Auto-Update: 2024-08-06T16:00:17.155581+00:00

This commit is contained in:
cad-safe-bot 2024-08-06 16:03:12 +00:00
parent ee5263fa28
commit fb136c93cf
68 changed files with 2680 additions and 421 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-0346",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-02-15T14:57:07.613",
"lastModified": "2024-05-17T00:54:28.617",
"lastModified": "2024-08-06T15:15:26.393",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125049",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.750",
"lastModified": "2024-05-17T00:58:17.853",
"lastModified": "2024-08-06T14:15:22.223",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.210",
"lastModified": "2024-05-17T00:58:19.220",
"lastModified": "2024-08-06T14:15:22.550",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9426",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-12-31T02:59:01.217",
"lastModified": "2024-06-18T19:15:54.110",
"lastModified": "2024-08-06T14:15:49.283",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9768",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-03-18T14:59:00.123",
"lastModified": "2024-05-17T01:02:24.847",
"lastModified": "2024-08-06T14:15:58.787",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-0824",
"sourceIdentifier": "secure@microsoft.com",
"published": "2018-05-09T19:29:00.370",
"lastModified": "2024-08-06T01:00:01.460",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-06T14:35:00.867",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2024-08-05",
"cisaActionDue": "2024-08-26",
@ -20,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
@ -78,6 +100,16 @@
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [

View File

@ -2,100 +2,15 @@
"id": "CVE-2023-0253",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-02-02T21:22:47.117",
"lastModified": "2023-11-07T03:59:58.583",
"vulnStatus": "Modified",
"lastModified": "2024-08-06T14:16:03.107",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via folder names in versions up to, and including, 4.18.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with author-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
"value": "Rejected reason: **REJECT** Accidental CVE Assignment. Please use CVE-2023-0285."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:devowl:wordpress_real_media_library:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.18.28",
"matchCriteriaId": "FC290C38-868B-4B8B-85FB-864D6823D491"
}
]
}
]
}
],
"references": [
{
"url": "https://devowlio.gitbook.io/changelogs/wordpress-plugins/real-media-library",
"source": "security@wordfence.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://wordpress.org/plugins/real-media-library-lite/",
"source": "security@wordfence.com",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/950d71ae-29a1-4b71-b74a-b1a5c9f3326e",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40289",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T04:15:10.220",
"lastModified": "2024-03-27T12:29:30.307",
"lastModified": "2024-08-06T15:35:03.140",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema de inyecci\u00f3n de comandos en los dispositivos Supermicro X11SSM-F, X11SAE-F y X11SSE-F 1.66. Un atacante puede aprovechar esto para elevar los privilegios de un usuario con privilegios administrativos de BMC."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-40819",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:03.380",
"lastModified": "2024-08-06T14:16:03.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ID4Portais in version < V.2022.837.002a returns message parameter unsanitized in the response, resulting in a HTML Injection vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://miguelsantareno.github.io/id4Portais.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.id4software.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45927",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T04:15:10.847",
"lastModified": "2024-03-27T12:29:30.307",
"lastModified": "2024-08-06T15:35:04.090",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que S-Lang 2.3.2 conten\u00eda una excepci\u00f3n aritm\u00e9tica mediante la funci\u00f3n tt_sprintf()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-703"
}
]
}
],
"references": [
{
"url": "http://lists.jedsoft.org/lists/slang-users/2023/0000003.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49971",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-06T01:15:07.017",
"lastModified": "2024-03-06T15:18:08.093",
"lastModified": "2024-08-06T14:35:02.513",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de cross-site scripting (XSS) en Customer Support System v1 permite a los atacantes ejecutar scripts web arbitrarios o HTML a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de nombre en /customer_support/index.php?page=customer_list."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/geraldoalcantara/CVE-2023-49971",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49979",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T02:49:38.600",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-08-06T15:35:05.213",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de listado de directorios en Customer Support System v1 permite a los atacantes enumerar directorios y archivos confidenciales dentro de la aplicaci\u00f3n sin requerir autorizaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-548"
}
]
}
],
"references": [
{
"url": "https://github.com/geraldoalcantara/CVE-2023-49979",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49983",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T02:49:38.763",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-08-06T14:35:03.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de cross site scripting (XSS) en el componente /management/class de School Fees Management System v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de nombre.."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/geraldoalcantara/CVE-2023-49983",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50895",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T15:15:48.860",
"lastModified": "2024-03-26T17:09:53.043",
"lastModified": "2024-08-06T15:35:06.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En Janitza GridVis hasta la versi\u00f3n 9.0.66, los m\u00e9todos peligrosos expuestos en la funcionalidad de carga del proyecto de.janitza.pasw.project.server.ServerDatabaseProject permiten a usuarios administrativos remotos autenticados ejecutar c\u00f3digo Groovy arbitrario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://code-white.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52584",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-06T07:15:07.227",
"lastModified": "2024-03-06T15:18:08.093",
"lastModified": "2024-08-06T14:35:04.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: spmi: mediatek: reparar UAF en la eliminaci\u00f3n del dispositivo. Los datos del controlador pmif que contienen los relojes se asignan junto con spmi_controller. Al eliminar el dispositivo, primero se liberar\u00e1 spmi_controller y luego se limpiar\u00e1n los devres, incluidos los relojes. Esto lleva a UAF porque al poner los relojes se acceder\u00e1 a los relojes en los datos del controlador pmif, que ya est\u00e1n liberados junto con spmi_controller. Esto se puede reproducir habilitando DEBUG_TEST_DRIVER_REMOVE y compilando el kernel con KASAN. Solucione el problema de UAF utilizando clk_bulk_get() no administrado y poniendo los relojes antes de liberar spmi_controller."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6696",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-15T02:15:50.300",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T14:05:42.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,21 +36,81 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.3.2",
"matchCriteriaId": "D037081F-B950-44C3-B909-D146ECEFB211"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/popup-builder/tags/4.2.3/com/classes/Ajax.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3096000/popup-builder/trunk/com/classes/Ajax.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f86ec30-7a9d-4c36-8559-bde331c8b958?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20005",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-03-04T03:15:06.917",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-08-06T15:35:06.587",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En da, existe una posible omisi\u00f3n de permiso debido a que falta una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08355599; ID del problema: ALPS08355599."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20027",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-03-04T03:15:07.363",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-08-06T15:35:07.420",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541632; ID del problema: ALPS08541633."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2053",
"sourceIdentifier": "cve@takeonme.org",
"published": "2024-03-21T02:52:27.250",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-08-06T15:35:13.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "La aplicaci\u00f3n web administrativa Artica Proxy deserializar\u00e1 objetos PHP arbitrarios proporcionados por usuarios no autenticados y posteriormente permitir\u00e1 la ejecuci\u00f3n de c\u00f3digo como usuario \"www-data\". Este problema se demostr\u00f3 en la versi\u00f3n 4.50 de La aplicaci\u00f3n web administrativa Artica-Proxy intenta evitar la inclusi\u00f3n de archivos locales. Estas protecciones se pueden eludir y las solicitudes de archivos arbitrarias proporcionadas por usuarios no autenticados se devolver\u00e1n de acuerdo con los privilegios del usuario \"www-data\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@takeonme.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22724",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T04:15:09.327",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-08-06T15:35:08.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en osCommerce v4 que permite a atacantes locales eludir las restricciones de carga de archivos y ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de carga de fotos de perfil del administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/osCommerce/osCommerce-V4/issues/62",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23722",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T15:15:49.317",
"lastModified": "2024-03-26T17:09:53.043",
"lastModified": "2024-08-06T14:35:05.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En Fluent Bit 2.1.8 a 2.2.1, se puede provocar una desreferencia de puntero NULL a trav\u00e9s de un payload HTTP no v\u00e1lida con el tipo de contenido x-www-form-urlencoded. Se bloquea y no se reinicia. Esto podr\u00eda provocar que los registros no se entreguen correctamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/fluent/fluent-bit/compare/v2.2.1...v2.2.2",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26566",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-07T01:15:52.757",
"lastModified": "2024-03-07T13:52:27.110",
"lastModified": "2024-08-06T14:35:06.510",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Cute Http File Server v.3.1 permite a un atacante remoto escalar privilegios a trav\u00e9s del componente de verificaci\u00f3n de contrase\u00f1a."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "http://cute.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27564",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T17:15:06.997",
"lastModified": "2024-03-05T18:50:18.333",
"lastModified": "2024-08-06T15:35:10.030",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Server-Side Request Forgery (SSRF) en pictureproxy.php de ChatGPT commit f9f4bbc permite a los atacantes forzar a la aplicaci\u00f3n a realizar solicitudes arbitrarias mediante la inyecci\u00f3n de URL manipuladas en el par\u00e1metro url."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/dirk1983/chatgpt/issues/114",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27707",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-07T21:15:08.510",
"lastModified": "2024-03-08T14:02:57.420",
"lastModified": "2024-08-06T14:35:07.363",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en hcengineering Huly Platform v.0.6.202 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo SVG manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27707",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28335",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T06:15:19.447",
"lastModified": "2024-03-27T12:29:30.307",
"lastModified": "2024-08-06T15:35:11.200",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Lektor anterior a 3.3.11 no sanitiza el path traversal de la base de datos. Por lo tanto, los comandos de shell pueden ejecutarse a trav\u00e9s de un archivo que se agrega al directorio de plantillas, si el navegador web de la v\u00edctima accede a un sitio web que no es de confianza y que usa JavaScript para enviar solicitudes al puerto localhost 5000, y el navegador web se ejecuta en la misma m\u00e1quina que el Comando \"servidor lector\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://brave.com/privacy-updates/27-localhost-permission/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28545",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T21:15:53.070",
"lastModified": "2024-03-27T12:29:30.307",
"lastModified": "2024-08-06T14:35:08.207",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Tenda AC18 V15.03.05.05 contiene una vulnerabilidad de inyecci\u00f3n de comando en el par\u00e1metro deviceName de la funci\u00f3n formsetUsbUnload."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28965",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:51.033",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:30:52.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18.00.20",
"versionEndIncluding": "5.22.00.18",
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28966",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:51.423",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:30:39.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18.00.20",
"versionEndIncluding": "5.22.00.18",
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28967",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:51.660",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:30:14.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18.00.20",
"versionEndIncluding": "5.22.00.18",
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28968",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:51.890",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:29:59.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18.00.20",
"versionEndIncluding": "5.22.00.18",
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28969",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:52.183",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:28:06.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18.00.20",
"versionEndIncluding": "5.22.00.18",
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29168",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T15:15:52.433",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:28:10.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18.00.20",
"versionEndIncluding": "5.22.00.18",
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29684",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T14:15:09.003",
"lastModified": "2024-03-26T17:09:53.043",
"lastModified": "2024-08-06T15:35:12.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que DedeCMS v5.7 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /src/dede/makehtml_homepage.php, lo que permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/iimiss/cms/blob/main/1.md",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-30170",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:03.777",
"lastModified": "2024-08-06T14:16:03.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PrivX before 34.0 allows data exfiltration and denial of service via the REST API. This is fixed in minor versions 33.1, 32.3, 31.3, and later, and in major version 34.0 and later,"
}
],
"metrics": {},
"references": [
{
"url": "https://info.ssh.com/improper-input-validation-faq",
"source": "cve@mitre.org"
},
{
"url": "https://privx.docs.ssh.com/docs/security",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33787",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T13:15:22.060",
"lastModified": "2024-05-03T14:17:53.690",
"lastModified": "2024-08-06T15:35:13.693",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que Hengan Weighing Management Information Query Platform 2019-2021 53.25 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro tuser_Number en search_user.aspx."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/jiankeguyue/VulnerabilityReport/blob/main/hengan_weighing_management_information_query_platform.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33844",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T15:15:08.157",
"lastModified": "2024-06-10T18:45:09.903",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-06T15:35:14.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-33897",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:03.870",
"lastModified": "2024-08-06T14:16:03.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A compromised HMS Networks Cosy+ device could be used to request a Certificate Signing Request from Talk2m for another device, resulting in an availability issue. The issue was patched on the Talk2m production server on April 18, 2024."
}
],
"metrics": {},
"references": [
{
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi",
"source": "cve@mitre.org"
},
{
"url": "https://www.hms-networks.com/cyber-security",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35206",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-06-11T12:15:16.337",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:02:05.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +115,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35207",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-06-11T12:15:16.600",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:02:16.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +115,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35208",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-06-11T12:15:16.923",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:08:17.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -84,6 +104,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +125,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35209",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-06-11T12:15:17.157",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:09:04.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +115,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35210",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-06-11T12:15:17.397",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:09:53.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +115,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35211",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-06-11T12:15:17.643",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:10:56.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +115,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35212",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-06-11T12:15:17.897",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T15:11:27.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -85,8 +105,18 @@
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -95,10 +125,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36424",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T15:15:41.843",
"lastModified": "2024-08-06T15:15:41.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference."
}
],
"metrics": {},
"references": [
{
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-aug-2024-417",
"source": "cve@mitre.org"
},
{
"url": "https://www.k7computing.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40101",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:04.117",
"lastModified": "2024-08-06T14:16:04.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Reflected Cross-site scripting (XSS) vulnerability exists in '/search' in microweber 2.0.15 and earlier allowing unauthenticated remote attackers to inject arbitrary web script or HTML via the 'keywords' parameter."
}
],
"metrics": {},
"references": [
{
"url": "http://microweber.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/microweber/microweber/commit/0dede6886c6df3d1f31c4f4e3ba1ab4a336fbf79",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Aug/1",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-40498",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T17:15:41.670",
"lastModified": "2024-08-05T17:15:41.670",
"lastModified": "2024-08-06T15:35:16.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in PuneethReddyHC Online Shopping sysstem advanced v.1.0 allows an attacker to execute arbitrary code via the register.php"
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en PuneethReddyHC Online Shopping sysstem advanced v.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de Register.php"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Dirac231/CVE-2024-40498",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-40530",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T16:15:36.750",
"lastModified": "2024-08-05T16:15:36.750",
"lastModified": "2024-08-06T15:35:16.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in UAB Lexita PanteraCRM CMS v.401.152 and Patera CRM CMS v.402.072 allows a remote attacker to execute arbitrary code via modification of the X-Forwarded-For header component."
},
{
"lang": "es",
"value": "Vulnerabilidad de permisos inseguros en UAB Lexita PanteraCRM CMS v.401.152 y Patera CRM CMS v.402.072 permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la modificaci\u00f3n del componente de encabezado X-Forwarded-For."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://critical.lt/blog/authorization-bypass-and-mass-assignment-in-pantera-crm/",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-41226",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:04.240",
"lastModified": "2024-08-06T14:16:04.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CSV injection vulnerability in Automation Anywhere Automation 360 version 21094 allows attackers to execute arbitrary code via a crafted payload."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/%40aksalsalimi/cve-2024-41226-response-manipulation-led-to-csv-injection-9ae3182dcc02",
"source": "cve@mitre.org"
},
{
"url": "https://www.automationanywhere.com/products/automation-360",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-41910",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-08-06T14:16:04.350",
"lastModified": "2024-08-06T14:16:04.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XXS vulnerabilities in the version of JavaScript used."
}
],
"metrics": {},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006981-11007005-16/hpsbpy03960",
"source": "hp-security-alert@hp.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-41911",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-08-06T14:16:04.427",
"lastModified": "2024-08-06T14:16:04.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The flaw does not properly neutralize input during a web page generation."
}
],
"metrics": {},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006770-11006795-16/hpsbpy03959",
"source": "hp-security-alert@hp.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-41913",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-08-06T14:16:04.480",
"lastModified": "2024-08-06T14:16:04.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly sanitize User input."
}
],
"metrics": {},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006488-11006512-16/hpsbpy03957",
"source": "hp-security-alert@hp.com"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-41995",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-08-06T07:15:46.330",
"lastModified": "2024-08-06T07:15:46.330",
"lastModified": "2024-08-06T14:35:11.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor."
},
{
"lang": "es",
"value": "La inicializaci\u00f3n de un recurso con una vulnerabilidad predeterminada insegura existe en JavaTM Platform versi\u00f3n 12.89 y versiones anteriores. Si se aprovecha esta vulnerabilidad, el producto puede verse afectado por algunas vulnerabilidades conocidas de TLS1.0 y TLS1.1. En cuanto a los productos/modelos/versiones espec\u00edficos de impresoras multifunci\u00f3n y que contienen la plataforma JavaTM, consulte la informaci\u00f3n proporcionada por el proveedor."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000010",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-42010",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T19:15:38.273",
"lastModified": "2024-08-05T19:15:38.273",
"lastModified": "2024-08-06T14:35:11.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information."
},
{
"lang": "es",
"value": "mod_css_styles en Roundcube hasta 1.5.7 y 1.6.x hasta 1.6.7 permite filtrar insuficientemente secuencias de tokens de hojas de estilo en cascada (CSS) en mensajes de correo electr\u00f3nico renderizados, lo que permite a un atacante remoto obtener informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/roundcube/roundcubemail/releases",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5745",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-07T18:15:10.843",
"lastModified": "2024-06-08T04:15:10.027",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T14:37:59.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bakery_online_ordering_system_project:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203B0034-B8DE-4501-B2C6-F96FD74AB519"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.267414",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.267414",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.351827",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-6651",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-06T06:15:35.973",
"lastModified": "2024-08-06T06:15:35.973",
"lastModified": "2024-08-06T15:35:18.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "El complemento WordPress File Upload de WordPress anterior a 4.24.8 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/65e2c77d-09bd-4a44-81d9-d7a5db0e0f84/",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-6766",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-06T06:15:36.047",
"lastModified": "2024-08-06T06:15:36.047",
"lastModified": "2024-08-06T14:35:12.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The shortcodes-ultimate-pro WordPress plugin before 7.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
},
{
"lang": "es",
"value": "El complemento shortcodes-ultimate-pro de WordPress anterior a 7.2.1 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores ataques de Cross-Site Scripting Almacenado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7212",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T02:15:08.697",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T14:06:56.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,63 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6268_b20220504:*:*:*:*:*:*:*",
"matchCriteriaId": "3D52173F-42E7-4186-A442-5057269446AB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "603DA206-05D4-48FD-A506-F3BD8B4383B2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A7000R/loginauth_password.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.272783",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272783",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378312",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7213",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T03:15:01.817",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T14:07:30.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,64 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6268_b20220504:*:*:*:*:*:*:*",
"matchCriteriaId": "3D52173F-42E7-4186-A442-5057269446AB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "603DA206-05D4-48FD-A506-F3BD8B4383B2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A7000R/setWizardCfg.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.272784",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272784",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378313",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7214",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T03:15:02.127",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T14:08:05.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,63 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7C618F-D415-4075-96A5-45E44B52FB62"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CA0663B-3F55-44EF-AF32-F83AB0411748"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR350/setWanCfg.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.272785",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272785",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378319",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7215",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T04:15:03.760",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T14:20:22.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,64 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:lr1200_firmware:9.3.1cu.2832:*:*:*:*:*:*:*",
"matchCriteriaId": "64C09FF7-B671-4B76-87BD-078F96ED06DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:lr1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E5FD932-A495-4413-9222-11E66C1135BD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR1200/NTPSyncWithHost.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.272786",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272786",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378330",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7216",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T04:15:04.690",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T14:28:51.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,63 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:lr1200_firmware:9.3.1cu.2832:*:*:*:*:*:*:*",
"matchCriteriaId": "64C09FF7-B671-4B76-87BD-078F96ED06DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:lr1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E5FD932-A495-4413-9222-11E66C1135BD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR1200/shadow.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.272787",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272787",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378331",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7383",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-05T14:15:35.130",
"lastModified": "2024-08-05T14:15:35.130",
"lastModified": "2024-08-06T15:15:42.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libnbd. The client did not always correctly verify the NBD server's certificate when using TLS to connect to an NBD server. This issue allows a man-in-the-middle attack on NBD traffic."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en libnbd. El cliente no siempre verificaba correctamente el certificado del servidor NBD cuando usaba TLS para conectarse a un servidor NBD. Este problema permite un ataque de intermediario al tr\u00e1fico NBD."
}
],
"metrics": {
@ -18,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7521",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.167",
"lastModified": "2024-08-06T13:15:57.167",
"lastModified": "2024-08-06T14:35:13.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904644",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7529",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.657",
"lastModified": "2024-08-06T13:15:57.657",
"lastModified": "2024-08-06T14:35:14.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-451"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903187",

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7552",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-06T15:15:42.297",
"lastModified": "2024-08-06T15:15:42.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in DataGear up to 5.0.0. It has been declared as critical. Affected by this vulnerability is the function evaluateVariableExpression of the file ConversionSqlParamValueMapper.java of the component Data Schema Page. The manipulation leads to improper neutralization of special elements used in an expression language statement. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273697 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-917"
}
]
}
],
"references": [
{
"url": "https://gitee.com/datagear/datagear/issues/IAF3H7",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.273697",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.273697",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.386413",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-06T14:00:17.304709+00:00
2024-08-06T16:00:17.155581+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-06T13:54:06.807000+00:00
2024-08-06T15:35:18.050000+00:00
```
### Last Data Feed Release
@ -33,66 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
259118
259128
```
### CVEs added in the last Commit
Recently added CVEs: `47`
Recently added CVEs: `10`
- [CVE-2024-33989](CVE-2024/CVE-2024-339xx/CVE-2024-33989.json) (`2024-08-06T13:15:54.757`)
- [CVE-2024-33990](CVE-2024/CVE-2024-339xx/CVE-2024-33990.json) (`2024-08-06T13:15:54.973`)
- [CVE-2024-33991](CVE-2024/CVE-2024-339xx/CVE-2024-33991.json) (`2024-08-06T13:15:55.250`)
- [CVE-2024-33992](CVE-2024/CVE-2024-339xx/CVE-2024-33992.json) (`2024-08-06T13:15:55.487`)
- [CVE-2024-33993](CVE-2024/CVE-2024-339xx/CVE-2024-33993.json) (`2024-08-06T13:15:55.693`)
- [CVE-2024-33994](CVE-2024/CVE-2024-339xx/CVE-2024-33994.json) (`2024-08-06T13:15:55.897`)
- [CVE-2024-43114](CVE-2024/CVE-2024-431xx/CVE-2024-43114.json) (`2024-08-06T13:15:56.130`)
- [CVE-2024-6357](CVE-2024/CVE-2024-63xx/CVE-2024-6357.json) (`2024-08-06T13:15:56.333`)
- [CVE-2024-6358](CVE-2024/CVE-2024-63xx/CVE-2024-6358.json) (`2024-08-06T13:15:56.547`)
- [CVE-2024-6359](CVE-2024/CVE-2024-63xx/CVE-2024-6359.json) (`2024-08-06T13:15:56.757`)
- [CVE-2024-7518](CVE-2024/CVE-2024-75xx/CVE-2024-7518.json) (`2024-08-06T13:15:56.970`)
- [CVE-2024-7519](CVE-2024/CVE-2024-75xx/CVE-2024-7519.json) (`2024-08-06T13:15:57.040`)
- [CVE-2024-7520](CVE-2024/CVE-2024-75xx/CVE-2024-7520.json) (`2024-08-06T13:15:57.107`)
- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T13:15:57.167`)
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-06T13:15:57.237`)
- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-06T13:15:57.297`)
- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-06T13:15:57.357`)
- [CVE-2024-7525](CVE-2024/CVE-2024-75xx/CVE-2024-7525.json) (`2024-08-06T13:15:57.420`)
- [CVE-2024-7526](CVE-2024/CVE-2024-75xx/CVE-2024-7526.json) (`2024-08-06T13:15:57.483`)
- [CVE-2024-7527](CVE-2024/CVE-2024-75xx/CVE-2024-7527.json) (`2024-08-06T13:15:57.543`)
- [CVE-2024-7528](CVE-2024/CVE-2024-75xx/CVE-2024-7528.json) (`2024-08-06T13:15:57.600`)
- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T13:15:57.657`)
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-06T13:15:57.723`)
- [CVE-2024-7531](CVE-2024/CVE-2024-75xx/CVE-2024-7531.json) (`2024-08-06T13:15:57.787`)
- [CVE-2024-7551](CVE-2024/CVE-2024-75xx/CVE-2024-7551.json) (`2024-08-06T13:15:57.850`)
- [CVE-2023-40819](CVE-2023/CVE-2023-408xx/CVE-2023-40819.json) (`2024-08-06T14:16:03.380`)
- [CVE-2024-30170](CVE-2024/CVE-2024-301xx/CVE-2024-30170.json) (`2024-08-06T14:16:03.777`)
- [CVE-2024-33897](CVE-2024/CVE-2024-338xx/CVE-2024-33897.json) (`2024-08-06T14:16:03.870`)
- [CVE-2024-36424](CVE-2024/CVE-2024-364xx/CVE-2024-36424.json) (`2024-08-06T15:15:41.843`)
- [CVE-2024-40101](CVE-2024/CVE-2024-401xx/CVE-2024-40101.json) (`2024-08-06T14:16:04.117`)
- [CVE-2024-41226](CVE-2024/CVE-2024-412xx/CVE-2024-41226.json) (`2024-08-06T14:16:04.240`)
- [CVE-2024-41910](CVE-2024/CVE-2024-419xx/CVE-2024-41910.json) (`2024-08-06T14:16:04.350`)
- [CVE-2024-41911](CVE-2024/CVE-2024-419xx/CVE-2024-41911.json) (`2024-08-06T14:16:04.427`)
- [CVE-2024-41913](CVE-2024/CVE-2024-419xx/CVE-2024-41913.json) (`2024-08-06T14:16:04.480`)
- [CVE-2024-7552](CVE-2024/CVE-2024-75xx/CVE-2024-7552.json) (`2024-08-06T15:15:42.297`)
### CVEs modified in the last Commit
Recently modified CVEs: `22`
Recently modified CVEs: `56`
- [CVE-2014-4608](CVE-2014/CVE-2014-46xx/CVE-2014-4608.json) (`2024-08-06T12:15:20.573`)
- [CVE-2014-5160](CVE-2014/CVE-2014-51xx/CVE-2014-5160.json) (`2024-08-06T12:15:31.283`)
- [CVE-2014-6392](CVE-2014/CVE-2014-63xx/CVE-2014-6392.json) (`2024-08-06T13:15:27.023`)
- [CVE-2014-7042](CVE-2014/CVE-2014-70xx/CVE-2014-7042.json) (`2024-08-06T13:15:35.490`)
- [CVE-2024-37343](CVE-2024/CVE-2024-373xx/CVE-2024-37343.json) (`2024-08-06T13:48:32.297`)
- [CVE-2024-37344](CVE-2024/CVE-2024-373xx/CVE-2024-37344.json) (`2024-08-06T13:49:14.817`)
- [CVE-2024-37345](CVE-2024/CVE-2024-373xx/CVE-2024-37345.json) (`2024-08-06T13:49:26.063`)
- [CVE-2024-37347](CVE-2024/CVE-2024-373xx/CVE-2024-37347.json) (`2024-08-06T13:50:02.077`)
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-06T13:35:01.497`)
- [CVE-2024-40951](CVE-2024/CVE-2024-409xx/CVE-2024-40951.json) (`2024-08-06T13:29:07.827`)
- [CVE-2024-41684](CVE-2024/CVE-2024-416xx/CVE-2024-41684.json) (`2024-08-06T13:25:49.640`)
- [CVE-2024-41685](CVE-2024/CVE-2024-416xx/CVE-2024-41685.json) (`2024-08-06T12:51:23.760`)
- [CVE-2024-41686](CVE-2024/CVE-2024-416xx/CVE-2024-41686.json) (`2024-08-06T13:20:05.540`)
- [CVE-2024-5179](CVE-2024/CVE-2024-51xx/CVE-2024-5179.json) (`2024-08-06T12:10:17.047`)
- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-08-06T12:15:52.700`)
- [CVE-2024-7172](CVE-2024/CVE-2024-71xx/CVE-2024-7172.json) (`2024-08-06T12:51:40.243`)
- [CVE-2024-7173](CVE-2024/CVE-2024-71xx/CVE-2024-7173.json) (`2024-08-06T12:52:46.230`)
- [CVE-2024-7174](CVE-2024/CVE-2024-71xx/CVE-2024-7174.json) (`2024-08-06T13:14:59.030`)
- [CVE-2024-7175](CVE-2024/CVE-2024-71xx/CVE-2024-7175.json) (`2024-08-06T12:57:14.623`)
- [CVE-2024-7176](CVE-2024/CVE-2024-71xx/CVE-2024-7176.json) (`2024-08-06T12:58:00.850`)
- [CVE-2024-7177](CVE-2024/CVE-2024-71xx/CVE-2024-7177.json) (`2024-08-06T13:15:14.603`)
- [CVE-2024-7217](CVE-2024/CVE-2024-72xx/CVE-2024-7217.json) (`2024-08-06T13:54:06.807`)
- [CVE-2024-29684](CVE-2024/CVE-2024-296xx/CVE-2024-29684.json) (`2024-08-06T15:35:12.520`)
- [CVE-2024-33787](CVE-2024/CVE-2024-337xx/CVE-2024-33787.json) (`2024-08-06T15:35:13.693`)
- [CVE-2024-33844](CVE-2024/CVE-2024-338xx/CVE-2024-33844.json) (`2024-08-06T15:35:14.480`)
- [CVE-2024-35206](CVE-2024/CVE-2024-352xx/CVE-2024-35206.json) (`2024-08-06T15:02:05.777`)
- [CVE-2024-35207](CVE-2024/CVE-2024-352xx/CVE-2024-35207.json) (`2024-08-06T15:02:16.163`)
- [CVE-2024-35208](CVE-2024/CVE-2024-352xx/CVE-2024-35208.json) (`2024-08-06T15:08:17.727`)
- [CVE-2024-35209](CVE-2024/CVE-2024-352xx/CVE-2024-35209.json) (`2024-08-06T15:09:04.427`)
- [CVE-2024-35210](CVE-2024/CVE-2024-352xx/CVE-2024-35210.json) (`2024-08-06T15:09:53.797`)
- [CVE-2024-35211](CVE-2024/CVE-2024-352xx/CVE-2024-35211.json) (`2024-08-06T15:10:56.163`)
- [CVE-2024-35212](CVE-2024/CVE-2024-352xx/CVE-2024-35212.json) (`2024-08-06T15:11:27.243`)
- [CVE-2024-40498](CVE-2024/CVE-2024-404xx/CVE-2024-40498.json) (`2024-08-06T15:35:16.133`)
- [CVE-2024-40530](CVE-2024/CVE-2024-405xx/CVE-2024-40530.json) (`2024-08-06T15:35:16.910`)
- [CVE-2024-41995](CVE-2024/CVE-2024-419xx/CVE-2024-41995.json) (`2024-08-06T14:35:11.420`)
- [CVE-2024-42010](CVE-2024/CVE-2024-420xx/CVE-2024-42010.json) (`2024-08-06T14:35:11.647`)
- [CVE-2024-5745](CVE-2024/CVE-2024-57xx/CVE-2024-5745.json) (`2024-08-06T14:37:59.943`)
- [CVE-2024-6651](CVE-2024/CVE-2024-66xx/CVE-2024-6651.json) (`2024-08-06T15:35:18.050`)
- [CVE-2024-6766](CVE-2024/CVE-2024-67xx/CVE-2024-6766.json) (`2024-08-06T14:35:12.940`)
- [CVE-2024-7212](CVE-2024/CVE-2024-72xx/CVE-2024-7212.json) (`2024-08-06T14:06:56.937`)
- [CVE-2024-7213](CVE-2024/CVE-2024-72xx/CVE-2024-7213.json) (`2024-08-06T14:07:30.757`)
- [CVE-2024-7214](CVE-2024/CVE-2024-72xx/CVE-2024-7214.json) (`2024-08-06T14:08:05.393`)
- [CVE-2024-7215](CVE-2024/CVE-2024-72xx/CVE-2024-7215.json) (`2024-08-06T14:20:22.733`)
- [CVE-2024-7216](CVE-2024/CVE-2024-72xx/CVE-2024-7216.json) (`2024-08-06T14:28:51.927`)
- [CVE-2024-7383](CVE-2024/CVE-2024-73xx/CVE-2024-7383.json) (`2024-08-06T15:15:42.053`)
- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T14:35:13.910`)
- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T14:35:14.733`)
## Download and Usage

View File

@ -58032,7 +58032,7 @@ CVE-2013-0342,0,0,4471e381bb904f42e1225d0c50716ce099566388527839f843982bff65e506
CVE-2013-0343,0,0,d601f03b4292a165ff85c2233b2ea9076b23f8d751ea319dd7590593e716209b,2014-03-06T04:42:55.320000
CVE-2013-0344,0,0,2bab4429ace9671842d0c22737e04c939c56fe2af723a77e7dde2b0a9a1d300f,2023-11-07T02:13:49.473000
CVE-2013-0345,0,0,3a95194eeb521b2e6f1ee7c9eaf2b2f72734cbc2670460b78e6ffd290add1caa,2023-11-07T02:13:49.703000
CVE-2013-0346,0,0,77c518f6d8a33f0743b7024e34ce54240c36b72666f7023765dec035c23fce42,2024-05-17T00:54:28.617000
CVE-2013-0346,0,1,b191e502f3fa8c95d9478015b70b856aa6124bac2218750c2963289c2c7da054,2024-08-06T15:15:26.393000
CVE-2013-0347,0,0,cbaa0b6718b5da7941fca183a4523b08c90d3930dadcf630873dffb9ec2c7542,2017-08-29T01:33:01.447000
CVE-2013-0348,0,0,bceb35a9d0f0cf9e4cbd29a5b700205808dcfcd1fbcd73c39b7c768b27f71a55,2023-02-13T04:41:11.723000
CVE-2013-0349,0,0,abaf6b307a930c56bd97aea4fd1857c974e73546900b91ddb95c54847f96c088,2023-02-13T04:41:12.260000
@ -65660,7 +65660,7 @@ CVE-2014-125045,0,0,eed804cf9ec3cda3b306f17dea743239c7afdf8472aee6950fbd1db2a3a6
CVE-2014-125046,0,0,cbfb9e4de8f1d7a45082f6e1c93c64361c413e127176fdd66b519c2aa511cd1d,2024-05-17T00:58:17.447000
CVE-2014-125047,0,0,78c153947ad2275b5e7f06789bf1190cc7f61e6eb3574d68ae1b12b2fe9e1952,2024-05-17T00:58:17.557000
CVE-2014-125048,0,0,943dbc3620f50e0790f79463f75ac1daba50a41e53a1f1a92d6550a36d1ed073,2024-05-17T00:58:17.677000
CVE-2014-125049,0,0,82c1840893cef2a5e7e983e8cc71c3a03743411a05f4e60ce55630c47a168a11,2024-05-17T00:58:17.853000
CVE-2014-125049,0,1,b393ff1dad904db8d3ed9a82ba1dfaaf005eb456e57dc4bea5ee9f2bb003f927,2024-08-06T14:15:22.223000
CVE-2014-125050,0,0,978102de0c3ac375d8dd6f63f1e79773857cca3fd35b21066bb54cc1cfddd954,2024-05-17T00:58:17.987000
CVE-2014-125051,0,0,1fe526d81b21da2c5ee174e9978ae8d8a856dfd704166eeac1a9c91d58f4da14,2024-05-17T00:58:18.107000
CVE-2014-125052,0,0,87c6ed88483cd5ec8eff9f5028f0cdcdd81cc1227c5ec6d55d52fc7ed41ca2a6,2024-05-17T00:58:18.213000
@ -65672,7 +65672,7 @@ CVE-2014-125057,0,0,1aefdb3d8a971871b35d357c2653629cb0b983012c7329337354e21026b2
CVE-2014-125058,0,0,4fd89cf0f845a5c9e57ad4b0db51c0644ca17200e8eb41c5acc5c638fb40e449,2024-05-17T00:58:18.873000
CVE-2014-125059,0,0,856be1a116015207ffee96b2d7ce0ffa0c79914d27c818ea423d3ddc5c2f1d5c,2024-05-17T00:58:18.997000
CVE-2014-125060,0,0,acf0298b6c7af775a0e782f55c0d1ca09710354b530fd2b28f7770de9d5632e3,2024-05-17T00:58:19.113000
CVE-2014-125061,0,0,82099c97023432469b8984f9afe4eb97c002a637ab17c625dc27d20055e1c0a8,2024-05-17T00:58:19.220000
CVE-2014-125061,0,1,286b882d8e5f6f27ce3bf1e5659b6de9d7bcd06ba7f41910caeb983360f56cd9,2024-08-06T14:15:22.550000
CVE-2014-125062,0,0,9db2cea284008ad565f547025daedb3b7e36ec9d709524152d454289015f0ae8,2024-05-17T00:58:19.333000
CVE-2014-125063,0,0,e37d77b1c12534b9a119ab56332ec6a2d2dffc5d223d8bf8f3e9e1cadcbbc1f5,2024-05-17T00:58:19.460000
CVE-2014-125064,0,0,f67b1fb91d695d95fc8098b7881a95c27fdf25a65e8b4b8fea8bd3ea9e899f1e,2023-11-07T02:18:39.450000
@ -68695,7 +68695,7 @@ CVE-2014-4604,0,0,9518cff87a2419d611e6369af0b5c4a14f017a8d094ba5b2e600de3e5231e4
CVE-2014-4605,0,0,3f8874c6518c37d68f8b25cb763dcf2b4510b487a19d99c3c6af4f1a0c21db16,2014-07-09T18:48:18.740000
CVE-2014-4606,0,0,d63114f062b715dc6ca859784e1b1a7c721b7d45d271547d389d7b867f9acb5d,2014-07-09T18:45:46.887000
CVE-2014-4607,0,0,76c308a41abef0a008fc88a19bef429b478190e1a2cb12963321920266d2788b,2020-02-14T15:26:45.467000
CVE-2014-4608,0,1,d7818b75eb63e09ed586b436a27cb492605255a958deea147ea583e62d058ab2,2024-08-06T12:15:20.573000
CVE-2014-4608,0,0,d7818b75eb63e09ed586b436a27cb492605255a958deea147ea583e62d058ab2,2024-08-06T12:15:20.573000
CVE-2014-4609,0,0,02f363f1f4d393ebc3c8ae96b30f28d565a2167efe6f6ed5eba18e083e921498,2020-01-21T16:49:14.900000
CVE-2014-4610,0,0,69e982ba357cffccbdeb69b942e2cf7fc23318c8f6e1a1c9ce98382bdefeb111,2020-01-21T16:15:47.263000
CVE-2014-4611,0,0,5b0a0b2d930406e341b0eadab49a8c3103b3e070a88dd1cdbb44744d7348b67a,2023-11-07T02:20:35.810000
@ -69125,7 +69125,7 @@ CVE-2014-5149,0,0,bf89fff2b7d7fb1898245bb39172b1690d6a6dcf714f55e192c833521f8f3f
CVE-2014-5157,0,0,20b30f94262d35528c8c4054941678b4012e0d73ca1bb989ac5bc05faea16745,2023-11-07T02:20:43.213000
CVE-2014-5158,0,0,69b174d059b5613fbc8787663238e346de163fb5a34219ad608f575a9d07052b,2014-08-21T16:49:13.957000
CVE-2014-5159,0,0,cbb914a4ffff4faac8f656bc14172cec1f496e6b93a106c0c0a79bbaac7e0927,2014-08-21T16:52:27.390000
CVE-2014-5160,0,1,4b2352f6464a75082758270dbf5c3391ffefca2a37eee1b8ed504162c9b1e1f0,2024-08-06T12:15:31.283000
CVE-2014-5160,0,0,4b2352f6464a75082758270dbf5c3391ffefca2a37eee1b8ed504162c9b1e1f0,2024-08-06T12:15:31.283000
CVE-2014-5161,0,0,a5733c5886a7fd117f35743a4d62fb2ad6f5bf3a7398054dce26553f65b41efc,2023-11-07T02:20:43.307000
CVE-2014-5162,0,0,55a074f06578f9c03bbfb061862adc51ce82414234c86ddb99e28cc655d69793,2023-11-07T02:20:43.360000
CVE-2014-5163,0,0,0d197e409f0d56efe3be7ebc23f3a7a6c6ce2765c03651d4015b2d3f057df755,2023-11-07T02:20:43.433000
@ -70207,7 +70207,7 @@ CVE-2014-6386,0,0,ef82c1e20abd6fddce3e54b667e7069b568034a8a8ee66cf3efaa7bdfccd29
CVE-2014-6387,0,0,972e3cbc4b72a77f92f3f7627c7f26ba687ffa97ddb3c5305d3a355fcf6350d9,2021-01-12T18:05:59.507000
CVE-2014-6388,0,0,12f3ce7c137bfe0765d68119caeb7cfc8dada96a9a6b2446d364aa74c4dd90ac,2023-11-07T02:21:00.773000
CVE-2014-6389,0,0,cad73347ec1c88f3955ef944343f00ae78ebbc3947c86a62e6caddd8575ff04c,2017-09-08T01:29:14.323000
CVE-2014-6392,0,1,3db4ef1e4fe085e0638122cb471c43a37cb37498a278324f315c328222f3f3f4,2024-08-06T13:15:27.023000
CVE-2014-6392,0,0,3db4ef1e4fe085e0638122cb471c43a37cb37498a278324f315c328222f3f3f4,2024-08-06T13:15:27.023000
CVE-2014-6393,0,0,43d76059da78ad5015fd5bfe8333a1086660d3510e767febac7e3c8cd7f4e226,2021-07-30T16:36:04.447000
CVE-2014-6394,0,0,f9d29995346dd1a27f941fddd5be7eae240f45195f583c62fd35d1e336f0f9bb,2017-09-08T01:29:14.403000
CVE-2014-6395,0,0,92184a2aefd3b7037f480e16eee81c1021d8086a8a1934d26adf4b6e3c966cad,2020-02-26T13:35:52.343000
@ -70831,7 +70831,7 @@ CVE-2014-7038,0,0,43f538f66efc5a0c9ad9f347bb92dc3cbfb62bf8ff2fecbcbb9adb1fe0e25b
CVE-2014-7039,0,0,703bbb7bc8333bb3b0e81946f5cdb59e2ae7d57563c96580667bb6016b90dc2e,2014-11-14T14:06:58.313000
CVE-2014-7040,0,0,df752d3efa2c8bb27ed54b80f43838fcc810331450911bf5b97c5b0e975f11f3,2014-11-14T14:06:59.797000
CVE-2014-7041,0,0,679e23897b29337d95abcfa90d66f31ec7b4ab58714df1e3ec10ab4c456c8295,2014-11-14T14:07:01.280000
CVE-2014-7042,0,1,db198955c833abbabf9aa9f650c060841319cd06a7da8bb948630e373b355c43,2024-08-06T13:15:35.490000
CVE-2014-7042,0,0,db198955c833abbabf9aa9f650c060841319cd06a7da8bb948630e373b355c43,2024-08-06T13:15:35.490000
CVE-2014-7043,0,0,03b4d65083446f9c65cc7361c07ac8e1850c3c51a82b557ccf21e09a43ad55f7,2014-11-14T14:07:04.283000
CVE-2014-7044,0,0,1d41bf09ddf845283a05e370faa8421a4366b01485587d02fbb366d598d4646a,2014-11-14T17:10:15.843000
CVE-2014-7045,0,0,20a5cd0a4191deb5ad84964202c6c6b980f988bed5b64a3a08d5d4e3831719a0,2014-11-14T14:07:07.250000
@ -72938,7 +72938,7 @@ CVE-2014-9422,0,0,27c8e7a0cf99a84ef981b8b2b672e59145d9cb55a8a19433f70fca6bfaa621
CVE-2014-9423,0,0,dbadccf52a483c15e53cbfc8cff4f8c35dff181abefb76aad09cc936bb620341,2020-01-21T15:46:57.183000
CVE-2014-9424,0,0,55bdda0c39ccc1cb32dee00597a52f0dc9d40ef04ef47b61da3a378a5e610d68,2014-12-30T15:35:22.727000
CVE-2014-9425,0,0,dccca6d22e6a40ca8c10cd53a77b3ca62bb27fbd6d878e5c45a7840efff9cab2,2023-11-07T02:23:05.040000
CVE-2014-9426,0,0,20e9ae0287a288c83b276d0b257a3280fbc25e61217050c282dbe119233666bf,2024-06-18T19:15:54.110000
CVE-2014-9426,0,1,a5eaef3f086db66e1ab8ff75649475d0278e443df35e2d68d2b965ffc409b8a9,2024-08-06T14:15:49.283000
CVE-2014-9427,0,0,cdf611994b2bbdb6383e0c3ae8d5b7d74beb486f34c9d704c2cf8812d341710e,2023-11-07T02:23:05.237000
CVE-2014-9428,0,0,dab4fb56a8e7f25bde74bf56cfa79dff31b355fde3d82e45f5476f14c98784f0,2023-11-07T02:23:05.363000
CVE-2014-9429,0,0,545088f5923f35de470761ad7721527bc41230312934d94b14622336a9798a18,2017-09-08T01:29:34.293000
@ -73240,7 +73240,7 @@ CVE-2014-9764,0,0,cacd5acafcefb8186b47fc7e51a9d5c47e874aca0191c586b47f445115a378
CVE-2014-9765,0,0,9efee6b8c44e63c72e1718617dead54c566fb5a7750472374ccecad758eb70f6,2018-10-30T16:27:35.843000
CVE-2014-9766,0,0,ff424ed579229b4a2b86589fffee606029021f20d93c0f32b4dbfd81b5198e34,2016-12-03T03:02:14.157000
CVE-2014-9767,0,0,b0a7fea4d4f417aeb431720a83fe4dbe6bb7e79430d9430508222b6616634e08,2018-01-05T02:29:58.057000
CVE-2014-9768,0,0,d0599213bd11230047ba599621950e3e584150950b940553696c7bac7323fd17,2024-05-17T01:02:24.847000
CVE-2014-9768,0,1,5893c4c78958bfe31a6c5c0facd02bc6409e40d180d4f8e0f1999fa395f311c6,2024-08-06T14:15:58.787000
CVE-2014-9769,0,0,d970084f0ba2138c1c650e05172723273c843e0f088bca687b68b71bdfdfcf2d,2016-12-03T03:02:15.143000
CVE-2014-9770,0,0,a1806e4e18121383b4b0d4b8c130e671a0df41623b0b76b575d2954139057b5d,2023-11-07T02:23:10.903000
CVE-2014-9771,0,0,c54798ef1d5f4ed616450603410dcd5cad82e3440be07bcc7ee5478bf15914c1,2016-12-01T02:59:16.980000
@ -110521,7 +110521,7 @@ CVE-2018-0820,0,0,37d589a7f7767da548742f43b26a7c38d523c69858e08b8d59487fdbeb3dfa
CVE-2018-0821,0,0,37dec9a7b0ae2ffd8a131f1a880202d0667df20584fc6dd4d2087710ee9368d0,2019-10-03T00:03:26.223000
CVE-2018-0822,0,0,c66251d7b34352211af4f5a1245ff2487d2b8b80cc2206f069acf1fd0551276c,2019-10-03T00:03:26.223000
CVE-2018-0823,0,0,ac2d84c2f389fa31c4d934d83621a09019f5c8716fb56f16749dd620acccf433,2019-10-03T00:03:26.223000
CVE-2018-0824,0,0,eced6f1cbffe1f5b96b9bea7e681149493819c6e5b28b166af2eb9b8efc1bdf9,2024-08-06T01:00:01.460000
CVE-2018-0824,0,1,3538c9e425a98f5058c4bd07c6968555c87fe136fa8b058010f08867c80d8ba6,2024-08-06T14:35:00.867000
CVE-2018-0825,0,0,19d1e409c71f6bdd74f7307c0ca3ae6349435b385c177c0f107f15ffa26c9de1,2022-05-23T17:29:15.350000
CVE-2018-0826,0,0,0262a58d145e4ac0fc914edffbaef5cbfb5a2eb6406789cd178f229c4198538c,2019-10-03T00:03:26.223000
CVE-2018-0827,0,0,ea8505a0898212d1f009c625f74ba880dc432a66250be2699ee30b8136b4f69f,2019-10-03T00:03:26.223000
@ -212668,7 +212668,7 @@ CVE-2023-0249,0,0,8a3ef8711a0a45a0819b562d3824daf4341cfb3c37e4c184eeef72a1ce380b
CVE-2023-0250,0,0,4f7de0411417fecef5cd38f512ca4c728f31d0a3ad9492df2a065dd6c7bc16c7,2023-11-07T03:59:57.943000
CVE-2023-0251,0,0,ca2450aab4d0f63d7af8b697f02293fb4fb9898b6373eb4de69a005f8eb253c4,2023-11-07T03:59:58.143000
CVE-2023-0252,0,0,9ae0dd213557920079a316d4f67b811e41aee4dadc3651991cb66d3c29449692,2023-11-07T03:59:58.340000
CVE-2023-0253,0,0,218bfb62dcc835e8b8d376b1b197f7b341b0de1eff2b647556a4dc2a79f616cc,2023-11-07T03:59:58.583000
CVE-2023-0253,0,1,56664b6d4881df27e472f68bd514e7717b560d97e07b80f17e5aa7ca48bd37f1,2024-08-06T14:16:03.107000
CVE-2023-0254,0,0,97e32cf56eaa0768acdfb7c9a4705613297f0061618780bdd2cd4d513c9eb841,2023-11-07T03:59:58.800000
CVE-2023-0255,0,0,4193c746774feb4991615ea0eba109a5f90f52c9d573422ddccd9e021ff58cf3,2023-11-07T03:59:59.033000
CVE-2023-0256,0,0,16b9dd49367b70513410c61ab596ab6d6562aa4d78f1468a72bc8b56e191d319,2024-05-17T02:17:13.503000
@ -230199,7 +230199,7 @@ CVE-2023-40285,0,0,83b82ed527d697100085339079e77b22440ed016f262c72a7b2bcfd1d63eb
CVE-2023-40286,0,0,9555e7cb17222ef621f38f143cfd62c7e7e90c13b5d8aacdb1efb275f994eafa,2024-08-03T20:35:01.303000
CVE-2023-40287,0,0,7ee226484007e2fe9c179b9a494f02a4ab444ae5392fb9574a50b48bb768486d,2024-08-05T15:35:04.253000
CVE-2023-40288,0,0,0b2574f2e5ec339d07ef2936cf971235d46d87acc84d249edd7a4882b5e2e6a1,2024-08-05T15:35:05.700000
CVE-2023-40289,0,0,123e5bbdfe93e2317673572aa8189a733fb7f15faee24ca97a892225b61beede,2024-03-27T12:29:30.307000
CVE-2023-40289,0,1,34a9e46de0be389e67c072c4ccc060a9e6f0f34fabcbc8b066546c6e5c6f78e6,2024-08-06T15:35:03.140000
CVE-2023-4029,0,0,952a39b088e8eb68f0fbf483bea0a12395075a40ee44c63cd47f8dce1f45dd8f,2023-08-24T20:27:25.837000
CVE-2023-40290,0,0,d5244c16179d738ea85f3b03083a23fb288dced8ac5924f2e04427ca5dafd632,2024-03-27T12:29:30.307000
CVE-2023-40291,0,0,fa10649dcc284ae4300a38adf3e5da6f8addb83e353c11f487b7f9d1c7c22950,2023-08-21T18:26:45.787000
@ -230669,6 +230669,7 @@ CVE-2023-40814,0,0,d99f26c0e52d44207bc17acbb161af7a6c23c3cb6dd63caf97c39ef62d288
CVE-2023-40815,0,0,5f25edc90fc2210a5ebae830ec62832cf1da32824568540736566b83c65ef705,2023-11-22T22:36:34.407000
CVE-2023-40816,0,0,a37957235aab300f45e063b9b87edbb7ed84160f5e319471ae69ee0f4769c799,2023-11-22T22:36:42.793000
CVE-2023-40817,0,0,625a1859f8fcfbfcd3b5ce08f7dbfcb221bd1f1b928d38c5495787e4931766d1,2023-11-22T22:36:51.057000
CVE-2023-40819,1,1,17fce37ae1ffbd6e3260dc1af3fef43849d1ccc97abc8c2b8472fdebdbc52aff,2024-08-06T14:16:03.380000
CVE-2023-40825,0,0,215dbc1ed4edf598bb5ee7080b8db47cdd5db6be957088557faef7284c704ad5,2023-08-30T00:32:16.193000
CVE-2023-40826,0,0,15b717e2c5f648dcbddd0af0fdf20e504a201581f71d8a81aa95e72d14724f2e,2023-08-29T23:53:39.837000
CVE-2023-40827,0,0,fbcda6f6e53bad6e092f9cc46321655215c80718e599ba5d04fe28f6ef753ffb,2023-08-29T23:56:57.150000
@ -234132,7 +234133,7 @@ CVE-2023-45923,0,0,5270bb491fd0fbd63fc03c8346730b1c7b7aef4a63969aba918e65fb9d0d7
CVE-2023-45924,0,0,5631408bef4259fc5da78594c28346484a4895d23715db7262e10d8cbfdd256d,2024-08-02T21:15:46.993000
CVE-2023-45925,0,0,165cab9a6af741d0f2a0bcbf7573b725a1a3e968b819f84cfa29a2780557fd75,2024-08-02T21:15:47.087000
CVE-2023-45926,0,0,6e11510be2a63a248f16c7fb8affbca6400a19718c1245f13dd016e0c237e809,2024-01-30T06:15:45.480000
CVE-2023-45927,0,0,bb21bf80bee335db542c87badcea9b3aab4ec6256c75eef2f71b567821a2b86c,2024-03-27T12:29:30.307000
CVE-2023-45927,0,1,a12db79aa98ad29e91442cb68de9be1c89ec6e698664c9aa8cb20e2332a3e9a1,2024-08-06T15:35:04.090000
CVE-2023-45928,0,0,692773293cc994caed3570cd831cde7ba12c36d9e87f74ed0925476a93196572,2024-01-30T06:15:45.520000
CVE-2023-45929,0,0,d06d8802f033d3364ed9d8561e56c053fac04131e0401aeeb9a382027f7e9cfe,2024-03-27T12:29:30.307000
CVE-2023-4593,0,0,4991cf119c8ebfc10d48154734bdf0ee9365316ccc7c1b60d5d04e7ab999d216,2023-11-29T21:23:46.107000
@ -237036,17 +237037,17 @@ CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6c
CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000
CVE-2023-4997,0,0,4afed0de14254e77a99b729070c5643ffbf1676389fe16cc856891c73125b6a9,2023-10-05T17:04:09.880000
CVE-2023-49970,0,0,5502d6fa1c46a421a8d44ecff9c8db4116bf0ff4c0f42a9e95eba6058d2868c7,2024-03-05T13:41:01.900000
CVE-2023-49971,0,0,ca9bad332970c1257540fd45c01eab9c9974869c1035167df4351b38d32d2977,2024-03-06T15:18:08.093000
CVE-2023-49971,0,1,374def7d9c689df8f58cc4989e4ea0ed3c5a8e848866980b25656660a7f6c663,2024-08-06T14:35:02.513000
CVE-2023-49973,0,0,ca1ed5b6df9a46488025a136b2ec31b6790ba3cc516f6b9d8e6dd1ad7f0f7877,2024-03-06T15:18:08.093000
CVE-2023-49974,0,0,f5124dacffcab9dae9197d45eeb738402a1e8f4da75c3be6a33ffe13a23af038,2024-03-06T15:18:08.093000
CVE-2023-49976,0,0,b2b5a09955514926cb7972b7101cec2b04ca5d1f7f45f6c868e7087074f700e7,2024-03-06T15:18:08.093000
CVE-2023-49977,0,0,aed154d4bf8ea5599b21c1e323a82e3dc2e828c1921d60bc14254ee66b176359,2024-03-06T15:18:08.093000
CVE-2023-49978,0,0,255bd00c3d73b2dea40ba11475aa7facb0a30f1814b1a1bd06cd16bd820bf405,2024-08-03T20:35:02.260000
CVE-2023-49979,0,0,0ccd68cd702ba3511abb56a221a5f0b1cf7909e9f80649bc44a8ae887dbe966f,2024-03-21T12:58:51.093000
CVE-2023-49979,0,1,1bfb1fbed9e582e1111f18addbfe0704eae6cb7e307f14ec2629c04fb8707947,2024-08-06T15:35:05.213000
CVE-2023-49980,0,0,fe81e40de640bbbb60a226d938993035c41f2a794f5e07463e86cf051d899933,2024-03-21T12:58:51.093000
CVE-2023-49981,0,0,5be7a68d74a60ed3295669fb11701db2427aaf9245d4e2e54ed3beeef2fba398,2024-08-05T17:35:03.377000
CVE-2023-49982,0,0,ec6f2a2c253ed498a1057ed3b7470bd03fbafbdd0bb791c30162603ae56aa435,2024-08-05T16:35:02.447000
CVE-2023-49983,0,0,4cae9f7d8add2cf24854c3f4e5276c123fb042856d91f0c461ca58ac5db09752,2024-03-21T12:58:51.093000
CVE-2023-49983,0,1,e9c175afb8b1e7f2cb699e467ef065d438ddc85b687b14c4ebacca195e1402e1,2024-08-06T14:35:03.603000
CVE-2023-49984,0,0,a57d9275694d3ef020d9d7f055ba3135dbd08d9dbc13b6168e119b324272f7a6,2024-08-05T15:35:08.213000
CVE-2023-49985,0,0,48621d95c58dd65f642543dd394ac7e9d6daa5b1663d066d6d97b86f6ff66be2,2024-08-04T12:35:03.467000
CVE-2023-49986,0,0,0bfa07ebd9dbe1f0457cbd00aed62c65d63f7c4a056604f06d8368c48ba916b7,2024-08-05T16:35:03.407000
@ -237565,7 +237566,7 @@ CVE-2023-50891,0,0,1adacf52103bf5695bdd5a8c21dfbc40c87bec0f97db9509f7b11b2449776
CVE-2023-50892,0,0,ea816357f05ef42b8833514f544ca3e97f6534462f70ce276b6120f11221c7a2,2024-01-05T19:43:06.133000
CVE-2023-50893,0,0,835f496c561cb55a5fb1cfae7503de7255939f53b6d1bb8e8298e04adc0d60f1,2024-01-05T18:33:07.640000
CVE-2023-50894,0,0,aa32b467e175e3fabfb6642dcab59bdbaa2952663e9398a1009a1dc5a26c66f1,2024-08-05T17:35:04.170000
CVE-2023-50895,0,0,69e50a2a9050272ee521d2669e1791780c9ca170819dba3891ee76e69746a9dc,2024-03-26T17:09:53.043000
CVE-2023-50895,0,1,271536df0efad9de4e9fcecac3f3aef8f4be9b35db244cc2303d24324d3dcea7,2024-08-06T15:35:06.050000
CVE-2023-50896,0,0,58909ae6cdd69ec36860d520a482341146ba3062544b6f2e3a1ec28f1d50ed32,2024-01-05T17:32:59.937000
CVE-2023-50898,0,0,5521dd5ffd76f25198955d667f35660bc29ab21a929655c4d2d6c819c3ea24fc,2024-03-15T16:26:49.320000
CVE-2023-5090,0,0,857f8555c13090b0b0748252e1a3763df646adb22c2b1003dc4bd042a71884da,2024-07-08T05:15:02.033000
@ -238782,7 +238783,7 @@ CVE-2023-52580,0,0,b8c655d437d57a038982348defe0ba177db44113de8bbbf0a08788730933a
CVE-2023-52581,0,0,7691221601b63aee3941e44780c6b7af99209571581645e4b8d4eab0fc7c17cc,2024-06-16T13:15:51.120000
CVE-2023-52582,0,0,5319c9d81969b1c465eda182035ed4a9673e94b09d499044fefc2972ffc554b4,2024-03-04T13:58:23.447000
CVE-2023-52583,0,0,8ed049626a3d866faa521f5c0ec29ba4aa11aa0550c333c97d2c4302f14a56b4,2024-06-27T13:15:53.290000
CVE-2023-52584,0,0,675185cf7a73344ab50ccae2f06c5f6ac6943022daf2134d07fcf55bd7653e75,2024-03-06T15:18:08.093000
CVE-2023-52584,0,1,006e4038ef636e5ce45dc9108c9592a1116ce315b254badb755b3f93c3a71dc1,2024-08-06T14:35:04.610000
CVE-2023-52585,0,0,da225d55d03010fcb95e8adcdb858e173f87a2b48ad17790076ac4f7dd538e15,2024-06-27T14:15:12.767000
CVE-2023-52586,0,0,545d29d25a05b795b88e1145bd1bacb3b8aa91f79f02282bb6f52947214b6c07,2024-03-06T15:18:08.093000
CVE-2023-52587,0,0,2271e5381781b323097c4a4b197558c1e604db963190a108d3d6f27390fdf28a,2024-06-27T12:15:14.760000
@ -240375,7 +240376,7 @@ CVE-2023-6692,0,0,9fa4e96ce1049837df269d11a8a912bde008e6e68041627c903eee00e0ee38
CVE-2023-6693,0,0,4fbf86ce01c199959b43503970fbdface6a0c3cb5461719b0fd8b452d147d91b,2024-05-22T17:16:09.817000
CVE-2023-6694,0,0,5324160095b95adf3e158f9599efe0a66004170eff91edcf1a8e9f68bbdace67,2024-04-10T13:24:00.070000
CVE-2023-6695,0,0,ddf9733013b9fbaac77fe6b1fcca76eedd63d629a771ad7ca81287cb0112395d,2024-04-10T13:24:00.070000
CVE-2023-6696,0,0,a2b4be9074422d1229ccc670c54501d23de7922ea855e00a48781abb59ebd605,2024-06-17T12:42:04.623000
CVE-2023-6696,0,1,c36d1873db0af8ec4a8a1c5393c994faa273137858ebb453846d82c645e5a129,2024-08-06T14:05:42.023000
CVE-2023-6697,0,0,12c273f1379c4db348aacab8ec27f123afa97fabdba674ad7bddd52c916085bf,2024-01-30T20:25:21.367000
CVE-2023-6699,0,0,4a8624b4b6ea31b8237e0eb30e2c836ee2648ac75d07c3c9236303c77756ccbc,2024-01-17T00:02:15.700000
CVE-2023-6700,0,0,f0219c5bfda6880f7a4b7dfd99547dcb7d3f941c1a23751cf1548d4fdf181ac9,2024-02-09T16:38:05.687000
@ -242682,7 +242683,7 @@ CVE-2024-20001,0,0,a8fdee747320800fcefdb9757255f1452f42ea67d847a2bd5e7f0eda0e22f
CVE-2024-20002,0,0,f15c94fde1f06dc9fce4b4ca09cb219c34a08e71aa3bec3fbc32d03240e1b76e,2024-02-09T02:01:37.090000
CVE-2024-20003,0,0,252c3ca307d160fe322f3e6f3c838ec528b0deb286e51517bf83a2ddeb36c723,2024-07-03T01:45:42.740000
CVE-2024-20004,0,0,f0724cab7e23c1672343a65224d29c6de9c5ef503ce348d95a653731adbda199,2024-07-03T01:45:43.630000
CVE-2024-20005,0,0,b6f4b22a5f386498389c13f791578550d3b8f7f66c361f0a11418e472a23b966,2024-03-04T13:58:23.447000
CVE-2024-20005,0,1,8b79a520d8c0bb0a48d91c549eb8c8939b2416a7ff7a3666de17adce15b8031c,2024-08-06T15:35:06.587000
CVE-2024-20006,0,0,17a91c2471e0eca90fb18bbcfea0e3d03ed760ac5103107ae434f69000dabe0f,2024-07-03T01:45:44.467000
CVE-2024-20007,0,0,0fa69a82ec65ecc3027671eba8b924b09ef511a83e0e0396f158b0acb6f78456,2024-02-09T02:05:10.947000
CVE-2024-20009,0,0,b0f87b48d16d8ca578db6fcf902537f0919269ed2662481028fc707581f29f2b,2024-02-09T02:05:28.177000
@ -242704,7 +242705,7 @@ CVE-2024-20023,0,0,0f3eec01af6b49c524cf4eb0c642d77efd7be67fdf33e7a68b76bb49407ad
CVE-2024-20024,0,0,a587bfbae48c7d89e5f8cdf3a4d9f1f662ddb9590db59d2b26f356c2c055895e,2024-07-03T01:45:47.463000
CVE-2024-20025,0,0,47e15a7ddf4a93a1f67f16f7b41159792bb8de344e0b811377a0a1f83c75f102,2024-03-04T13:58:23.447000
CVE-2024-20026,0,0,ed800331684227c8cb6eef8a299085ff35357d20165c3fbe70fc71f0772c4645,2024-03-04T13:58:23.447000
CVE-2024-20027,0,0,1c708a33726db9aee0559330cfdd0fc241eac47a71bb6deee6fb4084d133403f,2024-03-04T13:58:23.447000
CVE-2024-20027,0,1,1e87a5ce444fde6917e601e7f1ba4c6df82feaec2ef698b25f20ceaf70694d54,2024-08-06T15:35:07.420000
CVE-2024-20028,0,0,cfbf4d0a5e915e0bee3fad17577f931af15ec4fffb945f6759a6ae86484e677f,2024-07-03T01:45:48.410000
CVE-2024-20029,0,0,5b7ec0868e4b45674158a00b46fc6ebdfeb103f2ba924485057a5965b1353952,2024-03-04T13:58:23.447000
CVE-2024-2003,0,0,d83e6e497d0f4e0abfc3183df264ca9948c9b590f8e46873b90f110587a4b083,2024-06-21T11:22:01.687000
@ -242907,7 +242908,7 @@ CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b
CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
CVE-2024-2052,0,0,b3dd7173b956ed9ab7dfaa381fa39b77e63aea1f604a72f8ac014b370895d6ab,2024-03-18T19:40:00.173000
CVE-2024-2053,0,0,36771f130ff6b821af5971db0134b2ad0672630fbb5a07513fde1d4190d1f1e1,2024-03-21T12:58:51.093000
CVE-2024-2053,0,1,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000
CVE-2024-2055,0,0,d1225e429bd7e311c49254719a5a09df3de3166cc8ee427e6cf78b87fe86c356,2024-03-06T15:18:08.093000
CVE-2024-2056,0,0,a9b5dfc22d4ac07087230ba8c68bc5ffb616f082583f2b15378332a8153cd7c4,2024-03-06T15:18:08.093000
@ -244506,7 +244507,7 @@ CVE-2024-22720,0,0,9b189ed7ed41dddb5c89809962586573f4f56f2a5e75240cf2e0c1b185b20
CVE-2024-22721,0,0,adc321e89d42abc6b26e927fdcb28dc5c84ae45c2baec9ae8b21187b009f66ba,2024-04-12T12:43:57.400000
CVE-2024-22722,0,0,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0813,2024-07-03T01:47:20.897000
CVE-2024-22723,0,0,5e0104614f79979231b68cb0938b4f8c78660f8d758e8dd4467e139288dfbdc1,2024-08-01T13:47:01.343000
CVE-2024-22724,0,0,f04bb0773d70e218cb04a1eae11b7ff703933a7f824a16aba4031882d5107c0c,2024-03-21T12:58:51.093000
CVE-2024-22724,0,1,933dc01fb2520f6f9ab9fa4754177aa8d3c42e94e77de3e74dc91468db49f71f,2024-08-06T15:35:08.610000
CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c113c5,2024-01-30T20:42:46.143000
CVE-2024-22727,0,0,21f0a699093390ba1d8ee3a22a8e6961dde2045354957e98f8b2db244c882256,2024-02-20T19:50:53.960000
CVE-2024-22729,0,0,768bb63a8e628d1d5ad8c32ce479e7ef65e430464c818e272a86590502c0053a,2024-02-01T15:15:34.173000
@ -245145,7 +245146,7 @@ CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464c
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
CVE-2024-23717,0,0,b21a496df9a56edab7f2696ca2d5dddc2c25b1c0bb8c9eac9b26a7e06e0cb676,2024-03-12T12:40:13.500000
CVE-2024-23721,0,0,79fe202cb30d537a04fdd87ebf2ebd3911bebfb1a0ce8268579dd48022b3a9d3,2024-03-21T12:58:51.093000
CVE-2024-23722,0,0,517e8a8f50b00422a7631eed6bef36098202e258e6465c18266f5be7c072434f,2024-03-26T17:09:53.043000
CVE-2024-23722,0,1,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000
CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c01a4,2024-08-01T23:15:47.180000
CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000
CVE-2024-23726,0,0,49bfb3e940abfa1d8c182442ad4bd7c2d671bcc24ce62cd25d7197deab52125c,2024-01-29T15:25:36.090000
@ -246944,7 +246945,7 @@ CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d
CVE-2024-26557,0,0,bce4bb7db30c44200534fa645c4e21a32632f06526ac89541f2afa8ce855d2c7,2024-03-22T12:45:36.130000
CVE-2024-26559,0,0,59f6bfe647560e762a59ef347afb5a6e13eb28516f541334ce1dae55e8808b08,2024-02-29T13:49:47.277000
CVE-2024-2656,0,0,1e1bbc88c0161a3acb0637c745cf054774e0c8a58563824f7d11f0999806993d,2024-04-08T18:49:25.863000
CVE-2024-26566,0,0,2f53cb57f93da9c85b27405001d60fede69ba994ac00bfd80be2f35af3a49f40,2024-03-07T13:52:27.110000
CVE-2024-26566,0,1,178f5f9908b56a8ca7b57493a287d425d6858d98fae12d3e88663a8ab0cf6ac4,2024-08-06T14:35:06.510000
CVE-2024-2657,0,0,8d1ff58c39beea61aea6c79faeb579bd293dbee684695e94ca7134a1a41bac4a,2024-05-30T13:15:41.297000
CVE-2024-26574,0,0,e97beed2b27ceabe660eb9fd95cf5205e1fe0e04e7235f562df6841e3faa926d,2024-04-08T18:48:40.217000
CVE-2024-26577,0,0,dbbc22a74081f12f101f825b2a849670f0e76e857d5182f7169d38ee1367f887,2024-08-05T20:35:05.783000
@ -247876,7 +247877,7 @@ CVE-2024-27559,0,0,e51cb2ad7f7a927a7b9eacf57e9dc02b64201a90b8501b228aa2354a3e2c9
CVE-2024-2756,0,0,75b6f6197ae09c8882d105c3231ed4371ca476e77e86b0b7a32537424ab828b1,2024-06-10T18:15:30.570000
CVE-2024-27561,0,0,3ca7922e506f2e58b3ab77ea2274792019f8619a9ef563f326589a5993420327,2024-03-05T18:50:18.333000
CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c14854c,2024-03-05T18:50:18.333000
CVE-2024-27564,0,0,5d09b300c57dac7e43356f466af4ab8e7319496cb061b9a3a4a4f4667284eb1c,2024-03-05T18:50:18.333000
CVE-2024-27564,0,1,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000
CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000
CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000
CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b8a0,2024-03-01T15:23:36.177000
@ -247942,7 +247943,7 @@ CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d
CVE-2024-27703,0,0,3a3573ff5860638356c3adca622c2c9c4efa92e7fefb084eae2ad570942a8faf,2024-03-14T12:52:16.723000
CVE-2024-27705,0,0,538b62798ffb3deeb490d879f6c2b0551b7d4dbd846704c9743ab7991d01d3a0,2024-04-04T12:48:41.700000
CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000
CVE-2024-27707,0,0,e7cc6631dc8bca8e003ed03e80704458014681fcf49a0d25544dd93611f57333,2024-03-08T14:02:57.420000
CVE-2024-27707,0,1,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000
CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000
CVE-2024-2771,0,0,0d7ad290285fd8c18499405c7e6fa83595b4cbfae3f819854d1ca5d72c6a755e,2024-05-20T13:00:34.807000
CVE-2024-27710,0,0,43de68ab0b570faf0f4235d817dd8f7006250699af7435eb090311caa9f412af,2024-07-09T16:22:22.570000
@ -248425,7 +248426,7 @@ CVE-2024-28326,0,0,855dd245e209741ecd5af54aacc58610e12585c0f397bf5c5a4820ffc8455
CVE-2024-28327,0,0,7ed9ed9c0231950061a20f16d0b466fa43b5d37d46730fdcd21aca4b586a20c9,2024-04-26T19:59:19.793000
CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
CVE-2024-28335,0,0,17c36b6f18405264f7d3a219484beba8081b41a0ce6a0b4a158db17a233ba48c,2024-03-27T12:29:30.307000
CVE-2024-28335,0,1,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000
CVE-2024-28339,0,0,e7edfb08e526caa3026f659d21730d02e6fceb32876a36cf2d55238da5d3b5b6,2024-03-12T17:46:17.273000
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
@ -248497,7 +248498,7 @@ CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731
CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000
CVE-2024-28537,0,0,a1b289879a7e37eeb256b0155a9bf07c4755d98e64b0810b5b45c7e328ef254b,2024-03-18T19:40:00.173000
CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000
CVE-2024-28545,0,0,b234bb43a6bdfba980224fc2472196bea7480d971cd29181ffb9a0258bc8b12c,2024-03-27T12:29:30.307000
CVE-2024-28545,0,1,e9a4e3ca98799d0101f083d2aeb4e48f2d5da7cbf73a3832ee738e6e37caad1e,2024-08-06T14:35:08.207000
CVE-2024-28547,0,0,7e81a6a5e32cfa4864b5bc09764b2b5baaf467a0f82788b3d1943e7a59e2091d,2024-03-18T19:40:00.173000
CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000
CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000
@ -248756,11 +248757,11 @@ CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a
CVE-2024-28962,0,0,31dcea761113ed3d2d5287bcac0ccde59721eab53808f539db6c678a026732b0,2024-08-06T04:16:45.810000
CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000
CVE-2024-28964,0,0,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000
CVE-2024-28965,0,0,243304e77cbab7b4dbd33d38f2ed62543001dbffc348c59ebe507f143c414797,2024-06-13T18:35:19.777000
CVE-2024-28966,0,0,8059850616658d5aecd85c5acbb6e9fab83060203b9180efea1ed79e9b6eb6e9,2024-06-13T18:35:19.777000
CVE-2024-28967,0,0,f82472d0d6ace09131f709b8677ef2634ebabe0528f1e1608bf5e5e0608a7892,2024-06-13T18:35:19.777000
CVE-2024-28968,0,0,afd86c5938eaf343cace2f8a60ccda5c8d44b9ee09c340c5ed37fc9c3a0af5c7,2024-06-13T18:35:19.777000
CVE-2024-28969,0,0,7965757118d16671631493f0e1618e098ee64e46d6b8eddeab326e54299a1377,2024-06-13T18:35:19.777000
CVE-2024-28965,0,1,864e7f335ec953da5c2c7e907f469034e931a4a4637e4de43f2a96367ccd9cf1,2024-08-06T15:30:52.433000
CVE-2024-28966,0,1,6430710ce538aed33833d6523d76ed4e05ecdf436ddf0d76f353fb0ef57acee9,2024-08-06T15:30:39.067000
CVE-2024-28967,0,1,1648dd50c3f81be97a86f7abed79bf1b0d6da23e4a54c3c444650653354399fb,2024-08-06T15:30:14.820000
CVE-2024-28968,0,1,ece8961640f9a84d14132908e0bae509452d5afd2089a853aaa9402e5d3ab4fb,2024-08-06T15:29:59.990000
CVE-2024-28969,0,1,5e2ad811d66709650c6b955b899218a119a75a237da1c6a214e4f23b4fda3854,2024-08-06T15:28:06.497000
CVE-2024-2897,0,0,cedfc20da5ed85e9f84ef73f96b224aba1a7761f3b26b18165ca182e0276563a,2024-06-04T19:19:19.267000
CVE-2024-28970,0,0,e8f11977500005486cf7671144dacf7215de23ccf91b6c8eb182a0c1c61d7f56,2024-06-13T18:36:09.013000
CVE-2024-28971,0,0,977b1e796a504922885da69c0f7540513ab16cea6a678ad4098d22f0ec570269,2024-05-08T17:05:24.083000
@ -248938,7 +248939,7 @@ CVE-2024-29164,0,0,0241c9be23a80d6ab3dceadfce1b9b19b6d47bdd0ac74b2f2c9ae593533e3
CVE-2024-29165,0,0,3c479a3372b122f69415807cf18990c87c6bdd2637a3e4ef28a1d60fed2086fd,2024-07-03T01:52:13.840000
CVE-2024-29166,0,0,725e6e590aa1d0d5293ed901f6d18ab0cb031637e03d15f947737ac3607357bd,2024-05-14T16:13:02.773000
CVE-2024-29167,0,0,8c037b42f45551faa2e5b6ebfa5f5568baba75ac04a9563d88f1a9c7edd265df,2024-08-02T01:15:57.060000
CVE-2024-29168,0,0,88c624028af14d68c4e80c287e5c8eaefd6de289ac49c1f565f6c1aa13335d5d,2024-06-13T18:35:19.777000
CVE-2024-29168,0,1,4b03610f0e9707b91f6d4ca8302add5e9446f332d0532287451d81854b8e8e49,2024-08-06T15:28:10.527000
CVE-2024-29169,0,0,46ae3e5e128a47a51f9060fa5b406a480b0436c4fa2b267a42e0503161231bfe,2024-07-03T01:52:14.690000
CVE-2024-2917,0,0,bce749de88c117bab31f2480bda989ec4febf4f1b6cd352875ee070fe63e4914,2024-05-17T02:38:37.297000
CVE-2024-29170,0,0,b197fa7a7096d94d37c613ba2c6a7ee9897dd072a00f8dfa13a38fc4064e100a,2024-06-04T16:57:41.053000
@ -249145,7 +249146,7 @@ CVE-2024-29667,0,0,4118e10082e95e28b5db3ce405eaacc62f74bef151ef94158b87df6d64494
CVE-2024-2967,0,0,c152c043e13b4423e324e9742145ebebea680255fd320b84aa6fd1c484253799,2024-05-02T18:00:37.360000
CVE-2024-29672,0,0,163254366ca0dd0dd0315f6561f723f9948906fd49ed067098107871444f5c75,2024-04-05T12:40:52.763000
CVE-2024-2968,0,0,45b6ebbb9d99cd3c2205a629e13ac67f3a4bda14dbab27666ba50c91e62a9257,2024-03-29T12:45:02.937000
CVE-2024-29684,0,0,98879e168faf7ae7666a43b1f6a5b13e30b20feb259ae6bd6597efec13235084,2024-03-26T17:09:53.043000
CVE-2024-29684,0,1,b36bf2e8a8667d8059487f589a89143767a320a5d181a5559cd241abd56a073c,2024-08-06T15:35:12.520000
CVE-2024-29686,0,0,24415b8b4ad1fce01014ce0adb73b5758ac1af7cb6661af128dfb5e4207dea3b,2024-08-02T01:16:00.577000
CVE-2024-2969,0,0,8544d89f42684c11ff0ce4f59b9b332aa5f1a74abb30a148c14e95ecc35686ff,2024-03-29T12:45:02.937000
CVE-2024-2970,0,0,fc9de7221826a902f3a6cf19f3180d33eaf927389762bf1e23aea5c70762ccb6,2024-03-29T12:45:02.937000
@ -249561,6 +249562,7 @@ CVE-2024-30164,0,0,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a
CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000
CVE-2024-30166,0,0,50687ad455f93a12b9f6c9dbf505813d14042f7054e41b037f825261eb3f0951,2024-08-01T15:35:09.177000
CVE-2024-3017,0,0,b401b23402ebc6f6ec3d2296f1d5b4f9799017607076ff54b8bb35750200243b,2024-06-27T19:25:12.067000
CVE-2024-30170,1,1,84396ea2843df616af18f33890711de152cf4f27ff065ca2574ec821f8444877,2024-08-06T14:16:03.777000
CVE-2024-30171,0,0,a303030da6dd4ea6781306128867049fd2796ab1046058a6c2cefdda88e2976e,2024-06-14T13:15:51.603000
CVE-2024-30172,0,0,e23d65cae1ab6574d22c6026de16bab78b6c6028b759790600f9957da66d8b50,2024-06-14T13:15:51.730000
CVE-2024-30176,0,0,b9c656776bec57369b0fb415cb86239071847d4185cfc200250f61ff82ba37c3,2024-05-01T19:50:25.633000
@ -252038,7 +252040,7 @@ CVE-2024-33781,0,0,f92b3d1e80a012680436fd49e5bab657fd2a9b945e08254832c1c45257ab0
CVE-2024-33782,0,0,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000
CVE-2024-33783,0,0,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000
CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9f9d,2024-08-01T13:52:06.273000
CVE-2024-33787,0,0,e7cc09c9a270ae17cb000970f996a17b61d199ad3336b214cdde603fe73a0562,2024-05-03T14:17:53.690000
CVE-2024-33787,0,1,c79d3756f20fa8608bd38338556aeaa798aa21ec0e9c3dffe176487918ad4adc,2024-08-06T15:35:13.693000
CVE-2024-33788,0,0,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47
CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000
CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000
@ -252069,7 +252071,7 @@ CVE-2024-33832,0,0,7b3e27b34a81a08591742eaf0380d56875457acf0d341656accd4bb7693f1
CVE-2024-33835,0,0,cffd31db3df6261e091005d9fb36253e75a61316a58e0e89b08946054d5f55ef,2024-07-03T01:58:57.853000
CVE-2024-33836,0,0,ca4e61dbd315156f846a9cf4e6ecb006bd948e7b0e0ba1558760fe0d5dd0584d,2024-07-03T01:58:58.623000
CVE-2024-3384,0,0,e40494f4cc79f184423be7640904e779411ddd60482c02e316992b67bcd78eae,2024-04-10T19:49:51.183000
CVE-2024-33844,0,0,437324bc3fb95bc3edde402597b08f2d23d6855a92f3f5d5f79ef919926ec791,2024-06-10T18:45:09.903000
CVE-2024-33844,0,1,5ec71d8512f2265bcb8f71bfb71499ff33cd9dfb829f2459bd57512bb7f17072,2024-08-06T15:35:14.480000
CVE-2024-33847,0,0,ae667fdb2032f21fdd40b0d89c1bf951a08b3c40e1bf80331cebce5a8e5c826d,2024-06-24T19:26:47.037000
CVE-2024-33849,0,0,711285af88da51034d770e4f7dba4f259d947b941ed83e4d1af2a2b96823faae,2024-08-01T13:52:09.410000
CVE-2024-3385,0,0,327b76cedb073b60c4f8c3e90737eb0ba35715647736f9323adf15afbb307026,2024-04-10T19:49:51.183000
@ -252109,6 +252111,7 @@ CVE-2024-33893,0,0,5974b8fb160227521bbec0e73b727b302fe98e5f817ff5ac28acc30b93164
CVE-2024-33894,0,0,594f6c34d910f5d78d69ce42d3fed6fad86893a3cfd60893505546e0673750b7,2024-08-05T16:35:11.057000
CVE-2024-33895,0,0,c6f14a57216c6ca956cf6016063e92796c068cf11b7edad49969b23d26a3673a,2024-08-05T12:41:45.957000
CVE-2024-33896,0,0,8e96affe6107cca942e1428f9b2953f9d0a1121d43170ebf22d77edba9a0528d,2024-08-05T12:41:45.957000
CVE-2024-33897,1,1,4569e2d794f7ae3505c64b645cc924383ed471408a2828a834a7433a17b92353,2024-08-06T14:16:03.870000
CVE-2024-33898,0,0,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363225,2024-08-01T13:52:11.823000
CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000
CVE-2024-33900,0,0,269cc21c173c9c584795c12f1ce91d2738b696474fbebedc5c423a95f8259b67,2024-08-02T03:15:33.783000
@ -252167,21 +252170,21 @@ CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc7
CVE-2024-33957,0,0,88de846bc8d97892cfd8f5e3fb77365a046bd14d735fe9ff0fdf5bdcf43f6627,2024-08-06T11:16:04.443000
CVE-2024-33958,0,0,53178196a6e998522e42efb1164438403365268d7b5d0361801382f2258b9980,2024-08-06T11:16:04.920000
CVE-2024-33959,0,0,d458bbf5f43f23837870d410a9e46f289d63332eee24acb672fc9cd8a2d0c483,2024-08-06T11:16:05.133000
CVE-2024-33960,1,1,c53c593ec668667e287363e16e108fa27ae08f29f861b438346e205e55b6bf01,2024-08-06T12:15:49.130000
CVE-2024-33961,1,1,03a2cfe3185829675da53ac4ddc9ee5f23ae56d659f31c4d457aaacfe6d3563e,2024-08-06T12:15:49.360000
CVE-2024-33962,1,1,0f5af782ce7b0b6f1af8a57e7f1705aedaabb08b378b29d3510d617216679428,2024-08-06T12:15:49.570000
CVE-2024-33963,1,1,850e588f9be54795f0489ea09b2fa9cbb18170832d11bb6b87faea54977e7809,2024-08-06T12:15:49.790000
CVE-2024-33964,1,1,25b775cb98d6d75d3b8868c9df78a96e26f554bc0894605cc9030849d51599db,2024-08-06T12:15:50
CVE-2024-33965,1,1,3ddb893fff6f2a0965a82defedff9401de724e71057282952143e3c624d8f57b,2024-08-06T12:15:50.223000
CVE-2024-33966,1,1,f4f7eaf3e81606089ac7d13ccade1fb14397a0c2fe11216859413b3f098f44fa,2024-08-06T12:15:50.440000
CVE-2024-33967,1,1,8ba1a67d6bcb7b88479bbe80f86e3644d2b9d7cb7e0b7d56bd484a3cfab55065,2024-08-06T12:15:50.667000
CVE-2024-33968,1,1,2660cf9965440079050fb15a921d961214a26f55702d2cdc0e8dbeab05f6fa75,2024-08-06T12:15:50.887000
CVE-2024-33969,1,1,70a359893f34beed5cc40710f94e1f36c74431d5f301ccb3324eea061304cd03,2024-08-06T12:15:51.100000
CVE-2024-33970,1,1,08fc32382cf60fe53811f9961b90beb8742a746cd203e002d1fde4f7ed9f5c44,2024-08-06T12:15:51.330000
CVE-2024-33971,1,1,45a43d4e935fb8f26ea153d3830bfbb482c3a2462495da277e1cdd1b01815ce8,2024-08-06T12:15:51.550000
CVE-2024-33972,1,1,3750dc3a6f98d5c2d5be5e290b107afe21a4b146ac56b50fcb02d01ad53bf840,2024-08-06T12:15:51.773000
CVE-2024-33973,1,1,31f4407e21b5d5d826f609599778c0a36b741f9666904a530b26958cc8a9aebd,2024-08-06T12:15:51.993000
CVE-2024-33974,1,1,d25ce0a05e0a6752a4262f16ca72168b217bf65c87bd2e0f11fe6a2f6846f71e,2024-08-06T12:15:52.213000
CVE-2024-33960,0,0,c53c593ec668667e287363e16e108fa27ae08f29f861b438346e205e55b6bf01,2024-08-06T12:15:49.130000
CVE-2024-33961,0,0,03a2cfe3185829675da53ac4ddc9ee5f23ae56d659f31c4d457aaacfe6d3563e,2024-08-06T12:15:49.360000
CVE-2024-33962,0,0,0f5af782ce7b0b6f1af8a57e7f1705aedaabb08b378b29d3510d617216679428,2024-08-06T12:15:49.570000
CVE-2024-33963,0,0,850e588f9be54795f0489ea09b2fa9cbb18170832d11bb6b87faea54977e7809,2024-08-06T12:15:49.790000
CVE-2024-33964,0,0,25b775cb98d6d75d3b8868c9df78a96e26f554bc0894605cc9030849d51599db,2024-08-06T12:15:50
CVE-2024-33965,0,0,3ddb893fff6f2a0965a82defedff9401de724e71057282952143e3c624d8f57b,2024-08-06T12:15:50.223000
CVE-2024-33966,0,0,f4f7eaf3e81606089ac7d13ccade1fb14397a0c2fe11216859413b3f098f44fa,2024-08-06T12:15:50.440000
CVE-2024-33967,0,0,8ba1a67d6bcb7b88479bbe80f86e3644d2b9d7cb7e0b7d56bd484a3cfab55065,2024-08-06T12:15:50.667000
CVE-2024-33968,0,0,2660cf9965440079050fb15a921d961214a26f55702d2cdc0e8dbeab05f6fa75,2024-08-06T12:15:50.887000
CVE-2024-33969,0,0,70a359893f34beed5cc40710f94e1f36c74431d5f301ccb3324eea061304cd03,2024-08-06T12:15:51.100000
CVE-2024-33970,0,0,08fc32382cf60fe53811f9961b90beb8742a746cd203e002d1fde4f7ed9f5c44,2024-08-06T12:15:51.330000
CVE-2024-33971,0,0,45a43d4e935fb8f26ea153d3830bfbb482c3a2462495da277e1cdd1b01815ce8,2024-08-06T12:15:51.550000
CVE-2024-33972,0,0,3750dc3a6f98d5c2d5be5e290b107afe21a4b146ac56b50fcb02d01ad53bf840,2024-08-06T12:15:51.773000
CVE-2024-33973,0,0,31f4407e21b5d5d826f609599778c0a36b741f9666904a530b26958cc8a9aebd,2024-08-06T12:15:51.993000
CVE-2024-33974,0,0,d25ce0a05e0a6752a4262f16ca72168b217bf65c87bd2e0f11fe6a2f6846f71e,2024-08-06T12:15:52.213000
CVE-2024-33975,0,0,a46b370542e31d699ba01a1fac4d9ed4c848d3b0a25985f5a0ce53b5bcb63a6a,2024-08-06T11:16:05.343000
CVE-2024-33976,0,0,02e20b804a284cea017672c564c762d3fb7d7c9c8cfcb4a61b9fa58410196b8b,2024-08-06T11:16:05.580000
CVE-2024-33977,0,0,2eb5edafc06dded0ff925fe2cae461b6fb7bd8b6a70ba49c1b48907f8554dce2,2024-08-06T11:16:05.793000
@ -252189,19 +252192,19 @@ CVE-2024-33978,0,0,d464745d4bd7f31f1fc51af542d385e5cae6b8ccd3d85ce164396a41cfda2
CVE-2024-33979,0,0,b983164577546938ffe33145f2e0f3b698c4bc7ada5e2728f77b5638aeef3640,2024-08-06T11:16:06.223000
CVE-2024-33980,0,0,dee037246a927f3ca3153211de0c62347441b8e779709e076f12ac9e0599f054,2024-08-06T11:16:06.477000
CVE-2024-33981,0,0,e0e57ce80d6753fe0d3c97c236c4bbf725d864b47682f7bd24299ca9dc3d8626,2024-08-06T11:16:06.733000
CVE-2024-33982,1,1,45b26bbc74b7d72080ae88d41fb6f7f413f4d8536ac87fdf45e0b60f93629fb9,2024-08-06T13:15:53.257000
CVE-2024-33983,1,1,cab4d447ce471d1290e90dd5a1e82cc9d5252b784d55444265c55d7965dd63cd,2024-08-06T13:15:53.480000
CVE-2024-33984,1,1,87dd0943d36eb3c143032637ffc496824366110651ae8cab4376bb323bf8ed31,2024-08-06T13:15:53.693000
CVE-2024-33985,1,1,ef0f29bb6885e74d2e17051eff53879974402a057315b148ebe6c6235cb589c9,2024-08-06T13:15:53.907000
CVE-2024-33986,1,1,53b9aa07d3b5aa856bbae868678e0f79fb4d50a9480eb558800c78c90fd7c811,2024-08-06T13:15:54.123000
CVE-2024-33987,1,1,920aa0d963feab45672016a8cc41edf6f3afe79e7d7167dead3d21fdb4e4d9c7,2024-08-06T13:15:54.327000
CVE-2024-33988,1,1,bdd7b77fbeff0ffc0758ae8b6e499a8a80438127c5c8079afedbe193b0695b10,2024-08-06T13:15:54.547000
CVE-2024-33989,1,1,5b7284697d5328f709a9fd4fb7a2c01b2babcfd13cf9fad3ba146866e13c5d51,2024-08-06T13:15:54.757000
CVE-2024-33990,1,1,f29dd9f16a04affb1b065ba215c8c07f5b4fcef4a165541f34cd29f79dbeffea,2024-08-06T13:15:54.973000
CVE-2024-33991,1,1,e7848b1fbd07dc956434fc6854119e6993adba369708a89e5c7970374000cd12,2024-08-06T13:15:55.250000
CVE-2024-33992,1,1,9b158ff86a5fea9c0143a3a28a09a3d005a2bc3a66e820f27ff31f312fed7ae4,2024-08-06T13:15:55.487000
CVE-2024-33993,1,1,87d3be91dbfa8958a7521feb77979831ff28d2f8a3f9fb1ddb40d835def70e58,2024-08-06T13:15:55.693000
CVE-2024-33994,1,1,2e73c4da04fec625761166167f68c922b34ac4635cfbd0439df4319cf1dc7526,2024-08-06T13:15:55.897000
CVE-2024-33982,0,0,45b26bbc74b7d72080ae88d41fb6f7f413f4d8536ac87fdf45e0b60f93629fb9,2024-08-06T13:15:53.257000
CVE-2024-33983,0,0,cab4d447ce471d1290e90dd5a1e82cc9d5252b784d55444265c55d7965dd63cd,2024-08-06T13:15:53.480000
CVE-2024-33984,0,0,87dd0943d36eb3c143032637ffc496824366110651ae8cab4376bb323bf8ed31,2024-08-06T13:15:53.693000
CVE-2024-33985,0,0,ef0f29bb6885e74d2e17051eff53879974402a057315b148ebe6c6235cb589c9,2024-08-06T13:15:53.907000
CVE-2024-33986,0,0,53b9aa07d3b5aa856bbae868678e0f79fb4d50a9480eb558800c78c90fd7c811,2024-08-06T13:15:54.123000
CVE-2024-33987,0,0,920aa0d963feab45672016a8cc41edf6f3afe79e7d7167dead3d21fdb4e4d9c7,2024-08-06T13:15:54.327000
CVE-2024-33988,0,0,bdd7b77fbeff0ffc0758ae8b6e499a8a80438127c5c8079afedbe193b0695b10,2024-08-06T13:15:54.547000
CVE-2024-33989,0,0,5b7284697d5328f709a9fd4fb7a2c01b2babcfd13cf9fad3ba146866e13c5d51,2024-08-06T13:15:54.757000
CVE-2024-33990,0,0,f29dd9f16a04affb1b065ba215c8c07f5b4fcef4a165541f34cd29f79dbeffea,2024-08-06T13:15:54.973000
CVE-2024-33991,0,0,e7848b1fbd07dc956434fc6854119e6993adba369708a89e5c7970374000cd12,2024-08-06T13:15:55.250000
CVE-2024-33992,0,0,9b158ff86a5fea9c0143a3a28a09a3d005a2bc3a66e820f27ff31f312fed7ae4,2024-08-06T13:15:55.487000
CVE-2024-33993,0,0,87d3be91dbfa8958a7521feb77979831ff28d2f8a3f9fb1ddb40d835def70e58,2024-08-06T13:15:55.693000
CVE-2024-33994,0,0,2e73c4da04fec625761166167f68c922b34ac4635cfbd0439df4319cf1dc7526,2024-08-06T13:15:55.897000
CVE-2024-33996,0,0,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000
CVE-2024-33997,0,0,a1b67f9141e983abbb533434dc38928810b4315794a01f73fb3845b5ec77f911,2024-06-03T14:46:24.250000
CVE-2024-33998,0,0,9e3de27d8bf76d6956fcf84fb478824118f2a7a5526fa450d9858736f7cac784,2024-06-03T14:46:24.250000
@ -252915,14 +252918,14 @@ CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13
CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000
CVE-2024-35204,0,0,0248f812c6eb240110c4167110975a2b8317634bb6300a9657da495b3589cfbb,2024-07-03T02:01:28.703000
CVE-2024-35205,0,0,a2e57cfbac4b8021374b26305b7394500fe6ce597517b80b00d88da379a98821,2024-05-14T16:11:39.510000
CVE-2024-35206,0,0,f9905c58924dc527d313db67f522336406d83128cc3228382d189acbbbf8c0f8,2024-06-11T13:54:12.057000
CVE-2024-35207,0,0,679304b3063a48b0a5579ba1ffb277f2485905516c3b4b269cb85a1ff76751a9,2024-06-11T13:54:12.057000
CVE-2024-35208,0,0,b81c0a582fce341f329d0115040bc4d7176f9e8ec666cdc9bd82da308c515022,2024-06-11T13:54:12.057000
CVE-2024-35209,0,0,d85ab775421b9a96d2d4b95e8cc83488152ace612a91e559fa15e02fe1bcd835,2024-06-11T13:54:12.057000
CVE-2024-35206,0,1,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000
CVE-2024-35207,0,1,d2635c7366e1ebe2e4894fe79457104ee16f907d65baaf982977b483f755a034,2024-08-06T15:02:16.163000
CVE-2024-35208,0,1,c327ea7feda1657783c8f89d88776276d84096f0d4b51a5404de61ecb0c1687b,2024-08-06T15:08:17.727000
CVE-2024-35209,0,1,196569b59eea3cc630421f8866e0f40dc4c0a1b634b46696e7781627ea2b69a2,2024-08-06T15:09:04.427000
CVE-2024-3521,0,0,b7f892567f65425a908c9c954311779c22cc3162bf89c036dad8ac44a9acab25,2024-05-17T02:39:58.603000
CVE-2024-35210,0,0,1d8a7d2287ba7df85fd0a3c7c4c899e3452559d21b0439d3f446614b43d686d5,2024-06-11T13:54:12.057000
CVE-2024-35211,0,0,757502297e4ff557aa3e5de7584f509b32f0a15b542fb7953a1c815d98695f13,2024-06-11T13:54:12.057000
CVE-2024-35212,0,0,c93918e3b8e91992564061eee9064bafc7032fa56935ec1cec3cbc80e31117b0,2024-06-11T13:54:12.057000
CVE-2024-35210,0,1,81f5eb1cd2c214fed01b7d479c60a962ea85b697b02b3fceb612e3b93bbf9090,2024-08-06T15:09:53.797000
CVE-2024-35211,0,1,19534889f081150f139415aeffdc66a9de4b652b6cde992612a0b71b906a33ab,2024-08-06T15:10:56.163000
CVE-2024-35212,0,1,053c3edc590a8c81ff407b4c0affd7ea52fd1601e9d265a6a1927307cc6f4b93,2024-08-06T15:11:27.243000
CVE-2024-35213,0,0,76339f3ccade6707f71873f12fb8a84bb7076efcedfad313066f61130756b80e,2024-06-13T18:36:09.013000
CVE-2024-35218,0,0,e1184bfd50c39d7ccb9d3af67c83c225381571c141531e6e99c4b17efa5619ff,2024-05-21T16:54:26.047000
CVE-2024-35219,0,0,d38f1e7fcd795eac766ba6f65b3b8cde339bb119340da2573ee5da93c2c59a44,2024-05-28T12:39:28.377000
@ -253831,6 +253834,7 @@ CVE-2024-36420,0,0,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc
CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000
CVE-2024-36422,0,0,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000
CVE-2024-36423,0,0,8fccf5fe0a9c314803742689debe16a3c95c7af9b7d5f30b496e24f061127873,2024-07-02T12:09:16.907000
CVE-2024-36424,1,1,9030014dd7df7cd9ac8c529cc389fc669e0cebee729c5777e3ebc3248705eb9b,2024-08-06T15:15:41.843000
CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
CVE-2024-36428,0,0,73719b2d94fccf2eff624fbf36dc51c2fc48c0dc66be598a72cd1ff64aaf434d,2024-05-28T12:39:28.377000
@ -254400,11 +254404,11 @@ CVE-2024-37333,0,0,ca6a17cc22b1d717772d796bf0aa2546b83275671146f095987901bb082c3
CVE-2024-37334,0,0,3931d383be66577632f115e0c9d908ee2bcb3dc588be0b175f4163124a70c529,2024-07-09T18:18:38.713000
CVE-2024-37336,0,0,90e602973017f76462997dc997dd1aa43f526ec48ab9dba1852b6ff97aa50fb9,2024-07-09T18:18:38.713000
CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000
CVE-2024-37343,0,1,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
CVE-2024-37344,0,1,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
CVE-2024-37345,0,1,095e9fcf2729a229a6d30770c6328e028d13c3564257fe3ca6a02856acea31d8,2024-08-06T13:49:26.063000
CVE-2024-37343,0,0,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
CVE-2024-37344,0,0,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
CVE-2024-37345,0,0,095e9fcf2729a229a6d30770c6328e028d13c3564257fe3ca6a02856acea31d8,2024-08-06T13:49:26.063000
CVE-2024-37346,0,0,2db4948f8270427d7ba2d74594c1333081073368dc8627246d0b026677177be1,2024-06-21T11:22:01.687000
CVE-2024-37347,0,1,4655db1f78f90a4e012a32cf405d62b010ea59a2a5d18c6dccc795a7aa708830,2024-08-06T13:50:02.077000
CVE-2024-37347,0,0,4655db1f78f90a4e012a32cf405d62b010ea59a2a5d18c6dccc795a7aa708830,2024-08-06T13:50:02.077000
CVE-2024-37348,0,0,dc48fa9974ed21f9f4246b3dd80406f069a0cd0f6f5793a9ce9659a6a27d7dd1,2024-06-21T11:22:01.687000
CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000
CVE-2024-3735,0,0,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000
@ -255258,7 +255262,7 @@ CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fc
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
CVE-2024-38856,0,1,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9d69,2024-08-06T13:35:01.497000
CVE-2024-38856,0,0,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9d69,2024-08-06T13:35:01.497000
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38867,0,0,4bc8a346a92423127914d7bd932870dc2a7efecb39fecaf6981a89bcdb11978c,2024-07-09T18:19:14.047000
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
@ -255846,6 +255850,7 @@ CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2
CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000
CVE-2024-40096,0,0,42339056636dd4c75a9aaab4d34e3b72d84104680bd453c9a522c777c20bb28e,2024-08-05T12:41:45.957000
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
CVE-2024-40101,1,1,945f8face14acfe695b03abc70f29e7d06c3788949bf86f591c6e7b8ebc99b12,2024-08-06T14:16:04.117000
CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000
CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
@ -255915,7 +255920,7 @@ CVE-2024-40464,0,0,3beb82f710e64d9007f097c0d34a0e44a728096673fd034d1450c47df3b8a
CVE-2024-40465,0,0,15986f29ff1e8aef63181dd9799f409f46000c95ad7d745708fb5f0091003f8f,2024-08-02T19:35:37.367000
CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000
CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000
CVE-2024-40498,0,0,693a4992e211fa78eae33c413285a314ee2e96c2391f216bff6439a4ec959f59,2024-08-05T17:15:41.670000
CVE-2024-40498,0,1,83580c66e72d4417cbf278f69d5229b1724b5433aecf7d35ee962e9f2fca21bd,2024-08-06T15:35:16.133000
CVE-2024-40502,0,0,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000
CVE-2024-40503,0,0,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000
CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000
@ -255927,7 +255932,7 @@ CVE-2024-40520,0,0,a2ac37b5fe4993386ad0c401ff27a90a4ee5d292a95a31b8ec4196b4a0643
CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
CVE-2024-40530,0,0,91e4836dd99d3f6b82d865a52427238f6e6ca425543bbac026388c8a7bed52f2,2024-08-05T16:15:36.750000
CVE-2024-40530,0,1,c8fbdd52776a605760f1b609b1cbda9fa0ad90a9f0911e264c274356777f2fcd,2024-08-06T15:35:16.910000
CVE-2024-40531,0,0,a616f229fea4a33b63668a7566e870e7dbb2de85bb00283e2d2ae24e3b4f7692,2024-08-05T16:15:36.800000
CVE-2024-40535,0,0,4a5d9d0c87f6ae400c205afdbc4f766e452e750a075595a5321b8d7d810f01d1,2024-07-17T13:34:20.520000
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
@ -256160,7 +256165,7 @@ CVE-2024-40948,0,0,dc9a62e9b912dabd72d9488c7b256cd8ebcc0e72fd137118119d1730a13f8
CVE-2024-40949,0,0,791b23d5aa5b8f2913b54416c907a4bc6a3427cfe143f82f7d7f99adf28299c3,2024-07-12T16:34:58.687000
CVE-2024-4095,0,0,e2a40f44bdf8e372a41806afdce4161562b7b4bb2bcba8f3987036690d2e8184,2024-06-17T12:42:04.623000
CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f822,2024-07-12T16:34:58.687000
CVE-2024-40951,0,1,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
CVE-2024-40952,0,0,284e20d0c02a4a07f0a633613bf6da63afc1e1864146bd195b56e5c256be8437,2024-07-12T16:34:58.687000
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
CVE-2024-40954,0,0,6435d77632d64383b2dd408edc2b98ec70827908a39e4fc7f1aeac09bff6b72f,2024-07-12T16:34:58.687000
@ -256366,6 +256371,7 @@ CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b
CVE-2024-41200,0,0,a85b7402470210271e38f3ba19d4d4a4fd58c351c46532db1fedf10c24fdcf89,2024-08-05T17:15:41.750000
CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
CVE-2024-41226,1,1,1459fd7132638dd8cee61bd4d8dee7a0776b17d1f6143a7c5ce631058b7c2502,2024-08-06T14:16:04.240000
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000
@ -256487,9 +256493,9 @@ CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b
CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000
CVE-2024-41676,0,0,61be418f160a9962fa96c6561684c479cc1e76f508200bb9c78cde88da1bdcd4,2024-07-29T16:21:52.517000
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
CVE-2024-41684,0,1,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
CVE-2024-41685,0,1,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
CVE-2024-41686,0,1,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
CVE-2024-41684,0,0,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
CVE-2024-41685,0,0,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
CVE-2024-41686,0,0,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
CVE-2024-41687,0,0,199fb127145ac44260897a6bcf0117750aa11faaae311cd3b70466837d9741d9,2024-08-05T21:05:30.230000
CVE-2024-41688,0,0,e43bf0a8b23358e8a5a87799b640ea50b62cd618df1c5997479a0ac424fb65f0,2024-08-05T21:05:46.433000
CVE-2024-41689,0,0,b6e829b3ccc25fd5870e6f72327a9c949de2035a3da497da461ad4ee01aed9c6,2024-08-05T21:05:55.990000
@ -256560,6 +256566,9 @@ CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f
CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000
CVE-2024-41889,0,0,7d97d05d2c63dbc041e7f27c9d9b9bb900acb0873f026af30a5ea731bc49fe0d,2024-08-05T12:41:45.957000
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
CVE-2024-41910,1,1,7e640313c20313a17fc092448cc354165592e9b1324b77711ce9805ff065499b,2024-08-06T14:16:04.350000
CVE-2024-41911,1,1,adafab6049d0c7eb160da0b2310f8f8769d422ad8d0e5cc37547fccc48247692,2024-08-06T14:16:04.427000
CVE-2024-41913,1,1,5ed99e4c2b2b2f5b0f40b3380794bef93c8b0e44cfe2d78822359e65f909466d,2024-08-06T14:16:04.480000
CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000
CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000
CVE-2024-41916,0,0,a0fecd8d5dfc5244c3f03c29349b89d02348a331ee6a39e9fbc76610f4f83ad0,2024-07-31T12:57:02.300000
@ -256594,13 +256603,13 @@ CVE-2024-41965,0,0,744da138649373c91e2d5048d78adcc6a9461c3a3df3b2d3193826fb19936
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
CVE-2024-41995,0,0,156b892398ee9eda29e3640460e8ccbfd7be9748436849e4e688199ff4695702,2024-08-06T07:15:46.330000
CVE-2024-41995,0,1,f9652060fe1799ba7e0f24d1af0902f010fdc54dcbb58173ba4f59c39fb69c02,2024-08-06T14:35:11.420000
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000
CVE-2024-42008,0,0,7c36b5673366032826436a227180e4306bc4ec6ae9c95aa42e9426014727b43a,2024-08-05T19:15:38.153000
CVE-2024-42009,0,0,38a314ddd4cf84005c16e16c9bb71b063dc72948224504de4bc471a8388480ac,2024-08-05T19:15:38.220000
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
CVE-2024-42010,0,0,5222596d5dde6f3a463b688317aeefa326f97df3fc52b35cf484e6f3460444cb,2024-08-05T19:15:38.273000
CVE-2024-42010,0,1,999c9e0a7fa82b335377093255b8c94119526bc623fcb15434cbdb5121ec3c65,2024-08-06T14:35:11.647000
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000
CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000
@ -256824,7 +256833,7 @@ CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d839
CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000
CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000
CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000
CVE-2024-43114,1,1,0a5da770a0fd17923a50b31df2b87b93a494d344d1174c6f2510e7a063c78459,2024-08-06T13:15:56.130000
CVE-2024-43114,0,0,0a5da770a0fd17923a50b31df2b87b93a494d344d1174c6f2510e7a063c78459,2024-08-06T13:15:56.130000
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
@ -257577,7 +257586,7 @@ CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da64
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000
CVE-2024-5179,0,1,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000
CVE-2024-5179,0,0,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000
CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000
CVE-2024-5182,0,0,11a8026128789bf16c353b6d9ea399398a270fcab4b8a2257261feecaeaad7ff,2024-06-20T12:43:25.663000
CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000
@ -258042,7 +258051,7 @@ CVE-2024-5739,0,0,607ae99ef991c260ab7d753d294117f20a4326531a649cb8963e8228c76ca4
CVE-2024-5741,0,0,6d324202e2efceeacccb12535a95801d87a66a1fe04ee84089df7f4c9fe71009,2024-06-17T12:42:04.623000
CVE-2024-5742,0,0,fb1a8c1252ee22cc610fe8ff09c119041e84ac15850fc2d3efcf49cef978035c,2024-06-17T12:15:49.850000
CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000
CVE-2024-5745,0,0,cded5ad41ef6333d80951aa3faa1a62096911219d310580ac748c5b446823d1c,2024-06-08T04:15:10.027000
CVE-2024-5745,0,1,45e4cce1990a5332f3fc13a691f25e40551bee96d698b0361d8c0089ac80523d,2024-08-06T14:37:59.943000
CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
CVE-2024-5751,0,0,b021056a2386bbaab3004cd237916090181697c8a0e20dfa0ef7d94a29a0eb73,2024-06-27T19:25:12.067000
@ -258490,9 +258499,9 @@ CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69f9,2024-06-27T14:15:16.753000
CVE-2024-6357,1,1,7f0a44c49954c810a6542a3e9df960774f17b65963c507c1c78b7fdf4d31fac0,2024-08-06T13:15:56.333000
CVE-2024-6358,1,1,03220ab1396339fe8dcd8d6790f519f6f3b95c0d6eb1899b445620248f6862fe,2024-08-06T13:15:56.547000
CVE-2024-6359,1,1,e777f6a5c45409a56001ec9fd2341a39f1706acccf77083aafe7f4bee9d73ced,2024-08-06T13:15:56.757000
CVE-2024-6357,0,0,7f0a44c49954c810a6542a3e9df960774f17b65963c507c1c78b7fdf4d31fac0,2024-08-06T13:15:56.333000
CVE-2024-6358,0,0,03220ab1396339fe8dcd8d6790f519f6f3b95c0d6eb1899b445620248f6862fe,2024-08-06T13:15:56.547000
CVE-2024-6359,0,0,e777f6a5c45409a56001ec9fd2341a39f1706acccf77083aafe7f4bee9d73ced,2024-08-06T13:15:56.757000
CVE-2024-6361,0,0,36217d2b7a7c7daf2929ff08b5f573bdc0840f10e6c13048ffc771df1bf8fbc1,2024-08-05T19:15:38.333000
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
@ -258674,7 +258683,7 @@ CVE-2024-6646,0,0,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1
CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73eb9,2024-08-01T22:15:46.930000
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000
CVE-2024-6651,0,0,73d21a9d6fa7c667faf1e0f966ada3c7bf41fc1bd868e7395e05923f19cc233e,2024-08-06T06:15:35.973000
CVE-2024-6651,0,1,6126e96ba10c7f0607db09a32b8bf87780fd7c7fe73c54f00cff0f84f3d1347c,2024-08-06T15:35:18.050000
CVE-2024-6652,0,0,0923244b6b76f442c47a88150f368b6b9dcb9b0e76b0d2676e50d3c093d67a8a,2024-07-11T13:05:54.930000
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
@ -258709,7 +258718,7 @@ CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f0
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
CVE-2024-6729,0,1,bcb767224deb16bf2afeb05fe1225bef68f4362bc8d1b39fa14ddbd884997e94,2024-08-06T12:15:52.700000
CVE-2024-6729,0,0,bcb767224deb16bf2afeb05fe1225bef68f4362bc8d1b39fa14ddbd884997e94,2024-08-06T12:15:52.700000
CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000
CVE-2024-6731,0,0,3927dffd3359d95ae39e41949bb1bae29552ebee68f43b9bd3d899c53faf9d10,2024-08-06T11:16:07.010000
CVE-2024-6732,0,0,debc28863268db45526dba3eb35b771205aaa0b4cc3cc7364610e353457afa91,2024-08-06T11:16:07.173000
@ -258737,7 +258746,7 @@ CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d484
CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6766,0,0,4d09ca3b6a9b021ea2575dff9ce754df4830f23a5ddff67ef81a99f1b17fc908,2024-08-06T06:15:36.047000
CVE-2024-6766,0,1,ea85e46c6bdb016503e7c85dab4ead46752f60cc6b72afb363a2a1a5825ff0d0,2024-08-06T14:35:12.940000
CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000
CVE-2024-6772,0,0,912a2e88fadcae9536686fa2edbaf67f780e09433e7c7b1a77cd2e7a853d1cc4,2024-08-01T14:00:38.260000
CVE-2024-6773,0,0,1cc7ee73b86e05dc74bca684f8041d0b5ae20ee7d4c5d09a0a1f363d55d99edd,2024-08-01T14:00:38.483000
@ -258904,12 +258913,12 @@ CVE-2024-7168,0,0,910224f79b3b67b053997cba38db0b80d710f3c8549be559cd68336fed4d28
CVE-2024-7169,0,0,f5980a4e5d2ccbce4c06d69d429b6969821394672e47084769e90ea39f080d62,2024-07-29T14:12:08.783000
CVE-2024-7170,0,0,c911de3ed6eb8f888dabc0e3c5c43c4020953d0677c78f27e334ac1aaf9f28b3,2024-07-29T14:12:08.783000
CVE-2024-7171,0,0,f9af9fb0c23fb7b822f7b4be7ea437b892bcf51d425201c5590fc38d73eb9531,2024-07-29T14:12:08.783000
CVE-2024-7172,0,1,bf11000a25aa390d844559afe580f0fa7d2d19a89cd008853f409aa8d14dd751,2024-08-06T12:51:40.243000
CVE-2024-7173,0,1,6bb8cb47776fd61e45ff0c4670a366d389e4ca60f59d7257e1318c9d7c651362,2024-08-06T12:52:46.230000
CVE-2024-7174,0,1,d36abd9cd6510076e70dd71c93b10f1e4d1fed543c9c27e06453ada743b13a00,2024-08-06T13:14:59.030000
CVE-2024-7175,0,1,17f9f11ad73b0149cbe68b3610e56dfc726e43ad613a2d806a5692ca7828052c,2024-08-06T12:57:14.623000
CVE-2024-7176,0,1,f0ec24b818ba0ff9dd236590bd5667a208b3bab5b5698785324754427c7e3ea5,2024-08-06T12:58:00.850000
CVE-2024-7177,0,1,32745634451f9d23649acc91ceb28c69502a441cced914546f92ea612c820689,2024-08-06T13:15:14.603000
CVE-2024-7172,0,0,bf11000a25aa390d844559afe580f0fa7d2d19a89cd008853f409aa8d14dd751,2024-08-06T12:51:40.243000
CVE-2024-7173,0,0,6bb8cb47776fd61e45ff0c4670a366d389e4ca60f59d7257e1318c9d7c651362,2024-08-06T12:52:46.230000
CVE-2024-7174,0,0,d36abd9cd6510076e70dd71c93b10f1e4d1fed543c9c27e06453ada743b13a00,2024-08-06T13:14:59.030000
CVE-2024-7175,0,0,17f9f11ad73b0149cbe68b3610e56dfc726e43ad613a2d806a5692ca7828052c,2024-08-06T12:57:14.623000
CVE-2024-7176,0,0,f0ec24b818ba0ff9dd236590bd5667a208b3bab5b5698785324754427c7e3ea5,2024-08-06T12:58:00.850000
CVE-2024-7177,0,0,32745634451f9d23649acc91ceb28c69502a441cced914546f92ea612c820689,2024-08-06T13:15:14.603000
CVE-2024-7178,0,0,52ae2b809c77291d60a9036321df7d8e5ce81e3908bf9bb5c27800ec4dcd8e64,2024-07-29T14:12:08.783000
CVE-2024-7179,0,0,65e0f2454d780ae3c2ff2d614aa12167e348369191f0ac2bf926afbe4156da4a,2024-07-29T14:12:08.783000
CVE-2024-7180,0,0,04e3dd812b22b1656218c3dd237532ed09069916c415498e7f349131a50802ae,2024-07-29T14:12:08.783000
@ -258940,12 +258949,12 @@ CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b006
CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000
CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000
CVE-2024-7211,0,0,f7cf1e82b08ec7fe9f4242ffeab1b87d553af7021ef2a87240fdd9ca70a1801c,2024-08-02T13:16:06.853000
CVE-2024-7212,0,0,d85ae600c31799294f18b9bdf208b413cec392bb78df4aac4443ee1d547655fa,2024-07-30T13:32:45.943000
CVE-2024-7213,0,0,f43e3a4d574beb5f0357466024a5b7d0acc9d943f364ba7f1706d9b4e0614f61,2024-07-30T13:32:45.943000
CVE-2024-7214,0,0,cf0ff9b3c048cd8fe1cbe27d866836b45cf6f395e7f604068bddd4880fe6e623,2024-07-30T13:32:45.943000
CVE-2024-7215,0,0,19cb74dd169a2c0adddcb9f3b1359dd5ec8b4cb73285f81c84c895b0918569f3,2024-07-30T13:32:45.943000
CVE-2024-7216,0,0,06cb7fdb9eba9a4918c738c6ef004796ad0e05a3d2a825c6eaa07e4a67d42660,2024-07-30T13:32:45.943000
CVE-2024-7217,0,1,7e7819767ae3464765ef049cf303542c287ee1345ab7dba2b9a6e7c05c9c0062,2024-08-06T13:54:06.807000
CVE-2024-7212,0,1,d8e81c1df21541a2a61b1ee61c0b13c7c5575d5a7c0cad80faa94c0502ea9af9,2024-08-06T14:06:56.937000
CVE-2024-7213,0,1,91cf0399575fcf8bfe7dc21faeb9bce09b9c6ac55860924943cc84f28093279f,2024-08-06T14:07:30.757000
CVE-2024-7214,0,1,3a78281a383bf44c352cba681f12759123f996c9d59985652a6e46e161f7ed5e,2024-08-06T14:08:05.393000
CVE-2024-7215,0,1,1ccd67c4053d473d76bae939b895612b63aea586e844e49a089165eb2effbb7c,2024-08-06T14:20:22.733000
CVE-2024-7216,0,1,235180a54ea7f2ef077cfee27bcc7d839591542d508b94dc70e3dbb3739843eb,2024-08-06T14:28:51.927000
CVE-2024-7217,0,0,7e7819767ae3464765ef049cf303542c287ee1345ab7dba2b9a6e7c05c9c0062,2024-08-06T13:54:06.807000
CVE-2024-7218,0,0,5d0054c3fdbf03d2b2f068cbdbe6251db2dbd2a118324c2439603e07b3cc1979,2024-07-30T13:32:45.943000
CVE-2024-7219,0,0,7e68d9931944536c53759c49211464ac06490e908e53e029d7404aa622e5549d,2024-07-30T13:32:45.943000
CVE-2024-7220,0,0,5720c21291c5d0d772a794164cf0868f04ecdd497da40613327c3e7f8460872e,2024-07-30T13:32:45.943000
@ -259043,7 +259052,7 @@ CVE-2024-7375,0,0,34e1bd107d2aecd6493421c4d3ab7a413fcec3731eb80185a4092f9ab654b1
CVE-2024-7376,0,0,13c26267c4eb798d77a069115917b306a73c1051ac2cdd324720ad494f5f9add,2024-08-02T12:59:43.990000
CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e43,2024-08-02T12:59:43.990000
CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000
CVE-2024-7383,0,0,8f160a1f5dcd9aa7ab86d2b4338288903362cf3c722e57113d2c7dd4e0acbc65,2024-08-05T14:15:35.130000
CVE-2024-7383,0,1,ad4b02f8256cef8377261caf01ecafd578896b81cb7387e69b1622049d5408d4,2024-08-06T15:15:42.053000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
CVE-2024-7395,0,0,e06fe4d153dceb3a090350ac3c99eb11a5eab3636b8f17750ef2d5462b4a0530,2024-08-05T14:15:35.483000
CVE-2024-7396,0,0,431a473e4f904546e17491bab2f9b1f68dbcc31eb95914f3ee1af5edf48452d3,2024-08-05T14:15:35.603000
@ -259091,20 +259100,20 @@ CVE-2024-7499,0,0,fa466cc6c096c43b53afcea4eeed2aa00cfe03fa9d1fcaf27af1880791fed5
CVE-2024-7500,0,0,5356987616ec53de8501f122a56ff58b8880556a3bec91f135a4cc8721caf5ce,2024-08-06T04:16:47.290000
CVE-2024-7505,0,0,0fed448836399741239c60dad8ffe115725cd14b95fa297f3cc9afa862fb3171,2024-08-06T04:16:47.857000
CVE-2024-7506,0,0,a716f33086cbe8664caa26445b5328b898f9ff087701d0ce048bc50b0e6ffeb8,2024-08-06T05:15:41.413000
CVE-2024-7518,1,1,94be60491c9746dbdb16571786c4349fc86267ca1462229f1300916f0483107a,2024-08-06T13:15:56.970000
CVE-2024-7519,1,1,e88f3f8a85d9ae2553126e26bb669bef93c95a3eedec840af737c3d1134edac1,2024-08-06T13:15:57.040000
CVE-2024-7520,1,1,6680739995f7d2a3f78deabfb204791061ee70cbfe60d502f5317460e630fde2,2024-08-06T13:15:57.107000
CVE-2024-7521,1,1,b84dee931c60a9429ca02e821575a4be568b84ccc15abd6f3440cdcded827a8c,2024-08-06T13:15:57.167000
CVE-2024-7522,1,1,7320e110232d4204cf160c1a74f2837aaf54c219edc44766282941c0fabadd0f,2024-08-06T13:15:57.237000
CVE-2024-7523,1,1,7a415d7b8bcc7ced5780da1a0c42d5a7d33035b6df26177c67f8ff68390c7520,2024-08-06T13:15:57.297000
CVE-2024-7524,1,1,bc6ee61d57e85a8865199dd95a6dcba05f760025fc7f1efa03f773069af10cf2,2024-08-06T13:15:57.357000
CVE-2024-7525,1,1,58ceb789cf8f9603674d6deb5b00a1918f90bfe7801a82b16ccf5221dde19622,2024-08-06T13:15:57.420000
CVE-2024-7526,1,1,2945e010b9d3fc561759077d77bf0778898bb54ef7c04098460b61baf34cbc57,2024-08-06T13:15:57.483000
CVE-2024-7527,1,1,635d9a4e465d05d55df4c38de27a7811daf4626d41281cb4b9bbb450ff39853d,2024-08-06T13:15:57.543000
CVE-2024-7528,1,1,39373d362f5e4f545251a1de7a3b3494efbb84d183a6e2fa4edeaa4da34cbc78,2024-08-06T13:15:57.600000
CVE-2024-7529,1,1,eac83591a5cf68566fdc662230f0eef4ad40e402a7fee7bd8b8c7955eee32ab1,2024-08-06T13:15:57.657000
CVE-2024-7530,1,1,23ed4db63a2a8ef5b15c39a1b54b35b4be482b2a9c778fefa1675c316a52cd60,2024-08-06T13:15:57.723000
CVE-2024-7531,1,1,023a8288dcdad02eeaa1918d46f22f961613e847da9fd0fc169deb0fa3e444fc,2024-08-06T13:15:57.787000
CVE-2024-7518,0,0,94be60491c9746dbdb16571786c4349fc86267ca1462229f1300916f0483107a,2024-08-06T13:15:56.970000
CVE-2024-7519,0,0,e88f3f8a85d9ae2553126e26bb669bef93c95a3eedec840af737c3d1134edac1,2024-08-06T13:15:57.040000
CVE-2024-7520,0,0,6680739995f7d2a3f78deabfb204791061ee70cbfe60d502f5317460e630fde2,2024-08-06T13:15:57.107000
CVE-2024-7521,0,1,b9765f228a24bde117657d7e00d8495683341470030c93842b4946737404b444,2024-08-06T14:35:13.910000
CVE-2024-7522,0,0,7320e110232d4204cf160c1a74f2837aaf54c219edc44766282941c0fabadd0f,2024-08-06T13:15:57.237000
CVE-2024-7523,0,0,7a415d7b8bcc7ced5780da1a0c42d5a7d33035b6df26177c67f8ff68390c7520,2024-08-06T13:15:57.297000
CVE-2024-7524,0,0,bc6ee61d57e85a8865199dd95a6dcba05f760025fc7f1efa03f773069af10cf2,2024-08-06T13:15:57.357000
CVE-2024-7525,0,0,58ceb789cf8f9603674d6deb5b00a1918f90bfe7801a82b16ccf5221dde19622,2024-08-06T13:15:57.420000
CVE-2024-7526,0,0,2945e010b9d3fc561759077d77bf0778898bb54ef7c04098460b61baf34cbc57,2024-08-06T13:15:57.483000
CVE-2024-7527,0,0,635d9a4e465d05d55df4c38de27a7811daf4626d41281cb4b9bbb450ff39853d,2024-08-06T13:15:57.543000
CVE-2024-7528,0,0,39373d362f5e4f545251a1de7a3b3494efbb84d183a6e2fa4edeaa4da34cbc78,2024-08-06T13:15:57.600000
CVE-2024-7529,0,1,55a360ab13a72c30d4892f1f1634ff194cf06f004b6de6c95a16ee1585e15a39,2024-08-06T14:35:14.733000
CVE-2024-7530,0,0,23ed4db63a2a8ef5b15c39a1b54b35b4be482b2a9c778fefa1675c316a52cd60,2024-08-06T13:15:57.723000
CVE-2024-7531,0,0,023a8288dcdad02eeaa1918d46f22f961613e847da9fd0fc169deb0fa3e444fc,2024-08-06T13:15:57.787000
CVE-2024-7537,0,0,2754597430b3398e50bf24aaa7d39e994c224c64952debab317f017a960bcb01,2024-08-06T00:15:34.653000
CVE-2024-7538,0,0,de29220cb377045c0459deaf6b69adeedda6f13b07a14f613cf81f8acd6354c8,2024-08-06T00:15:34.860000
CVE-2024-7539,0,0,eb9af53992225ab47d134bb6cf4c86798ffb792c4ea15fadf5eeb8e0c362f9fd,2024-08-06T00:15:35.053000
@ -259116,4 +259125,5 @@ CVE-2024-7544,0,0,080b0de39e8c8f2e6af2eaa3b14006dc3040de641ae6c032803cbfcd66ecd2
CVE-2024-7545,0,0,573a5b23c77789a8b3edf118a7d564b619d6c9f61267341b46eaf87deada162c,2024-08-06T00:15:36.247000
CVE-2024-7546,0,0,07ae86c51ff9b6287b4773e81c46673e6fef7a1f35d7346bf06ddaef956f485d,2024-08-06T00:15:36.450000
CVE-2024-7547,0,0,b727ccd37ef13a960fd8492a150c0deba10508cd85a9c0f2241c9f7ddc1a02e9,2024-08-06T00:15:36.637000
CVE-2024-7551,1,1,91e8e42faad68d533415ce39135290191a39b000131091c58c5bab8d2477b228,2024-08-06T13:15:57.850000
CVE-2024-7551,0,0,91e8e42faad68d533415ce39135290191a39b000131091c58c5bab8d2477b228,2024-08-06T13:15:57.850000
CVE-2024-7552,1,1,76e0dc4890ca9781c0460d2c9fe02ed3b01e46558b8ff80251dbb3da987b8420,2024-08-06T15:15:42.297000

Can't render this file because it is too large.