015efa40b0403e35a6152b7f5d6b235fd3f9d4adac2eb469279c47e40ff,2024-05-24T01:15:30.977000
CVE-2024-28613,0,0,a54ab1f2e9b074c0005ceac95268c51f4526b7bbad2e62927797643c18df7693,2024-04-24T13:39:42.883000
CVE-2024-2862,0,0,a23b81783b91b2bbbcfde47ace372e4762456e140bdf506d0fced8226e2738a0,2024-03-25T13:47:14.087000
CVE-2024-28623,0,1,79616151150b38e903c5a53d907c32ebad20bca0de7abc40dd486b1f904d4588,2024-08-15T21:35:11.883000
CVE-2024-28623,0,0,79616151150b38e903c5a53d907c32ebad20bca0de7abc40dd486b1f904d4588,2024-08-15T21:35:11.883000
CVE-2024-28627,0,0,c3fbcb53d4bd8b45e2ac137db3c6b6a64476aafbbecf256367ec9be49dd43388,2024-07-03T01:51:44.343000
CVE-2024-2863,0,0,51f45da8967ac2e9bd5b7be7c2b96b4f6f6eb08fbb2e67a9216114664ff1a479,2024-03-25T13:47:14.087000
CVE-2024-28635,0,0,3ea376c2382b19ba1c40e1ca96db4a046dad170ab353c27de44a820093ca692e,2024-08-02T16:35:41.160000
@ -248715,7 +248715,7 @@ CVE-2024-28667,0,0,a722c74094b46413cd2f0e1e6663b7ae2104332e1b5c605e7cc511a2a8371
CVE-2024-28668,0,0,dfab810650daaa38b417cd38363fcb259e164356905554402cb2ffe391f0ae90,2024-08-02T19:35:34.313000
CVE-2024-28669,0,0,7e7c51ad09a2f0694752bdd394c9ed2f89e1b1247bb99fcc406852b79b139fc6,2024-03-13T18:15:58.530000
CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000
CVE-2024-28670,0,1,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000
CVE-2024-28670,0,0,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000
CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000
CVE-2024-28672,0,0,cd39d1fdf90137bb06b7bf130d6e97d1809e7cb18d315c08621547499fb882df,2024-03-13T18:15:58.530000
CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000
@ -248725,10 +248725,10 @@ CVE-2024-28677,0,0,c212bc6abeb632592f29fbc5fe22ee750468c999ed8be8e2db7f3e23376a0
CVE-2024-28678,0,0,e5023173fc11d3622828b4613c2efc53b1e9700f74a309c2cce387d24da005e5,2024-03-13T18:15:58.530000
CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
CVE-2024-28680,0,1,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000
CVE-2024-28682,0,0,02be1c405dc5aebe82585b37c498baa25485b44921e1eb4fbc423effbc8757f7,2024-03-13T18:15:58.530000
CVE-2024-28683,0,1,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000
CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000
@ -249212,7 +249212,7 @@ CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c
CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000
CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000
CVE-2024-2937,0,0,79954cfe98c2940c0942106d942fe05f3c11cf3e503a3ae1500fa6b5fca01f84,2024-08-05T16:35:09.543000
CVE-2024-29374,0,1,be8e602eebbb83c03bdd549b3faaa1f0dfc77d0ca5e7f9526b71be3aea9cae09,2024-08-15T20:35:09.683000
CVE-2024-29374,0,0,be8e602eebbb83c03bdd549b3faaa1f0dfc77d0ca5e7f9526b71be3aea9cae09,2024-08-15T20:35:09.683000
CVE-2024-29375,0,0,716fc3c8e0ccb042475d24e7fe2ab7abf1b6955d8021a6ba9e6aecf5e8253511,2024-04-04T12:48:41.700000
CVE-2024-29376,0,0,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000
CVE-2024-2938,0,0,ab88b913066937a047849ba483b0f7e9bae4b5bc13ea45b9cc5b395f17c9e679,2024-05-17T02:38:38.137000
@ -249263,7 +249263,7 @@ CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059
CVE-2024-29469,0,0,2079505dc0da5a3cbf2c6e066fddfdad1eb85fcaa078af0bbb19417ca0e16ca0,2024-03-21T12:58:51.093000
CVE-2024-2947,0,0,7fa842f2bc2c8f223df34834539dd7f7d20bc53e8c380819b606cea859d50c0a,2024-06-12T09:15:17.717000
CVE-2024-29470,0,0,56425811d021c212dbd848b24d323bfc83ff20dfcd604f9dd34d98a1dfae7b6e,2024-03-21T12:58:51.093000
CVE-2024-29471,0,1,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000
CVE-2024-29471,0,0,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000
CVE-2024-29472,0,0,e62aac3c11b80b896f7dce9bc263bf444e326ccaa5bb3a22d5f14836d30cf59d,2024-04-30T20:22:59.060000
CVE-2024-29473,0,0,8245ba1b7b6cfc2fd736894d074e12778ffb6419be24c78b4098d989642f62f6,2024-03-21T12:58:51.093000
CVE-2024-29474,0,0,1e6da7c761ee3de98f7b759f0097c1b775ea91f11305f8a90e1129070ffdd028,2024-08-02T20:35:28.270000
@ -250178,14 +250178,14 @@ CVE-2024-30629,0,0,065564e121e3b652e8f433bc4bebac9590da04ba26d95145648a65cf0a32c
CVE-2024-3063,0,0,e4ccb06d5ff3e906359417688d6094345cf7b0c3520fac98072d600493716bc5,2024-05-30T13:15:41.297000
CVE-2024-30630,0,0,d1f2c24f30d736799fbd9614b05322c8af9640ffb03dab0097ee140dec9fb5dc,2024-03-29T13:28:22.880000
CVE-2024-30631,0,0,41f838085add8cf1dec118fb7468de6b4fc9bce111467eb8baa174f9e9137432,2024-08-01T15:35:12.897000
CVE-2024-30632,0,1,3f8589dc8873f1f40fc2805a6241d9d5b4cb8cf8b5c1194f5bfaa117d3af4731,2024-08-15T20:35:11.387000
CVE-2024-30632,0,0,3f8589dc8873f1f40fc2805a6241d9d5b4cb8cf8b5c1194f5bfaa117d3af4731,2024-08-15T20:35:11.387000
CVE-2024-30633,0,0,0e20fbff7533df843343aa1ca8784af549e42237ddf63007c09299ebacdd216c,2024-08-01T13:50:23.153000
CVE-2024-30634,0,0,9a5935e8c0707d47485f35151f5f78ee198d5683ff7c1df187b9b9e0a14e2e20,2024-08-01T13:50:23.927000
CVE-2024-30635,0,0,9867b65ad790b03849102a4433871e5822d9883f60fd5996addd4ba7b4f88aa1,2024-08-01T13:50:24.723000
CVE-2024-30636,0,0,7706c251cc6730da406f80ce2a2cf3af8e2faaef16970992a4ea0e2557948f7a,2024-04-01T01:12:59.077000
CVE-2024-30637,0,0,4903be2e34292b70c4fd64a16207b4d414e56da06073b801c097feb452620a21,2024-07-03T01:54:12.967000
CVE-2024-30638,0,0,3f3309eb59690079a4df49f920e01371c189055cc07ce956d10dd836bf37277b,2024-08-01T15:35:13.663000
CVE-2024-30639,0,1,39f672cc581579724326721635f68afc28980ec46087cc7a94592c4210078965,2024-08-15T20:35:12.280000
CVE-2024-30639,0,0,39f672cc581579724326721635f68afc28980ec46087cc7a94592c4210078965,2024-08-15T20:35:12.280000
CVE-2024-3064,0,0,8a36a79ace74b39564c56ff7401e476ffc08c1a4de80ba6f8cd5a5d5cd60f7fb,2024-04-10T13:23:38.787000
CVE-2024-30645,0,0,77873f1c56920b575cbc0a26f80968d9589bdd66fb005fe46610787de441aca3,2024-08-01T13:50:25.530000
CVE-2024-3065,0,0,0bda0f080fba1f5572d33c440e40f60c6a3ce2d985dfed057962a87436804b26,2024-05-24T01:15:30.977000
@ -250601,6 +250601,7 @@ CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520
CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000
CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000
CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000
CVE-2024-31333,1,1,0efd66e4971ec47af26bb6c2dff2715f6dd2434636f08b23c3145dbb0d2ca6b6,2024-08-15T22:15:06.123000
CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000
CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000
@ -252915,8 +252916,19 @@ CVE-2024-34723,0,0,9ee1e9ea0079333d8123e1479d0c1b548d28a892d3601137f6e64ded9880a
CVE-2024-34724,0,0,0452aa45e04971f6e547ee694d42ca35f85625c1031b931eba0ca8059efefaef,2024-07-12T16:11:39.470000
CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000
CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000
CVE-2024-34727,1,1,d3a2c747ee927f1291c35785807c6dbb5ec4b02ae6150a400652401339eb68d8,2024-08-15T22:15:06.190000
CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000
CVE-2024-34731,1,1,b51cb61d77413f6d67292900a24e1e65fcdd74df05e1169bddd91e74d048994c,2024-08-15T22:15:06.263000
CVE-2024-34734,1,1,292c6f80066717b5f1b331e37b35051d1357dd7ba0e13c2fc70ba8ac1f3eda7c,2024-08-15T22:15:06.337000
CVE-2024-34736,1,1,e31a789529c464401dd83172b804c99ebe04c32cc188ce2e95f92b9abe1bc6ea,2024-08-15T22:15:06.400000
CVE-2024-34737,1,1,01bc6556a83f1b4d4c8b93a5e8d8fc5e20c66cd636d6f8b4490b9dd7c6ff12d3,2024-08-15T22:15:06.467000
CVE-2024-34738,1,1,b8edd06816259c50ad1bd3d5f97e3ecb82fdf4064b0b844f196e639463fab22c,2024-08-15T22:15:06.623000
CVE-2024-34739,1,1,5fc318e22c2b2494f6940e6df370db1ae846597699f2ed5a8136a28604d800ec,2024-08-15T22:15:06.690000
CVE-2024-3474,0,0,f8fe69ded09f8f3335cb0a291c0ff93be246183a89b6f2a9db60adabf1ff9a0d,2024-05-02T13:27:25.103000
CVE-2024-34740,1,1,3abeeb4d3f9946b749c3f47b65fff1950025b42adef7d3e6bb12f887b86192d9,2024-08-15T22:15:06.753000
CVE-2024-34741,1,1,ffc119c2b062b459351b84600fe5fda211e601923a32345a664710007a08e353,2024-08-15T22:15:06.820000
CVE-2024-34742,1,1,810e6764d5ddb3d52b814c091bfdc919e6fb1c2ff52eaed58ccd0c8bd96c8188,2024-08-15T22:15:06.890000
CVE-2024-34743,1,1,e813f78a1c3c1f053825d2df9fc7d52e06e3c3fcd645217e4ada409f53307702,2024-08-15T22:15:06.957000
CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000
CVE-2024-3475,0,0,3d68cde343ddcb97ac984b733d2ae7662c97a24c514b9a563c1c306f42f1759f,2024-05-02T13:27:25.103000
CVE-2024-34750,0,0,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000
@ -255202,27 +255214,27 @@ CVE-2024-38186,0,0,e48699951b83a13a8c545a7bb39dc766d490dd0a39c76d8a25aa85e46c5ed
CVE-2024-38187,0,0,426ec9e92ff0a407b183738cdd31a21c97647274d94618ee0b6aa72a02fffbbf,2024-08-14T02:07:05.410000
CVE-2024-38189,0,0,548200171a7637a1944ce86ea38e36c3daaf16d5a029877c7e9488a838ab8ca5,2024-08-14T02:07:05.410000
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
CVE-2024-38191,0,1,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
CVE-2024-38191,0,0,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07bbe,2024-08-14T16:31:06.880000
CVE-2024-38195,0,1,d7663b0e9aa556c8ce10c21ef451a7d773e7f876b8747c98159d99dc83716a8b,2024-08-15T20:56:25.100000
CVE-2024-38196,0,1,036126fa4e67f7c18a11733658d35aa169249f60e5767c04da0dc3a714533203,2024-08-15T20:54:50.510000
CVE-2024-38197,0,1,9a40abe98c5d54835551587ddc4b75a591055dcd8f35ba539478fb7646793bd3,2024-08-15T20:40:58.547000
CVE-2024-38198,0,1,628cd807f7bcba6952b2c2062766a5214149c29bd5be742232c43abd2bc51e12,2024-08-15T20:39:20.260000
CVE-2024-38199,0,1,642a12aa02f5e7b673baecdb6185f8efbceb0f3cbe1ac18a60e869ce79b2e0f4,2024-08-15T20:32:42.193000
CVE-2024-38195,0,0,d7663b0e9aa556c8ce10c21ef451a7d773e7f876b8747c98159d99dc83716a8b,2024-08-15T20:56:25.100000
CVE-2024-38196,0,0,036126fa4e67f7c18a11733658d35aa169249f60e5767c04da0dc3a714533203,2024-08-15T20:54:50.510000
CVE-2024-38197,0,0,9a40abe98c5d54835551587ddc4b75a591055dcd8f35ba539478fb7646793bd3,2024-08-15T20:40:58.547000
CVE-2024-38198,0,0,628cd807f7bcba6952b2c2062766a5214149c29bd5be742232c43abd2bc51e12,2024-08-15T20:39:20.260000
CVE-2024-38199,0,0,642a12aa02f5e7b673baecdb6185f8efbceb0f3cbe1ac18a60e869ce79b2e0f4,2024-08-15T20:32:42.193000
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000
CVE-2024-38201,0,1,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000
CVE-2024-38201,0,0,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000
CVE-2024-38202,0,0,e2d641c476f9dc13a8d336a19bdebe9a3b3a110a87f90a532b99552457779a18,2024-08-13T18:15:30.203000
CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
CVE-2024-38211,0,1,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000
CVE-2024-38211,0,0,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000
CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000
CVE-2024-38214,0,1,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
CVE-2024-38215,0,0,1d004986cdbbdb186909c75ded4a7501590ae50a83feca56ee16c60de3d95af5,2024-08-14T02:07:05.410000
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
CVE-2024-38219,0,0,e14090e36cb268ebd4ddc662de283a811b72a0453a256d8c6fb64b84db762356,2024-08-13T18:15:31.623000
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
CVE-2024-38223,0,1,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000
CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000
@ -255848,7 +255860,7 @@ CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f3
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
CVE-2024-39338,0,1,b2902b8c8fc819dc7cfd9bba42bea4279b850087be05ea18d3d2870591906304,2024-08-15T20:35:13.427000
CVE-2024-39338,0,0,b2902b8c8fc819dc7cfd9bba42bea4279b850087be05ea18d3d2870591906304,2024-08-15T20:35:13.427000
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
CVE-2024-39340,0,0,5ebdab5b5b68a92db4ff353d7a08162224794f82acef11835fd7731e9f604ef2,2024-08-01T13:55:49.473000
CVE-2024-39345,0,0,a7fe401efcbb2b3728b6e10777ee0a9c04a224d785c5c0839b1d13cfea4ecde8,2024-08-01T13:55:50.247000
@ -256462,7 +256474,7 @@ CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08ed
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
CVE-2024-40697,0,0,bebf3d413c945a3b35cf93ef4b95b34b89f9c389fda4792714ebafea2974c936,2024-08-13T12:58:25.437000
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
CVE-2024-40704,0,1,2cad5906579743e8e98ddcd83d02c56b18a31e7ad68147157b568c3e9be363eb,2024-08-15T20:03:13.530000
CVE-2024-40704,0,0,2cad5906579743e8e98ddcd83d02c56b18a31e7ad68147157b568c3e9be363eb,2024-08-15T20:03:13.530000
CVE-2024-40705,0,0,275d0b75adf60123909502ce4ab0bfe2d790c03f0eb4301b2362936b51ce0432,2024-08-15T19:57:34.780000
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
@ -257433,8 +257445,8 @@ CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c0
CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000
CVE-2024-42482,0,0,b30158f5b674bded8c099de403a1859157e22ee6eae596b9cbf6c6cda1ffed96,2024-08-12T18:57:17.383000
CVE-2024-42485,0,0,fe887079979720fde6a2564dece883024602b52e3edd829141a610d95ce6aeb6,2024-08-12T18:57:17.383000
CVE-2024-42487,1,1,268550579915872b28630196fcd08762a9f824be6b68b39fadbf6356d7ded081,2024-08-15T21:15:16.997000
CVE-2024-42488,1,1,2ac3d3c300a22378eb838a987000238154148bda4b1a1a7af2a05964a033aa16,2024-08-15T21:15:17.270000
CVE-2024-42487,0,0,268550579915872b28630196fcd08762a9f824be6b68b39fadbf6356d7ded081,2024-08-15T21:15:16.997000
CVE-2024-42488,0,0,2ac3d3c300a22378eb838a987000238154148bda4b1a1a7af2a05964a033aa16,2024-08-15T21:15:17.270000
CVE-2024-42489,0,0,1203b17e47b8d78391ae8374fec72a221549be23a40702733d44133e504634fc,2024-08-12T18:57:17.383000
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000
@ -257644,8 +257656,8 @@ CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ff
CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000
CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000
CVE-2024-43360,0,0,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000
CVE-2024-43366,1,1,c6a0c9b79f40e9ac6adfe96e8a726d4a739758a69bf451c548536be75a4590b2,2024-08-15T21:15:17.520000
CVE-2024-43367,1,1,aa40d7ce5e159a344ef88943101f5635e11309c45219cf73c00055952573916e,2024-08-15T21:15:17.777000
CVE-2024-43366,0,0,c6a0c9b79f40e9ac6adfe96e8a726d4a739758a69bf451c548536be75a4590b2,2024-08-15T21:15:17.520000
CVE-2024-43367,0,0,aa40d7ce5e159a344ef88943101f5635e11309c45219cf73c00055952573916e,2024-08-15T21:15:17.777000
CVE-2024-43368,0,0,bc8404f29bdb04258d364b3952f9782a6581bd81b6fee1a7f290b39a6cca9c9f,2024-08-15T13:01:10.150000
CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000
CVE-2024-43373,0,0,69d56183bd2a33523e74549d732339012a778a169f9424729adc89709a9fb8e3,2024-08-15T17:34:07.033000
@ -259383,7 +259395,7 @@ CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
CVE-2024-6453,0,0,a31f9b2d11e920ef5820d5943bd943df178bc2e27d100b648bd1b922afad8eca,2024-07-03T12:53:24.977000
CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000
CVE-2024-6456,1,1,bc36926cd39d9c147941407431b009e2492d4daa481901d0ea883b3657b0a7bf,2024-08-15T21:15:18.047000
CVE-2024-6456,0,0,bc36926cd39d9c147941407431b009e2492d4daa481901d0ea883b3657b0a7bf,2024-08-15T21:15:18.047000
CVE-2024-6457,0,0,2021b397e47ab38cda013de2c201fe3ea53b49570246fbb65269f60be90e5ab4,2024-07-16T13:43:58.773000
CVE-2024-6458,0,0,e6f4f9a699790cfa92517dafe90bcdba32232615fceb305817a9ccda94d06fc4,2024-07-29T14:12:08.783000
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
@ -260166,8 +260178,12 @@ CVE-2024-7830,0,0,45175212ec7bdf20d19dd48afd4b20ecd81d3922aa2b6b23e80ca74b4822c2
CVE-2024-7831,0,0,6b336f36e84f924efd73293c9c063709dd72cbe1db48e780f4be49ea64db2706,2024-08-15T16:15:25.957000
CVE-2024-7832,0,0,00d2014761e47bd40d6e682a4ee12fe2eb058ba3b7621c75452dfb99e80b88e1,2024-08-15T17:34:07.033000
CVE-2024-7833,0,0,41a645ce5af3bb29e8224b7a5935f3873d565966d12ccc5e0059eebfd7ee4d00,2024-08-15T17:34:07.033000
CVE-2024-7838,1,1,c712dc588f45dde05958418e0db93c4d0a113dcbc2aed2850c5d20f660b89673,2024-08-15T20:15:18.457000
CVE-2024-7839,1,1,74eedb667d5f5074a851b0a27ea50f1d8dc2517ed085e073c6a09e4486928282,2024-08-15T21:15:18.237000
CVE-2024-7866,1,1,7b21c6eb36d73c92e1f7d8bb8574d36dfd6e1deee61d5ef7c7c7b7a0b352193c,2024-08-15T20:15:18.793000
CVE-2024-7867,1,1,2c6807e6cda13329c05cc32828904aaff7f4fcd646d878acd15e994ea1a532df,2024-08-15T20:15:18.967000
CVE-2024-7868,1,1,1270b7dc6c77cab6c2ea3d2de21860bb4fd556dbaed1521f53d18e8f28829e9b,2024-08-15T21:15:18.530000
CVE-2024-7838,0,0,c712dc588f45dde05958418e0db93c4d0a113dcbc2aed2850c5d20f660b89673,2024-08-15T20:15:18.457000
CVE-2024-7839,0,0,74eedb667d5f5074a851b0a27ea50f1d8dc2517ed085e073c6a09e4486928282,2024-08-15T21:15:18.237000
CVE-2024-7841,1,1,4632c3971b04a57562f61d399cd515c2019f246d80ccf6d4c535c7b4361e8c28,2024-08-15T22:15:07.020000
CVE-2024-7842,1,1,12f11ac340531e2626da79ded774ccfb3de899c06029be44f6c75df1710957a6,2024-08-15T22:15:07.310000
CVE-2024-7843,1,1,519d47bcb9fc9e3a27bbd644c576e4cb35d41e45b051fa509cdd6678ff80bc77,2024-08-15T23:15:10.453000
CVE-2024-7844,1,1,59508ebc076bca47c92fd6f0f56b8bc2f4a5223afe39a11234df2e1523ff3db6,2024-08-15T23:15:10.740000
CVE-2024-7866,0,0,7b21c6eb36d73c92e1f7d8bb8574d36dfd6e1deee61d5ef7c7c7b7a0b352193c,2024-08-15T20:15:18.793000
CVE-2024-7867,0,0,2c6807e6cda13329c05cc32828904aaff7f4fcd646d878acd15e994ea1a532df,2024-08-15T20:15:18.967000
CVE-2024-7868,0,0,1270b7dc6c77cab6c2ea3d2de21860bb4fd556dbaed1521f53d18e8f28829e9b,2024-08-15T21:15:18.530000

Can't render this file because it is too large.