Auto-Update: 2024-08-28T22:00:17.522415+00:00

This commit is contained in:
cad-safe-bot 2024-08-28 22:03:13 +00:00
parent 4bbe8b0f33
commit fc8df9596f
52 changed files with 2440 additions and 244 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23086",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2024-02-15T05:15:09.273",
"lastModified": "2024-04-19T07:15:08.670",
"lastModified": "2024-08-28T20:35:00.763",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Los controladores para *_CFG_PAGE lectura/escritura ioctls en los controladores mpr, mps y mpt asignaron un b\u00fafer de un tama\u00f1o especificado por la persona que llama, pero copiaron en \u00e9l un encabezado de tama\u00f1o fijo. Otro contenido del mont\u00f3n se sobrescribir\u00eda si el tama\u00f1o especificado fuera demasiado peque\u00f1o. Los usuarios con acceso al nodo del dispositivo mpr, mps o mpt pueden sobrescribir los datos del mont\u00f3n, lo que podr\u00eda provocar una escalada de privilegios. Tenga en cuenta que solo el usuario ra\u00edz y los miembros del grupo de operadores pueden acceder al nodo del dispositivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:06.ioctl.asc",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33162",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-16T19:15:06.213",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T21:50:06.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,42 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65A1A95C-1687-4304-88C5-1BEB58BBC8DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_directory_integrator:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76B2C187-CEC8-4991-94E2-058B6584A40A"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228570",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7161442",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46497",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-07T09:15:37.970",
"lastModified": "2024-03-07T13:52:27.110",
"lastModified": "2024-08-28T21:35:00.797",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que Hospital Management System 1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro pat_number en his_doc_view_single_patien.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2022-46497/blob/main/CVE-33",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42873",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:49.997",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-28T20:35:03.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1, macOS Ventura 13.6.1. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://support.apple.com/en-us/HT213981",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47728",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-16T20:15:09.780",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T21:40:55.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -51,14 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.0.0",
"versionEndIncluding": "1.10.11.0",
"matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.12.0",
"versionEndExcluding": "1.10.23.0",
"matchCriteriaId": "4E1101FE-F579-4869-BFFD-6383D0F9C6A6"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272201",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7161427",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49543",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T22:15:47.640",
"lastModified": "2024-03-01T22:22:25.913",
"lastModified": "2024-08-28T20:35:04.473",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El control de acceso incorrecto en Book Store Management System v1 permite a los atacantes acceder a p\u00e1ginas no autorizadas y ejecutar funciones administrativas sin autenticarse."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/geraldoalcantara/CVE-2023-49543",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51835",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T01:42:05.830",
"lastModified": "2024-02-29T13:49:47.277",
"lastModified": "2024-08-28T20:35:05.240",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en TRENDnet TEW-822DRE v.1.03B02 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros ipv4_ping en /boafrm/formSystemCheck."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://warp-desk-89d.notion.site/TEW-822DRE-5289eb95796749c2878843519ab451d8",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1174",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-03-01T20:15:47.213",
"lastModified": "2024-03-01T22:22:25.913",
"lastModified": "2024-08-28T21:35:03.473",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Las versiones anteriores de HP ThinPro (anteriores a HP ThinPro 8.0 SP 8) podr\u00edan contener vulnerabilidades de seguridad. HP lanz\u00f3 HP ThinPro 8.0 SP 8, que incluye actualizaciones para mitigar posibles vulnerabilidades."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_10232639-10232671-16/hpsbhf03919",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23114",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-20T15:15:10.333",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-08-28T20:35:06.210",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache Camel CassandraQL Component AggregationRepository que es vulnerable a una deserializaci\u00f3n insegura. Bajo condiciones espec\u00edficas, es posible deserializar la carga \u00fatil maliciosa. Este problema afecta a Apache Camel: desde 3.0.0 antes de 3.21.4, desde 3.22.0 antes de 3.22.1, desde 4.0.0 antes de 4.0.4, desde 4.1.0 antes de 4.4 .0. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.4.0, que soluciona el problema. Si los usuarios est\u00e1n en el flujo de versiones 4.0.x LTS, se les sugiere actualizar a 4.0.4. Si los usuarios est\u00e1n en 3.x, se les sugiere pasar a 3.21.4 o 3.22.1"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24310",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-23T22:15:54.970",
"lastModified": "2024-02-26T13:42:22.567",
"lastModified": "2024-08-28T21:35:04.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el m\u00f3dulo \"Generar c\u00f3digo de barras en factura/albar\u00e1n de entrega\" (ecgeneratebarcode) de Ether Creation <= 1.2.0 para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://addons.prestashop.com/en/preparation-shipping/24123-generate-barcode-on-invoice-delivery-slip.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25024",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-15T03:15:04.353",
"lastModified": "2024-08-15T13:01:10.150",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T21:53:10.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -39,14 +59,58 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.0.0",
"versionEndIncluding": "1.10.11.0",
"matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.12.0",
"versionEndExcluding": "1.10.24.0",
"matchCriteriaId": "BE4221C4-D274-4B1E-B8CF-21C6E51ABD48"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281430",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7165488",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25187",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-02T04:15:12.203",
"lastModified": "2024-04-02T12:50:42.233",
"lastModified": "2024-08-28T20:35:06.460",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad de Server Side Request Forgery (SSRF) en 71cms v1.0.0 permite a atacantes remotos no autenticados obtener informaci\u00f3n confidencial a trav\u00e9s de getweather.html."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25212",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:09.063",
"lastModified": "2024-02-15T06:27:12.610",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T20:35:07.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25415",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T02:15:51.443",
"lastModified": "2024-06-07T15:15:49.860",
"lastModified": "2024-08-28T20:35:08.127",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en /admin/define_language.php de CE Phoenix v1.0.8.20 permite a atacantes ejecutar c\u00f3digo PHP de su elecci\u00f3n inyectando un payload manipulado en el archivo english.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/capture0x/Phoenix",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25713",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T01:44:16.333",
"lastModified": "2024-04-19T23:15:10.380",
"lastModified": "2024-08-28T21:35:04.973",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "yyjson hasta 0.8.0 tiene un doble free, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo en algunos casos, porque la funci\u00f3n pool_free carece de comprobaciones de bucle. (pool_free es parte del asignador de series de grupos, junto con pool_malloc y pool_realloc)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25893",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T18:15:51.580",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-28T21:35:05.727",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "ChurchCRM 5.5.0 FRCertificates.php es vulnerable a la inyecci\u00f3n ciega de SQL (basada en el tiempo) a trav\u00e9s del par\u00e1metro GET CurrentFundraiser."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/6856",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T14:15:47.263",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-28T21:35:06.473",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /core/tools/delete_place.php"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/xiaolanjing0/cms/blob/main/1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26455",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-26T18:15:07.863",
"lastModified": "2024-02-26T22:10:40.463",
"lastModified": "2024-08-28T21:35:07.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "fluent-bit 2.2.2 contiene una vulnerabilidad Use-After-Free en /fluent-bit/plugins/custom_calyptia/calyptia.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://github.com/LuMingYinDetect/fluent-bit_defects/blob/main/fluent-bit_detect_1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26491",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T06:15:57.973",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-28T20:35:09.023",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el m\u00f3dulo adicional JD Flusity 'Galer\u00eda de medios con descripci\u00f3n' de flusity-CMS v2.33 permite a los atacantes ejecutar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto del nombre de la Galer\u00eda."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/2111715623/cms/blob/main/1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28215",
"sourceIdentifier": "cve@navercorp.com",
"published": "2024-03-07T05:15:54.940",
"lastModified": "2024-03-07T13:52:27.110",
"lastModified": "2024-08-28T21:35:07.973",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "nGrinder anterior a 3.5.9 permite a un atacante crear o actualizar la configuraci\u00f3n de webhook debido a la falta de control de acceso, lo que podr\u00eda ser la causa de la divulgaci\u00f3n de informaci\u00f3n y Server-Side Request Forgery."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@navercorp.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28396",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T14:15:08.650",
"lastModified": "2024-03-20T17:18:26.603",
"lastModified": "2024-08-28T21:35:08.140",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue in MyPrestaModules ordersexport v.6.0.2 and before allows a remote attacker to execute arbitrary code via the download.php component."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://addons.prestashop.com/en/data-import-export/17596-orders-csv-excel-export-pro.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28434",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T14:15:09.720",
"lastModified": "2024-03-25T16:43:06.137",
"lastModified": "2024-08-28T21:35:08.910",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La plataforma CRM Twenty es vulnerable a cross site scripting almacenado mediante la carga de archivos en la versi\u00f3n 0.3.0. Un archivo svg manipulado puede desencadenar la ejecuci\u00f3n del c\u00f3digo javascript."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29435",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-01T20:15:20.710",
"lastModified": "2024-04-02T12:50:42.233",
"lastModified": "2024-08-28T20:35:10.057",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema descubierto en Alldata v0.4.6 permite a un atacante ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro ProcessId."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Raybye/ea3a46adc5ea51e659c42218f05153fa",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29469",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T21:15:32.267",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-08-28T21:35:09.653",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en OneBlog v2.3.4 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Lista de categor\u00edas en el m\u00f3dulo Lab. "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-34195",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T20:15:07.580",
"lastModified": "2024-08-28T20:35:10.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34906",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-15T20:15:13.460",
"lastModified": "2024-05-23T20:42:22.080",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T21:35:11.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35344",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-28T17:15:10.650",
"lastModified": "2024-05-29T13:02:09.280",
"lastModified": "2024-08-28T20:35:11.640",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Ciertos productos Anpviz contienen una clave criptogr\u00e1fica codificada almacenada en el firmware del dispositivo. Esto afecta a IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, Firmware YM800N_N2, YMF50B, YM800SV2, YM500L8 y YM200E10 v3.2.2.2 y versiones anteriores y posiblemente m\u00e1s proveedores/modelos de c\u00e1mara IP."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://willgu.es/pages/anpviz-ip-camera-vuln.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37325",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-06-11T17:16:04.477",
"lastModified": "2024-06-13T18:36:09.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T21:29:34.533",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:azure_data_science_virtual_machine:*:*:*:*:*:linux:*:*",
"versionEndExcluding": "24.05.24",
"matchCriteriaId": "5CB6563E-EAC9-41D9-A809-930BC0A40DF7"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37325",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42462",
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"published": "2024-08-16T14:15:13.253",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T20:46:39.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.10",
"matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0"
}
]
}
]
}
],
"references": [
{
"url": "https://support.upkeeper.se/hc/en-us/articles/15432045399452-CVE-2024-42462-Bypass-multifactor-authentication",
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42463",
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"published": "2024-08-16T14:15:13.650",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T20:38:25.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.10",
"matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0"
}
]
}
]
}
],
"references": [
{
"url": "https://support.upkeeper.se/hc/en-us/articles/15432241822620-CVE-2024-42463-Leak-of-organizations-messages",
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42464",
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"published": "2024-08-16T14:15:13.933",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T20:35:52.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.10",
"matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0"
}
]
}
]
}
],
"references": [
{
"url": "https://support.upkeeper.se/hc/en-us/articles/15432275702044-CVE-2024-42464-Leak-of-user-Information",
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42465",
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"published": "2024-08-16T14:15:14.133",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T20:32:31.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
},
{
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.1.10",
"matchCriteriaId": "89DE4E9D-0FC2-459B-95C7-93830E885A9E"
}
]
}
]
}
],
"references": [
{
"url": "https://support.upkeeper.se/hc/en-us/articles/15432332385564-CVE-2024-42465-Lack-of-resources-and-rate-limiting-two-factor-authentication",
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42466",
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"published": "2024-08-16T14:15:14.343",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T20:48:14.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
},
{
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.10",
"matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0"
}
]
}
]
}
],
"references": [
{
"url": "https://support.upkeeper.se/hc/en-us/articles/15432408367260-CVE-2024-42466-Lack-of-resources-and-rate-limiting-login",
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-42793",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T20:15:07.707",
"lastModified": "2024-08-28T20:35:12.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Music Management System v1.0 via a crafted request to the /music/ajax.php?action=save_user page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/CSRF%20-%20Edit%20User.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-42851",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-27T18:15:14.993",
"lastModified": "2024-08-27T19:35:28.000",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T20:15:07.787",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function."
},
{
"lang": "es",
"value": "La vulnerabilidad de desbordamiento de b\u00fafer en exiftags de c\u00f3digo abierto v.1.01 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n paresetag."
}
],
"metrics": {
@ -49,7 +53,7 @@
],
"references": [
{
"url": "https://github.com/T1anyang/fuzzing/blob/main/exiftags/crash.md",
"url": "https://github.com/T1anyang/fuzzing/tree/main/exiftags",
"source": "cve@mitre.org"
}
]

View File

@ -2,19 +2,23 @@
"id": "CVE-2024-42913",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-26T18:15:07.283",
"lastModified": "2024-08-26T19:10:09.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T20:15:07.880",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RuoYi CMS v4.7.9 was discovered to contain a SQL injection vulnerability via the job_id parameter at /sasfs1."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que RuoYi CMS v4.7.9 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro job_id en /sasfs1."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"url": "https://github.com/kkll5875",
"source": "cve@mitre.org"
}
]

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43805",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-28T20:15:07.963",
"lastModified": "2024-08-28T20:15:07.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. This vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab v3.6.8, v4.2.5 and Jupyter Notebook v7.2.2 have been patched to resolve this issue. Users are advised to upgrade. There is no workaround for the underlying DOM Clobbering susceptibility. However, select plugins can be disabled on deployments which cannot update in a timely fashion to minimise the risk. These are: 1. `@jupyterlab/mathjax-extension:plugin` - users will loose ability to preview mathematical equations. 2. `@jupyterlab/markdownviewer-extension:plugin` - users will loose ability to open Markdown previews. 3. `@jupyterlab/mathjax2-extension:plugin` (if installed with optional `jupyterlab-mathjax2` package) - an older version of the mathjax plugin for JupyterLab 4.x. To disable these extensions run: ```jupyter labextension disable @jupyterlab/markdownviewer-extension:plugin && jupyter labextension disable @jupyterlab/mathjax-extension:plugin && jupyter labextension disable @jupyterlab/mathjax2-extension:plugin ``` in bash."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-9q39-rmj3-p4r2",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-44760",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T20:15:08.230",
"lastModified": "2024-08-28T21:35:14.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in the component /servlet/SnoopServlet of Shenzhou News Union Enterprise Management System v5.0 through v18.8 allows attackers to access sensitive information regarding the server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/SunmoEMS/SunmoEMS-info.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44761",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T19:15:08.933",
"lastModified": "2024-08-28T19:15:08.933",
"lastModified": "2024-08-28T20:35:14.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue in EQ Enterprise Management System before v2.0.0 allows attackers to execute a directory traversal via crafted requests."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/EQ/EQEMS.md",

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-45043",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-28T20:15:08.347",
"lastModified": "2024-08-28T20:15:08.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OpenTelemetry Collector module AWS firehose receiver is for ingesting AWS Kinesis Data Firehose delivery stream messages and parsing the records received based on the configured record type. `awsfirehosereceiver` allows unauthenticated remote requests, even when configured to require a key. OpenTelemetry Collector can be configured to receive CloudWatch metrics via an AWS Firehose Stream. Firehose sets the header `X-Amz-Firehose-Access-Key` with an arbitrary configured string. The OpenTelemetry Collector awsfirehosereceiver can optionally be configured to require this key on incoming requests. However, when this is configured it **still accepts incoming requests with no key**. Only OpenTelemetry Collector users configured with the \u201calpha\u201d `awsfirehosereceiver` module are affected. This module was added in version v0.49.0 of the \u201cContrib\u201d distribution (or may be included in custom builds). There is a risk of unauthorized users writing metrics. Carefully crafted metrics could hide other malicious activity. There is no risk of exfiltrating data. It\u2019s likely these endpoints will be exposed to the public internet, as Firehose does not support private HTTP endpoints. A fix was introduced in PR #34847 and released with v0.108.0. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://docs.aws.amazon.com/firehose/latest/dev/controlling-access.html#using-iam-http",
"source": "security-advisories@github.com"
},
{
"url": "https://docs.aws.amazon.com/firehose/latest/dev/httpdeliveryrequestresponse.html",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-telemetry/opentelemetry-collector#alpha",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/pull/34847",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/security/advisories/GHSA-prf6-xjxh-p698",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/receiver/awsfirehosereceiver",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-telemetry/opentelemetry-collector-releases/pull/74",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-telemetry/opentelemetry-collector-releases/releases/tag/v0.108.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-telemetry/opentelemetry-collector-releases/tree/main/distributions/otelcol-contrib",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45046",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-28T21:15:06.603",
"lastModified": "2024-08-28T21:15:06.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. In affected versions `\\PhpOffice\\PhpSpreadsheet\\Writer\\Html` doesn't sanitize spreadsheet styling information such as font names, allowing an attacker to inject arbitrary JavaScript on the page. As a result an attacker may used a crafted spreadsheet to fully takeover a session of a user viewing spreadsheet files as HTML. This issue has been addressed in release version 2.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/f7cf378faed2e11cf4825bf8bafea4922ae44667",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/pull/3957",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-wgmf-q9vr-vww6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45048",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-28T21:15:06.817",
"lastModified": "2024-08-28T21:15:06.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. Affected versions are subject to a bypassing of a filter which allows for an XXE-attack. This in turn allows attacker to obtain contents of local files, even if error reporting is muted. This vulnerability has been addressed in release version 2.2.1. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/bea2d4b30f24bcc8a7712e208d1359e603b45dda",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-ghg6-32f9-2jp7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-45054",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-28T20:15:08.547",
"lastModified": "2024-08-28T20:15:08.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been patched in version 0.14.6. All users are advised to upgrade. Users unable to upgrade should update and limit the ClusterRole using security-role."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/hwameistor/hwameistor/commit/edf4cebed73cadd230bf97eab65c5311f2858450",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/hwameistor/hwameistor/issues/1457",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/hwameistor/hwameistor/issues/1460",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/hwameistor/hwameistor/security/advisories/GHSA-mgwr-h7mv-fh29",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45057",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-28T21:15:07.027",
"lastModified": "2024-08-28T21:15:07.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. The lack of sanitization of user-controlled parameters for generating HTML field values \u200b\u200bdynamically leads to XSS (Cross-Site Scripting) attacks. The dynamic generation of HTML fields in the ieducar/intranet/include/clsCampos.inc.php file does not perform the correct validation or sanitization, reflecting the user-controlled values \u200b\u200bto be shown in the page's HTML. This allows an attacker to inject a specific XSS payload into a parameter. Successful exploitation of this flaw allows an attacker to trick the victim into clicking a vulnerable URL, enabling JavaScript scripts to be executed in the browser. Due to the configuration of session cookies, with the HttpOnly and SameSite=Lax flags being defined, there is little an attacker can do to steal the session or force the victim to perform actions within the application. This issue hast been patched but a new release has not yet been made. Users are advised to contact the developer and to coordinate an update schedule."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/portabilis/i-educar/commit/f2d768534aabc09b2a1fc8a5cc5f9c93925cb273",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwj",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45058",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-28T21:15:07.283",
"lastModified": "2024-08-28T21:15:07.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. An attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions). Any user is capable of becoming an administrator, which can lead to account theft, changing administrative tasks, etc. The failure occurs in the file located in ieducar/intranet/educar_usuario_cad.php on line 446 , which does not perform checks on the user's current permission level to make changes. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-53vj-fq8x-2mvg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45059",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-28T21:15:07.473",
"lastModified": "2024-08-28T21:15:07.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. In affected versions Creating a SQL query from a concatenation of a user-controlled GET parameter allows an attacker to manipulate the query. Successful exploitation of this flaw allows an attacker to have complete and unrestricted access to the database, with a web user with minimal permissions. This may involve obtaining user information, such as emails, password hashes, etc. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-2v4w-7xqr-hxmr",
"source": "security-advisories@github.com"
},
{
"url": "https://portswigger.net/web-security/sql-injection",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7851",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-16T02:15:18.720",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T21:10:07.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,22 +150,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_add.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.274756",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.274756",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.391640",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7852",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-16T02:15:18.960",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T21:07:30.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_xss.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.274757",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.274757",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.391663",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7853",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-16T02:15:19.217",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T21:03:35.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_sql.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.274758",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.274758",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.391666",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7867",
"sourceIdentifier": "xpdf@xpdfreader.com",
"published": "2024-08-15T20:15:18.967",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T21:59:33.973",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,45 @@
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-369"
}
]
},
{
"source": "xpdf@xpdfreader.com",
"type": "Secondary",
@ -77,10 +113,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.05",
"matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-7867.html",
"source": "xpdf@xpdfreader.com"
"source": "xpdf@xpdfreader.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-28T20:00:17.696095+00:00
2024-08-28T22:00:17.522415+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-28T19:59:22.927000+00:00
2024-08-28T21:59:33.973000+00:00
```
### Last Data Feed Release
@ -33,50 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261393
261404
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `11`
- [CVE-2024-41236](CVE-2024/CVE-2024-412xx/CVE-2024-41236.json) (`2024-08-28T18:15:09.497`)
- [CVE-2024-42905](CVE-2024/CVE-2024-429xx/CVE-2024-42905.json) (`2024-08-28T18:15:09.630`)
- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-28T19:15:08.933`)
- [CVE-2024-44913](CVE-2024/CVE-2024-449xx/CVE-2024-44913.json) (`2024-08-28T18:15:09.707`)
- [CVE-2024-44914](CVE-2024/CVE-2024-449xx/CVE-2024-44914.json) (`2024-08-28T18:15:09.780`)
- [CVE-2024-44915](CVE-2024/CVE-2024-449xx/CVE-2024-44915.json) (`2024-08-28T18:15:09.863`)
- [CVE-2024-34195](CVE-2024/CVE-2024-341xx/CVE-2024-34195.json) (`2024-08-28T20:15:07.580`)
- [CVE-2024-42793](CVE-2024/CVE-2024-427xx/CVE-2024-42793.json) (`2024-08-28T20:15:07.707`)
- [CVE-2024-43805](CVE-2024/CVE-2024-438xx/CVE-2024-43805.json) (`2024-08-28T20:15:07.963`)
- [CVE-2024-44760](CVE-2024/CVE-2024-447xx/CVE-2024-44760.json) (`2024-08-28T20:15:08.230`)
- [CVE-2024-45043](CVE-2024/CVE-2024-450xx/CVE-2024-45043.json) (`2024-08-28T20:15:08.347`)
- [CVE-2024-45046](CVE-2024/CVE-2024-450xx/CVE-2024-45046.json) (`2024-08-28T21:15:06.603`)
- [CVE-2024-45048](CVE-2024/CVE-2024-450xx/CVE-2024-45048.json) (`2024-08-28T21:15:06.817`)
- [CVE-2024-45054](CVE-2024/CVE-2024-450xx/CVE-2024-45054.json) (`2024-08-28T20:15:08.547`)
- [CVE-2024-45057](CVE-2024/CVE-2024-450xx/CVE-2024-45057.json) (`2024-08-28T21:15:07.027`)
- [CVE-2024-45058](CVE-2024/CVE-2024-450xx/CVE-2024-45058.json) (`2024-08-28T21:15:07.283`)
- [CVE-2024-45059](CVE-2024/CVE-2024-450xx/CVE-2024-45059.json) (`2024-08-28T21:15:07.473`)
### CVEs modified in the last Commit
Recently modified CVEs: `57`
Recently modified CVEs: `39`
- [CVE-2024-30624](CVE-2024/CVE-2024-306xx/CVE-2024-30624.json) (`2024-08-28T18:35:15.953`)
- [CVE-2024-31819](CVE-2024/CVE-2024-318xx/CVE-2024-31819.json) (`2024-08-28T19:35:18.897`)
- [CVE-2024-39504](CVE-2024/CVE-2024-395xx/CVE-2024-39504.json) (`2024-08-28T19:58:45.653`)
- [CVE-2024-39506](CVE-2024/CVE-2024-395xx/CVE-2024-39506.json) (`2024-08-28T19:58:56.013`)
- [CVE-2024-39510](CVE-2024/CVE-2024-395xx/CVE-2024-39510.json) (`2024-08-28T19:59:12.947`)
- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-28T19:47:25.410`)
- [CVE-2024-40530](CVE-2024/CVE-2024-405xx/CVE-2024-40530.json) (`2024-08-28T19:15:08.717`)
- [CVE-2024-40531](CVE-2024/CVE-2024-405xx/CVE-2024-40531.json) (`2024-08-28T19:15:08.797`)
- [CVE-2024-40899](CVE-2024/CVE-2024-408xx/CVE-2024-40899.json) (`2024-08-28T19:59:22.927`)
- [CVE-2024-40932](CVE-2024/CVE-2024-409xx/CVE-2024-40932.json) (`2024-08-28T19:48:53.420`)
- [CVE-2024-40934](CVE-2024/CVE-2024-409xx/CVE-2024-40934.json) (`2024-08-28T19:49:04.307`)
- [CVE-2024-40954](CVE-2024/CVE-2024-409xx/CVE-2024-40954.json) (`2024-08-28T19:43:58.273`)
- [CVE-2024-40955](CVE-2024/CVE-2024-409xx/CVE-2024-40955.json) (`2024-08-28T19:45:37.080`)
- [CVE-2024-40956](CVE-2024/CVE-2024-409xx/CVE-2024-40956.json) (`2024-08-28T18:58:48.433`)
- [CVE-2024-40957](CVE-2024/CVE-2024-409xx/CVE-2024-40957.json) (`2024-08-28T18:58:59.793`)
- [CVE-2024-40958](CVE-2024/CVE-2024-409xx/CVE-2024-40958.json) (`2024-08-28T18:46:29.543`)
- [CVE-2024-40959](CVE-2024/CVE-2024-409xx/CVE-2024-40959.json) (`2024-08-28T18:46:52.453`)
- [CVE-2024-43472](CVE-2024/CVE-2024-434xx/CVE-2024-43472.json) (`2024-08-28T19:13:21.393`)
- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-28T19:15:09.110`)
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-28T19:15:09.210`)
- [CVE-2024-45193](CVE-2024/CVE-2024-451xx/CVE-2024-45193.json) (`2024-08-28T19:15:09.297`)
- [CVE-2024-6361](CVE-2024/CVE-2024-63xx/CVE-2024-6361.json) (`2024-08-28T18:17:35.497`)
- [CVE-2024-7061](CVE-2024/CVE-2024-70xx/CVE-2024-7061.json) (`2024-08-28T18:25:38.217`)
- [CVE-2024-7578](CVE-2024/CVE-2024-75xx/CVE-2024-7578.json) (`2024-08-28T18:27:18.510`)
- [CVE-2024-7579](CVE-2024/CVE-2024-75xx/CVE-2024-7579.json) (`2024-08-28T18:26:46.117`)
- [CVE-2024-25713](CVE-2024/CVE-2024-257xx/CVE-2024-25713.json) (`2024-08-28T21:35:04.973`)
- [CVE-2024-25893](CVE-2024/CVE-2024-258xx/CVE-2024-25893.json) (`2024-08-28T21:35:05.727`)
- [CVE-2024-26445](CVE-2024/CVE-2024-264xx/CVE-2024-26445.json) (`2024-08-28T21:35:06.473`)
- [CVE-2024-26455](CVE-2024/CVE-2024-264xx/CVE-2024-26455.json) (`2024-08-28T21:35:07.220`)
- [CVE-2024-26491](CVE-2024/CVE-2024-264xx/CVE-2024-26491.json) (`2024-08-28T20:35:09.023`)
- [CVE-2024-28215](CVE-2024/CVE-2024-282xx/CVE-2024-28215.json) (`2024-08-28T21:35:07.973`)
- [CVE-2024-28396](CVE-2024/CVE-2024-283xx/CVE-2024-28396.json) (`2024-08-28T21:35:08.140`)
- [CVE-2024-28434](CVE-2024/CVE-2024-284xx/CVE-2024-28434.json) (`2024-08-28T21:35:08.910`)
- [CVE-2024-29435](CVE-2024/CVE-2024-294xx/CVE-2024-29435.json) (`2024-08-28T20:35:10.057`)
- [CVE-2024-29469](CVE-2024/CVE-2024-294xx/CVE-2024-29469.json) (`2024-08-28T21:35:09.653`)
- [CVE-2024-34906](CVE-2024/CVE-2024-349xx/CVE-2024-34906.json) (`2024-08-28T21:35:11.000`)
- [CVE-2024-35344](CVE-2024/CVE-2024-353xx/CVE-2024-35344.json) (`2024-08-28T20:35:11.640`)
- [CVE-2024-37325](CVE-2024/CVE-2024-373xx/CVE-2024-37325.json) (`2024-08-28T21:29:34.533`)
- [CVE-2024-42462](CVE-2024/CVE-2024-424xx/CVE-2024-42462.json) (`2024-08-28T20:46:39.227`)
- [CVE-2024-42463](CVE-2024/CVE-2024-424xx/CVE-2024-42463.json) (`2024-08-28T20:38:25.227`)
- [CVE-2024-42464](CVE-2024/CVE-2024-424xx/CVE-2024-42464.json) (`2024-08-28T20:35:52.940`)
- [CVE-2024-42465](CVE-2024/CVE-2024-424xx/CVE-2024-42465.json) (`2024-08-28T20:32:31.737`)
- [CVE-2024-42466](CVE-2024/CVE-2024-424xx/CVE-2024-42466.json) (`2024-08-28T20:48:14.917`)
- [CVE-2024-42851](CVE-2024/CVE-2024-428xx/CVE-2024-42851.json) (`2024-08-28T20:15:07.787`)
- [CVE-2024-42913](CVE-2024/CVE-2024-429xx/CVE-2024-42913.json) (`2024-08-28T20:15:07.880`)
- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-28T20:35:14.040`)
- [CVE-2024-7851](CVE-2024/CVE-2024-78xx/CVE-2024-7851.json) (`2024-08-28T21:10:07.750`)
- [CVE-2024-7852](CVE-2024/CVE-2024-78xx/CVE-2024-7852.json) (`2024-08-28T21:07:30.690`)
- [CVE-2024-7853](CVE-2024/CVE-2024-78xx/CVE-2024-7853.json) (`2024-08-28T21:03:35.003`)
- [CVE-2024-7867](CVE-2024/CVE-2024-78xx/CVE-2024-7867.json) (`2024-08-28T21:59:33.973`)
## Download and Usage

View File

@ -172434,7 +172434,7 @@ CVE-2021-27306,0,0,6abb731f828d50dc31f5f8837f00ca666d352d589a763274228d94676f30c
CVE-2021-27308,0,0,e75f64a338a590d6b8449ea646ab6c14feb2426700cc002f9c97dbfbf9db1140,2022-05-23T22:32:02.527000
CVE-2021-27309,0,0,8f9d76be4305a6f70900f6114f260a4b3c8b50eb1326d17357d09b984d01979e,2021-03-24T18:49:25.550000
CVE-2021-27310,0,0,17a88a926ef1eb0c9fffe07d584ba0bf2cca7e1fb363224d505448be27be189d,2021-03-24T18:49:16.487000
CVE-2021-27312,0,1,582b4519c2f7da9307132dd1ce33c17599b9214773e4d22a91abd408d1004b84,2024-08-28T19:35:00.870000
CVE-2021-27312,0,0,582b4519c2f7da9307132dd1ce33c17599b9214773e4d22a91abd408d1004b84,2024-08-28T19:35:00.870000
CVE-2021-27314,0,0,ef81da613fa1d85737a5304fe0630c44874df715bb96267109aa2ed2ca143cf7,2021-03-05T20:45:06.427000
CVE-2021-27315,0,0,3677cea89d40f4da4399e75a818af2539c61b38b6962a639337d49aae8920b57,2021-03-24T15:53:20.323000
CVE-2021-27316,0,0,337c98afb6705298ed6fdf81f64738cc12146f58af35bb909361215bab6049a6,2021-03-24T15:54:58.873000
@ -192298,7 +192298,7 @@ CVE-2022-23082,0,0,ed78bdf538bf7b60edbc93ab6504b678e167f80f5b68fc48b75db1e83d985
CVE-2022-23083,0,0,684a6dd88ae5ed867b99fc818b8fefbb26179e2cd128f1a245762ef7032c445b,2022-01-26T14:23:02.100000
CVE-2022-23084,0,0,eed95f3fcb710f55aeaa0b13782419b97e1ab24731bc10139becaf7cdc3a00c6,2024-04-19T07:15:08.510000
CVE-2022-23085,0,0,6c73d80fe53102f1d24a88a241ff940732efb10aff95a9e7b73dbc233257f85c,2024-08-01T13:42:36.137000
CVE-2022-23086,0,0,1986afec393a76319bf2f11604293837b0b02358fda7fa1eee7a754322983738,2024-04-19T07:15:08.670000
CVE-2022-23086,0,1,c169c43dc828a3b0f4274b523e5d0ee92a8d70ae315844f678d28d2b1843e91c,2024-08-28T20:35:00.763000
CVE-2022-23087,0,0,7c11c887965510f82185d4811a8db490ae631d7aafb2819d8ae31377af05c24f,2024-05-14T10:18:03.900000
CVE-2022-23088,0,0,41b982ff884b09c7af016b00e2197b8636d45745a8254c2bcb871053e56fd8c8,2024-08-01T13:42:36.930000
CVE-2022-23089,0,0,a18ed816bdf6550bacfc7602b0b6a6a3a9b978a024fd3339be9009323e78d936,2024-05-14T10:18:04.163000
@ -200717,7 +200717,7 @@ CVE-2022-33159,0,0,09a6d779ef2e921e906741d69945a5716b4aa63c927464d64d0cc321c8c2b
CVE-2022-3316,0,0,0e352ce0dc79277646c38d84f177d0d41bf6a8506e72acb1afb6e4cdb4e789e9,2023-08-08T14:22:24.967000
CVE-2022-33160,0,0,4524e302e986f2f11251ec9420ef9a332e5b897db2b323b489b3697e20151940,2023-10-10T19:33:22.613000
CVE-2022-33161,0,0,9b564272eda8422bcfdb9e610ed785f83a39fd4e9f350f5a12254c1413af8489,2023-10-18T20:32:01.117000
CVE-2022-33162,0,0,ddc66ac41c43ce4a11c7c91a727316fec131c8c06fea536a9d66a05d08dbbd2d,2024-08-19T13:00:23.117000
CVE-2022-33162,0,1,ee83992396dc1d90b25687e547b058d924eb9adc5b04664ce4d4fc20d72bc710,2024-08-28T21:50:06.957000
CVE-2022-33163,0,0,b61f3ea147baa21e6ebf2ff08a6d967daea38661c6a0960dc98920da3d5f205f,2023-06-21T01:21:30.867000
CVE-2022-33164,0,0,dbaf77514b572a2cfd8228382e6c957006b84e1d6ae63a3e84231dd2ca0b472b,2023-09-12T19:32:37.400000
CVE-2022-33165,0,0,e7688469b7d6da31601d151e4c0adf399b51978b7602bb1f42ecf3e3278543da,2023-10-18T20:34:14.447000
@ -210719,7 +210719,7 @@ CVE-2022-46491,0,0,7cf787b0158a46d4d0a3a850683fc606cd27e2e320475f05bf2ddc7245cee
CVE-2022-46492,0,0,0d81290360c5ada607484ec0ad93da74f5a2923c0d38acd52abc7a99f70f88df,2022-12-30T21:58:26.497000
CVE-2022-46493,0,0,8bc0a9915aba601c6842b74a3b025d212c7066b5f6bd6752f00c22069375ded3,2022-12-30T21:51:55.933000
CVE-2022-46496,0,0,c3befa1df0c30d834ae1c378018c388a17eda39b09699ab7fe1e9a9331d9cad5,2023-02-14T23:37:54.023000
CVE-2022-46497,0,0,dcd1abb9de3dc65c257ba425d5a9b9928fa3724a60328a4a2de7f515de6199f3,2024-03-07T13:52:27.110000
CVE-2022-46497,0,1,fdd15307fcbb61cc1ee8fe6578d9fff4954a47ac5f48f3971ddbb2807d571379,2024-08-28T21:35:00.797000
CVE-2022-46498,0,0,062148cc3061fa91c4a108e42bef3a9f125c3d1f2bb16b9b89663981c79acc97,2024-08-01T13:43:03.260000
CVE-2022-46499,0,0,d33b165617169a7122716363ce1c101954c885dac6453896a659fcba4e0adcf1,2024-08-14T19:35:07.510000
CVE-2022-4650,0,0,f3263e15cad35090681797f47376b7071744d021767c2be8dc922dbf6caa2f31,2023-11-07T03:58:28.357000
@ -218046,7 +218046,7 @@ CVE-2023-2433,0,0,fcefb1d744e2436ca34c1e96068dcbd24fc8579f4fa267fa852ea1937f688b
CVE-2023-24330,0,0,f05bada3541e493f7c0e952b860209e4955262c38b475c09bca0b6c5156aade2,2024-08-01T13:43:24.723000
CVE-2023-24331,0,0,050f04d9bf3b2540619b4f1f79736e1598d2474273dc0664c9e95b1007380a03,2024-02-22T19:07:27.197000
CVE-2023-24332,0,0,1c7be458c561d88b0c65bf8a70fcb4598344686f5f419e9a0237e871f28b3aa5,2024-08-14T15:35:01.550000
CVE-2023-24333,0,1,7e9df531c069ed4755a06f2fb82b4efefe770605f70313b1d809bac7d59607a8,2024-08-28T18:35:00.873000
CVE-2023-24333,0,0,7e9df531c069ed4755a06f2fb82b4efefe770605f70313b1d809bac7d59607a8,2024-08-28T18:35:00.873000
CVE-2023-24334,0,0,6e7ba58a919aa1ee8ff4fce321878db0fcd5ef0e2aebc034e541821e975781cb,2024-08-01T13:43:27.040000
CVE-2023-2434,0,0,a9f172aa8578fb49449bc37bd820ab24b165eed89a9643a4cca796b2ac20b5bf,2023-12-18T15:32:39.347000
CVE-2023-24343,0,0,d251214a0e80bbc1652809830ae45654632b0e128cea4fecfea9ad00cc1f3017,2023-04-26T18:55:30.893000
@ -225418,7 +225418,7 @@ CVE-2023-33672,0,0,291fb7f59d1eae6b75bde1b5d591242bc0fb25cab928068f6a85a8688c610
CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000
CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000
CVE-2023-33676,0,0,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000
CVE-2023-33677,0,1,35438bc3c583b720476f0810047f72c89de7148b69d615cdaedc0dd5902008d1,2024-08-28T19:35:04.520000
CVE-2023-33677,0,0,35438bc3c583b720476f0810047f72c89de7148b69d615cdaedc0dd5902008d1,2024-08-28T19:35:04.520000
CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000
CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000
CVE-2023-3369,0,0,29db5da69a767c35aea22ed723b1c6ee7c43f48ed1175441113bf5511d1f51e2,2023-11-07T04:18:36.577000
@ -230203,7 +230203,7 @@ CVE-2023-40096,0,0,80c28bf71c8b791e73e10c9865fe8d8ebce552d17765524b6f7ba8d0a8a23
CVE-2023-40097,0,0,fcc14a5c69e91f7c4d728f7cbe0f0a48c2badf3e8d8d2f00222df0c4c9ef7a84,2024-02-02T03:14:39.080000
CVE-2023-40098,0,0,69f1206eae11d461353fadcedd8eb7551d87c233816314ea6c393cc2539141ed,2024-02-02T03:14:34.950000
CVE-2023-4010,0,0,a8a9f7812f565816476651b6e5296effbd88d1bb2d79eb39527cfc3f0a26dfd0,2023-11-07T04:22:02.797000
CVE-2023-40100,0,1,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b418,2024-08-28T19:35:06.173000
CVE-2023-40100,0,0,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b418,2024-08-28T19:35:06.173000
CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000
CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
@ -230327,8 +230327,8 @@ CVE-2023-40235,0,0,72105b9c559b1ddc2ad9f13c18ab13a9fa55a22727500e92992c4e0f4ec55
CVE-2023-40236,0,0,14f71801e1dfdcd9b355f3adbfa06238032294610f81b46a111266eb7777a93e,2023-12-29T18:39:44.950000
CVE-2023-40238,0,0,8cd9a6ac9959ba296d215977c1b87d1d771afcf7aab5c34be210430f1271dda5,2024-01-05T18:15:29.060000
CVE-2023-40239,0,0,aa0e89bb1e96bd5e8e2f363b3dde8360217f94f32277b47a1c6e77ce38b58a84,2023-09-07T16:26:26.913000
CVE-2023-4024,0,1,3263f70bc4cfa471a1ebfbe3b6dd7f1caa59a19b55a8814fb5cad997ea7b1073,2024-08-28T18:32:02.433000
CVE-2023-4025,0,1,875d633a8539be92bae12be6b1a35372471c5c3157e9171ada60f67dadd02517,2024-08-28T18:30:15.657000
CVE-2023-4024,0,0,3263f70bc4cfa471a1ebfbe3b6dd7f1caa59a19b55a8814fb5cad997ea7b1073,2024-08-28T18:32:02.433000
CVE-2023-4025,0,0,875d633a8539be92bae12be6b1a35372471c5c3157e9171ada60f67dadd02517,2024-08-28T18:30:15.657000
CVE-2023-40250,0,0,e7ce0448e3779d770797cca3047b64ac1d7604cdc050879a2952ebbea5fc57b1,2024-01-18T20:24:35.633000
CVE-2023-40251,0,0,e47d373aa9704daf646bd928a2cc0678149d495cfca9b7abbd3818e5c74903f1,2023-08-29T02:15:08.277000
CVE-2023-40252,0,0,27897e9f2fd3e9374d607e66dbdfb25f185ac2f919ae5207dfb1a7fd5974c153,2023-08-29T02:15:08.503000
@ -231325,7 +231325,7 @@ CVE-2023-4149,0,0,5a341b7a68a99d862a2511fd7c4a78db3797c78d3afe50d681d537931f6fe4
CVE-2023-4150,0,0,9e17d01d6dfd1bbad4581e9bdc99c95cb8eb97d9ecbd407283e813b7b9285ddf,2023-11-07T04:22:11.360000
CVE-2023-41503,0,0,21a3f966ba8ab913409d2ff2fb633345f410b80e162d1526608421e53802bf8f,2024-08-02T19:35:22.577000
CVE-2023-41504,0,0,848cc4699c1e8eb18242fd890d1d1b583b0b775a2ec9c39e2320016a91149dcd,2024-08-05T14:35:01.417000
CVE-2023-41505,0,1,aefb47bffb6d5b20a178fde4ec0b5b68799db86995d46b1812020cc11de222af,2024-08-28T19:35:06.953000
CVE-2023-41505,0,0,aefb47bffb6d5b20a178fde4ec0b5b68799db86995d46b1812020cc11de222af,2024-08-28T19:35:06.953000
CVE-2023-41506,0,0,d854ac7b20badfa924f73cdc9c8d229d9b3405b1560ab063fe84fca34598864e,2024-08-27T20:35:01.473000
CVE-2023-41507,0,0,42d7d587d5d24994ad22c5fee4b7a0d6974f9356ec83148dba96a9f7c6064ec6,2023-09-08T16:51:07.547000
CVE-2023-41508,0,0,9c51a520e4e0cd0b92dd417c82bafa4b094dbd24138cf8d018d6424f00a3ea0c,2023-09-11T18:53:12.833000
@ -232092,7 +232092,7 @@ CVE-2023-42578,0,0,23816d96a4e8f8e7a85e681befe6c1b4beef53cae2b13da25d8ba105d77fb
CVE-2023-42579,0,0,943fbf5d99df6edb832545cbbb389aa9f400ef688a2c81d3258a334debe4480e,2023-12-12T21:22:00.157000
CVE-2023-4258,0,0,70cc916926ada92ee8983ef15a32e9a54f92480bc5437f4dc1fabee6bc18e751,2023-09-26T17:19:08.510000
CVE-2023-42580,0,0,857d6b0c372e6663712d898c016feff0c3c218909136cd95337a864def798f99,2023-12-12T17:09:19.990000
CVE-2023-42581,0,1,51a00bb7f2ed622b0d566db5c08d53683b1453c01821648994dfe0bb825438d4,2024-08-28T19:35:07.143000
CVE-2023-42581,0,0,51a00bb7f2ed622b0d566db5c08d53683b1453c01821648994dfe0bb825438d4,2024-08-28T19:35:07.143000
CVE-2023-4259,0,0,66c07068928725737fca6c815c044a284bfe54d498bc2dc1dfdc90d5db05576a,2023-12-22T19:33:51.477000
CVE-2023-4260,0,0,825d2e262d09d358795c77a30ca8ce45e8b4eeaff5088b76af0e3b42b67d864b,2023-12-22T19:33:33.067000
CVE-2023-4262,0,0,96c5e685e0ea51dcabf79db9f0bdc769da7bbc4411b11be6252f295df8d63962,2024-08-01T00:15:02.090000
@ -232337,7 +232337,7 @@ CVE-2023-42869,0,0,2efc0c625b3f1a276a18ac7ae086c1c80073dac1702473316e3e6db4eb620
CVE-2023-42870,0,0,85fcae2d7fb76b4e32365c34612d1da44d242ece827fcc97bcfc9ce0e906872d,2024-01-16T23:52:09.227000
CVE-2023-42871,0,0,833a3e23a8d61427d074f23dee0288edd3316bac0beeec700383292c5a110e03,2024-01-16T23:52:19.197000
CVE-2023-42872,0,0,89caf9b59964cf9b9d094258bce26b8b185e25cef5a5508065b1c6001ad7b56e,2024-01-16T23:52:30.453000
CVE-2023-42873,0,0,e686cea391819c4142966b12ed58d878dc6bba5d3054cec5e70eef0f4876faf8,2024-02-22T19:07:27.197000
CVE-2023-42873,0,1,f1055070f5d2c8964679f9d4c375bc90c864cdc2b3efb5cf9fe0466754f266b2,2024-08-28T20:35:03.950000
CVE-2023-42874,0,0,964baee28b6c72a15098069b9e881e1b193059d80a9fe10f47c0787dba9650a1,2023-12-13T23:29:19.097000
CVE-2023-42876,0,0,974317a11812600494105057904f88983c49db0f187d890a9f6b1ea5995af4ff,2024-01-12T14:42:40.430000
CVE-2023-42877,0,0,6cad27eae60657c9f948e06003fc8819bbc3ef2215aadba8c1d4e84902953011,2024-08-01T13:44:48.073000
@ -232582,7 +232582,7 @@ CVE-2023-43298,0,0,9dc228ff73bdf528d43d0ed69906bd07f68ca6fc9bc3f0ef853fca3322473
CVE-2023-43299,0,0,d94c0bf3ab73b965669565a71d51568c9bc57077de1c801b8cedf6d024d95ce3,2023-12-11T17:49:28.370000
CVE-2023-4330,0,0,2fd86e9dd0e579883f8f7c0829ab8b7bda8ac701dd8a56f071347c2e4152f68e,2023-11-07T04:22:28.047000
CVE-2023-43300,0,0,f0be1d017072b0cff316436c66a7299c83b2fd4838fb89ce71859847a9053a33,2023-12-13T21:24:31.183000
CVE-2023-43301,0,1,6f50951f3b5632dfdd837d8c68cd8a26f5a2fe1134449bdb506bbd5fe04343bb,2024-08-28T18:35:04.500000
CVE-2023-43301,0,0,6f50951f3b5632dfdd837d8c68cd8a26f5a2fe1134449bdb506bbd5fe04343bb,2024-08-28T18:35:04.500000
CVE-2023-43302,0,0,edd1d8c368949a8601a81887ecd4be6df4ec6d90acda56627d9aeac98fd2253e,2023-12-13T21:24:15.203000
CVE-2023-43303,0,0,01a5e9c635cbf46583a40d8cd583b7ab7550198f2870556b254d79899012babb,2023-12-13T21:24:10.403000
CVE-2023-43304,0,0,5c0749626957cae1c690c285ce09a1c1b29fbb73d61b41212b63ce9ff0280580,2023-12-13T21:24:04.613000
@ -235612,7 +235612,7 @@ CVE-2023-4772,0,0,a5b93b502ddd01f9ee27674c836bf711ac9d02f44090fbc833b759d04d7de8
CVE-2023-47722,0,0,4f8feb65ac7241c12bbfc6f420a659b6dc9261f80cca7593f7d59fc3078ebf18,2023-12-12T21:04:18.177000
CVE-2023-47726,0,0,ceb40283504932a4e91f9e28d60424f146c7ffbecdb57c926139775e8d80827a,2024-06-20T12:44:01.637000
CVE-2023-47727,0,0,1611cf4537a23d5fbfc3a2499faf292e60ac118492bebcff86e1854dfc9ea8f7,2024-05-02T18:00:37.360000
CVE-2023-47728,0,0,d5fe6c1fa9be5819dc3a81d2161e01e198896c58d4166a1e912cbc704f80b62c,2024-08-19T13:00:23.117000
CVE-2023-47728,0,1,9d9b004fcde3982f43b196d097d8f47dbe8e79b165e63e4e225567a4a70b10dd,2024-08-28T21:40:55.593000
CVE-2023-4773,0,0,01f0d277e96ad9628dd6920885ad7b499f840100cbeefdbe3a242a19aa900bdd,2023-11-07T04:22:57.903000
CVE-2023-47731,0,0,bdb6aabed94397db2521c199a558a02d451711e75ae9322b4498e9bbac095b67,2024-04-24T13:39:42.883000
CVE-2023-4774,0,0,18865190999a54b58dcf753cd88068601ff8cb29b163a504c848eb5e82d8b2e4,2023-11-07T04:22:58.080000
@ -236914,7 +236914,7 @@ CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e8
CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000
CVE-2023-49539,0,0,3d9077c363f63e00a9a99e014f79fcf2da947642965bca45dcb61b1a8743768c,2024-03-01T22:22:25.913000
CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000
CVE-2023-49543,0,0,9b27cf28e2f4c20b40d2a61fced0fc62af90f21931996c253e884b5f19a62074,2024-03-01T22:22:25.913000
CVE-2023-49543,0,1,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
CVE-2023-49545,0,0,5c8aa915328bef2165801ea42c2341178b1be4c886fc54a48ff456640387987f,2024-08-26T20:35:08.767000
CVE-2023-49546,0,0,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000
@ -238418,7 +238418,7 @@ CVE-2023-51820,0,0,7aa0f7d98725dd77268f0caeb4fb8d7e759133db0c7956115ba3b94b4e25c
CVE-2023-51828,0,0,90063f5e09b01f503f1f6e58b8400efb2ad9738539cfe67915469ad778201a68,2024-08-27T19:35:09.897000
CVE-2023-5183,0,0,b93a57cbfd23c7656908cf8ce0c47fe83e4871febf63c360b65228bdb8fcae2a,2023-10-02T19:22:03.777000
CVE-2023-51833,0,0,b10ac15f68016bd5d4bd8d474cb15f2be07ff92fa1dfb1c5cbe6b8926dbb6e85,2024-01-31T23:32:20.930000
CVE-2023-51835,0,0,95cc4db7c615cdb1c602639e2e37c3a762bd3c301b530acb72f57667401f78e7,2024-02-29T13:49:47.277000
CVE-2023-51835,0,1,1004f16e80cfae3e9d64447b344df5ce8071dd9ded705f59fac6569aa35fdf59,2024-08-28T20:35:05.240000
CVE-2023-51837,0,0,ee6381e3ad2625a17fc9f7c6d4f9ac85250766336ea84c83e6b004280ea3c079,2024-02-05T18:26:18.803000
CVE-2023-51838,0,0,7d9f6553d406d679830def1ed8648869865057343b17af403444c3ad443f10fa,2024-02-10T04:04:47.587000
CVE-2023-51839,0,0,8034f770436aab6d940c193dd221e45f8cd0e35b2a744ae0d6fd22bcab3ad938,2024-02-06T17:02:34.433000
@ -240125,7 +240125,7 @@ CVE-2023-6139,0,0,58b38774f648051a2e873a85ff7a37aee0cf4ea89e9a3a4e1cb9e586395309
CVE-2023-6140,0,0,d7aafe3b370ae93fdafc86b9788a271fc411e8123752fb92571bb74932be1e51,2024-01-11T19:50:08.143000
CVE-2023-6141,0,0,c8dcaa0f230bcf4bab61b5120b835e0002022e253aa8729320cdbf7d8b88a7c3,2024-01-11T19:48:22.663000
CVE-2023-6142,0,0,3fe59169d0ca291deeb17bb2da3d1e912e0369f1ef3de114449566381868dbc1,2023-11-29T17:21:22.010000
CVE-2023-6143,0,1,2b02b2a87e188ae67b19643934110db253247a6a6318ed4d21a616265991aa41,2024-08-28T19:35:07.420000
CVE-2023-6143,0,0,2b02b2a87e188ae67b19643934110db253247a6a6318ed4d21a616265991aa41,2024-08-28T19:35:07.420000
CVE-2023-6144,0,0,f1ada52cef47fbae7861cb468cbf9029aefa6079f9529a530cc69ebc44690282,2023-11-29T17:21:04.480000
CVE-2023-6145,0,0,b6eb696be83bb3d8e6f03bcc3cffbbf6ce301a3b5d147393bbef0fd0f87c4ee0,2024-02-29T01:42:33.440000
CVE-2023-6146,0,0,0a628bb48560248a46754aa0cc3ac6ec47651dc2ffdb0446c47e5313a06edf08,2023-12-12T17:20:59.940000
@ -241139,10 +241139,10 @@ CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c47
CVE-2024-0045,0,0,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000
CVE-2024-0046,0,0,652dd2830858c9f5da14ce2fb1063779ed8d3adc9358318f9bd8799e5a854450,2024-08-05T20:35:02.317000
CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000
CVE-2024-0048,0,1,2b50afbb16484af02f7a9fac9c6d27f3ee81b516e9d386d878d7bca0ff138175,2024-08-28T19:35:07.667000
CVE-2024-0048,0,0,2b50afbb16484af02f7a9fac9c6d27f3ee81b516e9d386d878d7bca0ff138175,2024-08-28T19:35:07.667000
CVE-2024-0049,0,0,f9f835822b69f6be57714cc4435ee72c0d6574c4bbf25abdddb096ed40c941c2,2024-08-01T13:45:56.777000
CVE-2024-0050,0,0,58a42c9b281faf7f034f105a443afa241b3c1edb6abc4c502f110ae260e2255e,2024-08-14T20:35:05.473000
CVE-2024-0051,0,1,d8619ee025d9755a2c3cbb0bd85ce3e0383bc5138599bd4fcfc12bfd088fcc67,2024-08-28T19:35:08.443000
CVE-2024-0051,0,0,d8619ee025d9755a2c3cbb0bd85ce3e0383bc5138599bd4fcfc12bfd088fcc67,2024-08-28T19:35:08.443000
CVE-2024-0052,0,0,028f0ef50c0a5bd8d4204c572d3df54976f47eea47c82f4c337b4b73e60f4aea,2024-03-12T12:40:13.500000
CVE-2024-0053,0,0,1819b010c6a0341de8f41f40de4966b4aa1ac2481826c4f42a23be7eb74898c6,2024-03-12T12:40:13.500000
CVE-2024-0054,0,0,65ffdd62a15fbba9fa1857978982b951512db6bc7615451d76f1e47eca67a7de,2024-03-19T13:26:46
@ -242141,7 +242141,7 @@ CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990c
CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
CVE-2024-1174,0,0,5819d7dc07530e4f78032d8ca2898aeefda75500673f943b0bbe932afae90f9f,2024-03-01T22:22:25.913000
CVE-2024-1174,0,1,1a20d0936daa8c05ea33a8dfff3a4c4c734ee1e57e74d832a558685298d668aa,2024-08-28T21:35:03.473000
CVE-2024-1175,0,0,190484da8a43d8915393af59d3a99a603fc65c2c05796109a63c7e3028461e1e,2024-07-24T20:32:01.573000
CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc6a,2024-03-13T18:16:18.563000
CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb88,2024-02-13T14:06:04.817000
@ -243948,7 +243948,7 @@ CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
CVE-2024-2150,0,0,c22643bdc0b2ebd66d5b5ba194b52141f4bdaa1a38843b6dbc7c558d59d8b77c,2024-05-17T02:38:04.570000
CVE-2024-21500,0,0,e32cca032c5c817f0140a0fc7fc7560c3a63cfca90476fe248b7470595a38be1,2024-02-20T19:50:53.960000
CVE-2024-21501,0,1,d04e2442e85706ba7437e49b49125d8ebfada3b71184a475809a9f06322396f6,2024-08-28T18:35:07.823000
CVE-2024-21501,0,0,d04e2442e85706ba7437e49b49125d8ebfada3b71184a475809a9f06322396f6,2024-08-28T18:35:07.823000
CVE-2024-21502,0,0,fb5ae175e215ddb01ef01146351120b7135179219e17913fc19fbdc46d2b3141,2024-02-26T13:42:22.567000
CVE-2024-21503,0,0,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000
CVE-2024-21504,0,0,d1975e31d99912870265dfe3c0f9fa565e4267402a6881e83026bdfe490998fd,2024-03-19T13:26:46
@ -244949,7 +244949,7 @@ CVE-2024-23110,0,0,1ac4a7144e9209f9a89949f05fe1e7cc8c377744b32bfb607f177f1a970f3
CVE-2024-23111,0,0,752974f238ed1f3e5e428baa91d031d0aceea7be33f8a58b9a2a43bae855557c,2024-08-23T02:47:13.560000
CVE-2024-23112,0,0,95e5175d7388e29c67df9af8c672941dd9e221ee4e0a1ee87f756c639ee8dad2,2024-03-15T14:51:58.497000
CVE-2024-23113,0,0,a86bcac9b7145820c2db580ab2ab4b188eadec5244c508e4a8d29ba1588a2fac,2024-02-22T15:33:00.970000
CVE-2024-23114,0,0,03e50e602026c87049fc39891badf0add6dff4aacb97347ed09b1b72c8d9744c,2024-02-20T19:50:53.960000
CVE-2024-23114,0,1,7252a5a302093b43221ea76f9a6a29eda61311bf101ae44cd86a63862ce26956,2024-08-28T20:35:06.210000
CVE-2024-23115,0,0,7b60c057c6ecb2992362930744ce2990e40a5ef55d9da25b0609baa5f284fa28,2024-04-02T12:50:42.233000
CVE-2024-23116,0,0,b697b868738862e20bfb62cd043729402a6443f2a45a0bdae976d2a021726d27,2024-04-02T12:50:42.233000
CVE-2024-23117,0,0,35c4c339ac9e75a53935ba1466f971b15f8b507bfeb01dc62bdf9baf493fb678,2024-04-02T12:50:42.233000
@ -245803,7 +245803,7 @@ CVE-2024-24307,0,0,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a
CVE-2024-24308,0,0,9ada0d13ba5340544a70c5b14e080090e424c427d0bb515a6aa9cb42f7e5a321,2024-08-19T17:35:09.203000
CVE-2024-24309,0,0,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000
CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000
CVE-2024-24310,0,0,af04adebe05e8114c2a9b004dbebb8cc6f695f58ee0a67c77d2adc708c42b448,2024-02-26T13:42:22.567000
CVE-2024-24310,0,1,49de2d229494dcaf88bdbea8808fdf97cef92477947ea551609470feec6450a8,2024-08-28T21:35:04.093000
CVE-2024-24311,0,0,0b1cb4c07817a4dcaf8ad6ee7df96b5fd803208f5f5402c3441d71356d2e8e1c,2024-02-14T21:39:26.980000
CVE-2024-24312,0,0,c3d81851b0a21c153d5502fcc6af6d534386ad04fb506c5f3df2dbd0255efd0a,2024-07-03T01:48:16.113000
CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583f43,2024-07-03T01:48:16.943000
@ -246253,7 +246253,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000
CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000
CVE-2024-25024,0,0,5b50d32398b3d8009e2e511ffa51300a2834b21c0a317a99bfa2ae17a818833f,2024-08-15T13:01:10.150000
CVE-2024-25024,0,1,c5213c97e29706cc8502e6ba764e983599ae5293cf5cf0bdf7f7d6886ba77ef4,2024-08-28T21:53:10.720000
CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000
CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000
CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000
@ -246366,7 +246366,7 @@ CVE-2024-25170,0,0,5a57c221aced5771a411a434828fd35e5d41dcc64fd1585dedec2f988b96a
CVE-2024-25175,0,0,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000
CVE-2024-2518,0,0,67143896f82c167febad3b5ae58ed9a1bb65a46487dbef8c359c6c9e56cccd8d,2024-05-17T02:38:16.523000
CVE-2024-25180,0,0,8c8cea33a8c1bad01398ae9d5caf8e0f261db9188d8abf6e5630bbb7f06810da,2024-08-26T20:35:12.890000
CVE-2024-25187,0,0,235931cb55f2324cb5235f058c93cb713e862085431cae896b9108cfe9eba975,2024-04-02T12:50:42.233000
CVE-2024-25187,0,1,3f849b5c9e9055fc7421b5d436dcb2dd592f0d29cf293a63eb0bdef9513504b8,2024-08-28T20:35:06.460000
CVE-2024-25189,0,0,b7285685c6f5c1c6f11a2dabc1c6b4d00245303e64f2bbc0a8b2b13145e32ef7,2024-08-26T19:35:15.397000
CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac80,2024-05-17T02:38:16.610000
CVE-2024-25190,0,0,c3a0f2b38cd0b3f7473eb6954f63f83b24d13fd5e163be63555d08acedef83ae,2024-08-19T20:35:06.090000
@ -246385,7 +246385,7 @@ CVE-2024-25209,0,0,d5a869bb410fd2403b975aa6acf4c48509a1d388c3696e8d5965ba3440b96
CVE-2024-2521,0,0,0838497f1916a708252295ddb1e5512e6c3ac757ef93b04ae3f403784c7490e3,2024-05-17T02:38:16.787000
CVE-2024-25210,0,0,dd28b2c6cb9a88a5b91c68f6ad7360de203218fb8e2273a408f42a17c2d3394b,2024-02-14T16:13:16.563000
CVE-2024-25211,0,0,f0c0cc0b75a85bd287956104006e6509dabb58e126ecbb91e5dbba932e52990a,2024-02-14T16:13:16.563000
CVE-2024-25212,0,0,4989dc122506c608076abea65ae7e0b9789e3d95d8eb0664d8c70c9ad9009364,2024-02-15T06:27:12.610000
CVE-2024-25212,0,1,2f511dbe53dda725f1026e6fb3684ad3dcdbb4e3a9bf4b3999eacf1d7a2579a0,2024-08-28T20:35:07.213000
CVE-2024-25213,0,0,c54ec18894af4a5d6ced7000bcaa8c487846e8fcbfc5321ba8aad242a58f22d8,2024-02-15T06:27:20.520000
CVE-2024-25214,0,0,1ba8af84b5d311dbb39674bae13cefbf6d7fcb4d9ffa5558f51b66ae2fef5be2,2024-08-16T20:35:06.060000
CVE-2024-25215,0,0,3b37a94df90b65e7417dee74161c3b1b221d93df92a185b49be1c5811fcd762a,2024-02-15T06:27:41.287000
@ -246488,7 +246488,7 @@ CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313
CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
CVE-2024-25414,0,0,e37faede54af522703a4e537065f1d12f9e2e079cddb040df250a6ab47704e37,2024-02-16T13:37:51.433000
CVE-2024-25415,0,0,669eb2c339e3bc5aae821eb5536f61ec9a8ace328fdd7918c4b65de35957067d,2024-06-07T15:15:49.860000
CVE-2024-25415,0,1,43d479f30c3959db40e37d85a2a1b1d045a277956526655bc82aa0e8d248892a,2024-08-28T20:35:08.127000
CVE-2024-25417,0,0,cf357097a5dbee01106addf2bdb29bed8730a5f939b7183e3782b75ef2c81884,2024-02-12T21:39:48.423000
CVE-2024-25418,0,0,fbf3230abb474f635289b641f229f06b9a80ca6e048d349c7b63bb08b846e66c,2024-02-12T21:39:57.963000
CVE-2024-25419,0,0,86ab500bc7ab26f561a7c75d9375e21b9bceb9aa3d956bf22a9e15d3fe2a75df,2024-02-12T21:40:04.610000
@ -246683,7 +246683,7 @@ CVE-2024-2571,0,0,944818011263aece939e20c7251816424f7831487c7b65e2eb2d8bf532c69b
CVE-2024-25710,0,0,d1e1c2f14ac0fdaa17f43a1220d128117b47331cb5ccaceca080941af70611b1,2024-03-07T17:15:12.940000
CVE-2024-25711,0,0,c4c08c8cc09954759ac01254a6c034bf78d852c0e2f0fb9c387add767b4de561,2024-02-27T14:20:06.637000
CVE-2024-25712,0,0,cd76bf59fa3b149c026f0736470198c42042811b7fa0e2166e37d9fe09aff8b0,2024-02-29T13:49:29.390000
CVE-2024-25713,0,0,35921be59b83d8af2e145b580a5667b3fbf17b7b509666f1c0fba54cc2b0bcc8,2024-04-19T23:15:10.380000
CVE-2024-25713,0,1,3d79b0984c1664e4ac69ee01cb3f8d7ad091cc5b18ae7eaaba60f08548db4afd,2024-08-28T21:35:04.973000
CVE-2024-25714,0,0,70f54472da145604490960ea7894946414b866256679ffb698af736efe283386,2024-08-01T13:47:49.190000
CVE-2024-25715,0,0,c088d4b977142e9dcb9ad21b32e4f9aa61385e1d7ddbd4c017103ce015b7a37f,2024-02-16T21:35:54.270000
CVE-2024-25718,0,0,36013110a47522378a7f909cc9712cbde51ab694884ada3d0c70dc8ae34e1797,2024-08-01T20:35:25.977000
@ -246708,8 +246708,8 @@ CVE-2024-25741,0,0,fa774b03cf2ebe73114d17fe942f33d91843719d380f7003343f1feba56a5
CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000
CVE-2024-25743,0,0,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000
CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e1f6,2024-02-12T14:20:03.287000
CVE-2024-25746,0,1,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000
CVE-2024-25748,0,1,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000
CVE-2024-25746,0,0,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000
CVE-2024-25748,0,0,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000
CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000
CVE-2024-25751,0,0,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000
CVE-2024-25753,0,0,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000
@ -246773,7 +246773,7 @@ CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb35
CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000
CVE-2024-25891,0,0,84cfc5f312c597141ee54b1ce3a081aaaa3c04f515375840db467867fd6cd895,2024-02-22T19:07:27.197000
CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000
CVE-2024-25893,0,0,6074afa7b83b45196c5c6ba86bd6a55a5db84fa3d221197e7e610730da7175c7,2024-02-22T19:07:27.197000
CVE-2024-25893,0,1,e6dd333e76ca528d7682aca848e688db2c531a8ac894f28a9101c266e57021da,2024-08-28T21:35:05.727000
CVE-2024-25894,0,0,110687aa8f80df3297624f90f6f33809d75def9197abe56922d406f86b8dd02c,2024-08-01T13:47:55.813000
CVE-2024-25895,0,0,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000
CVE-2024-25896,0,0,08f878ee14441b76754056ef0405ddf3a84202dc82f048a455b46423ba277c2d,2024-02-22T19:07:27.197000
@ -246877,7 +246877,7 @@ CVE-2024-25989,0,0,14738c46f94e94e6b7897446658f285f8e9a188c6fec45e970fce017c50eb
CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48ad8,2024-03-18T19:40:00.173000
CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000
CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000
CVE-2024-25992,0,1,caaba6874e69765d9fe6451819eb539f4e123768237e917b71bdea3c61f79a30,2024-08-28T19:35:09.697000
CVE-2024-25992,0,0,caaba6874e69765d9fe6451819eb539f4e123768237e917b71bdea3c61f79a30,2024-08-28T19:35:09.697000
CVE-2024-25993,0,0,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000
CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000
@ -247222,11 +247222,11 @@ CVE-2024-2640,0,0,d67ac0f9a6f6b556e0c1b723f2f31c17146e454f4580301ea55d956e5019b2
CVE-2024-2641,0,0,9224bc0a65307cb53933c2d7858f8e3abf23dbc7ae542920adafdc9d5bf4c895,2024-05-17T02:38:22.647000
CVE-2024-2642,0,0,f4d5d0409211a54140db72574a0074f769063560d7df04b7b7402f6cc784e4a4,2024-05-17T02:38:22.743000
CVE-2024-2644,0,0,fab6e7415abdc266e0f9914dee035a72adfdb797420e958820a3298690e993b0,2024-06-05T20:15:12.680000
CVE-2024-26445,0,0,74115bffcb152deed7c7fab52d82a4ce2ff67f5690ad0b6e7b2b606b95da4bcd,2024-02-22T19:07:27.197000
CVE-2024-26445,0,1,3ad35fce57999549366fe75957d1ee38511704ca77b59a13d71bd470d9abd074,2024-08-28T21:35:06.473000
CVE-2024-2645,0,0,67f71252e39d0ed76704dae79e75d677c0e90051473290647c0cf447a8a8225f,2024-06-27T20:15:20.417000
CVE-2024-26450,0,0,2146e3629e9f66432c697f6f39985fce2f3781294b94d7100d7ec0e05de5d8ff,2024-03-09T08:15:06.120000
CVE-2024-26454,0,0,81eabbcddc4452199e1fbc82a1f9c649bd6c739560f3b4e9fd2208f082955849,2024-03-15T12:53:06.423000
CVE-2024-26455,0,0,4a35ecf92a208e49d66ccdff386f1d2053fb9597db1a9f9f2c48be61a141ec4e,2024-02-26T22:10:40.463000
CVE-2024-26455,0,1,24002b24bc6de1eece0f3fc2139bf437dca858793debcca4d45e15415e2ceb55,2024-08-28T21:35:07.220000
CVE-2024-26458,0,0,a765d34e6f5b725d584f2b00225139e479f8d76beade21f52c1720860105f89b,2024-05-14T15:09:00.470000
CVE-2024-2646,0,0,ee46ce874cc14b8f1b3378e14871fd20ec8fc831984d94fc396d6a2b62dd0259,2024-05-17T02:38:23.033000
CVE-2024-26461,0,0,0b892c8bcbbbf8814ae786a53ca82ff2dc0971c3ced34bcc3c4cddb340bd0150,2024-08-14T16:35:10.207000
@ -247252,7 +247252,7 @@ CVE-2024-26484,0,0,c8047678f7231824b5c927e31411e2a4e30944b1f11ae642e23849e18530b
CVE-2024-26489,0,0,66cfbedf131a53c21ff3313641983aeb0011805244fec1b387ac6a56f1259318,2024-02-22T19:07:27.197000
CVE-2024-2649,0,0,33b94c38d3a45f74f6718ae1eb94103cab8852874cf5ba7ffe3119736f42cfff,2024-05-17T02:38:23.307000
CVE-2024-26490,0,0,aa5c95d9568ffeff67d082f5e625a8d3790e84f13ee3d4cb803a75ca49441fa4,2024-02-22T19:07:27.197000
CVE-2024-26491,0,0,3d9a25d9d13dab43f4fccb79edc1a9c15bdabd787c28cc0e8ec66c7f9fee32e0,2024-02-22T19:07:27.197000
CVE-2024-26491,0,1,74f1ba8b39e9410256b69e956a81c1395874aa769444270185f7eb4f2f689d03,2024-08-28T20:35:09.023000
CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000
CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000
CVE-2024-2650,0,0,4b5612c4084720b2f75ed069d914fcdc0a38f0f53c7b3b04b755c2a4e98778bb,2024-04-10T13:23:38.787000
@ -247263,7 +247263,7 @@ CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000
CVE-2024-26521,0,0,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000
CVE-2024-26529,0,1,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000
CVE-2024-26529,0,0,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000
CVE-2024-26540,0,0,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000
@ -247953,7 +247953,7 @@ CVE-2024-27209,0,0,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f2
CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000
CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000
CVE-2024-27211,0,0,6894b26756f6df7632bdb8a4b3513238346653fd0ee071685f883ad79c0a0f9c,2024-08-05T15:35:12.083000
CVE-2024-27212,0,1,cd8d0cb9f45aa7ccf7d445110f8f2832810df99d9a78af5cf6414a8df74e5422,2024-08-28T19:35:10.640000
CVE-2024-27212,0,0,cd8d0cb9f45aa7ccf7d445110f8f2832810df99d9a78af5cf6414a8df74e5422,2024-08-28T19:35:10.640000
CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5cbdf,2024-08-01T13:48:19.280000
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000
@ -247968,7 +247968,7 @@ CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213a
CVE-2024-27225,0,0,aa18bff66f03b0f275eac87bd5ea1a86e059d41f5a0861894165d74704434328,2024-03-12T12:40:13.500000
CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000
CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3889,2024-03-15T20:15:09.153000
CVE-2024-27228,0,1,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000
CVE-2024-27228,0,0,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000
CVE-2024-27229,0,0,b8b459ee0fc242831e7e68eb1fe9ed70ba0320038a180145828d0bdce79101e7,2024-03-12T12:40:13.500000
CVE-2024-2723,0,0,a5d6e6fcb13799b6bac3165664e5b326db07e4b162d1f25e3d1dd5f10681ec04,2024-03-22T15:34:43.663000
CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f128d,2024-03-12T12:40:13.500000
@ -248217,7 +248217,7 @@ CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c148
CVE-2024-27564,0,0,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000
CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000
CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000
CVE-2024-27568,0,1,5ef0355531266755ad4e5c631ffae6be8854ea4f1050fa4f02e42546b592e64c,2024-08-28T19:35:12.240000
CVE-2024-27568,0,0,5ef0355531266755ad4e5c631ffae6be8854ea4f1050fa4f02e42546b592e64c,2024-08-28T19:35:12.240000
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
@ -248249,7 +248249,7 @@ CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c
CVE-2024-27629,0,0,ca701c59a502c4787b60da8baa107f0262ef924b3c876e947b7b71c4687e448d,2024-08-01T13:48:34.650000
CVE-2024-2763,0,0,fa0860401e6fc5d5f4cf46ca75d9efd537ac3aaa7b5e2d61b6a29dcaeeced91c,2024-05-17T02:38:28.787000
CVE-2024-27630,0,0,a1ea11c1c8b1f1d78e79a31b066ec8424df55ae64238847d3d73b77f87b170a7,2024-08-16T19:35:06.250000
CVE-2024-27631,0,1,823cf2520a1b79ed7d411349f6166aa032b72a764cabcf9507963ec85aab2169,2024-08-28T19:35:13.040000
CVE-2024-27631,0,0,823cf2520a1b79ed7d411349f6166aa032b72a764cabcf9507963ec85aab2169,2024-08-28T19:35:13.040000
CVE-2024-27632,0,0,0bf9f7e4e2b38f2fc36100c20b55c947c0d336f90050dc79733290c2e357ef37,2024-08-16T19:35:06.933000
CVE-2024-2764,0,0,31aa1e4cc55fa8edb093bc5aa135070b01e8111153eb7b17aab12d3117a8f555,2024-05-17T02:38:28.880000
CVE-2024-2765,0,0,fdf9b012a44b1c7f6607dd1b547bd408571aa1e43b10c68fb7aad7dc812bebe9,2024-05-02T18:00:37.360000
@ -248278,7 +248278,7 @@ CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7
CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000
CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000
CVE-2024-27703,0,0,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000
CVE-2024-27705,0,1,54a199ba78880b9893651da6ac13e5ae7eff87b01c1a1af6fe633bcde862516c,2024-08-28T19:35:13.840000
CVE-2024-27705,0,0,54a199ba78880b9893651da6ac13e5ae7eff87b01c1a1af6fe633bcde862516c,2024-08-28T19:35:13.840000
CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000
CVE-2024-27707,0,0,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000
CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000
@ -248704,7 +248704,7 @@ CVE-2024-28211,0,0,430c54d116686ae784e7eaccdb0936e227c2ec2e15c8ea6c22903f691dfd9
CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000
CVE-2024-28213,0,0,bfeb5a9850403273fba4fe10f3167a73d5223f6f7fda26be2c4ac6dd12d8be00,2024-08-22T20:35:07.957000
CVE-2024-28214,0,0,39bba1286ca0521fe316864fd954bf03f219b032070caf8de48b3a3685bfb8b5,2024-03-07T13:52:27.110000
CVE-2024-28215,0,0,6b2656e187f54be3b8692756e38dcefabd67fa7060f9733da9dff9ce708bf4af,2024-03-07T13:52:27.110000
CVE-2024-28215,0,1,a538bdef30dbb031199c7dfaee20eca8adf76f8b58f82232828c1af7095801cd,2024-08-28T21:35:07.973000
CVE-2024-28216,0,0,f89fd6be85ceea4def53181b2265abb3d7c379c6ee2f0473f5a0630c050a6151,2024-08-12T20:35:02.990000
CVE-2024-28219,0,0,565e95e78290480ce059c2c945e1cbfe2222bb0e5f4c019f24f3af4bf523bbf1,2024-08-20T20:35:22.290000
CVE-2024-2822,0,0,5135e9aa23c4836200c76de0e1596e8aa68817f4e4641238aa9f03a498ac5941,2024-08-23T21:35:06.587000
@ -248775,7 +248775,7 @@ CVE-2024-28327,0,0,7ed9ed9c0231950061a20f16d0b466fa43b5d37d46730fdcd21aca4b586a2
CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
CVE-2024-28338,0,1,fa368ff4231d46bff92ce959939349d4377377b2a7cc5fa138cc06ab225389c8,2024-08-28T19:35:14.627000
CVE-2024-28338,0,0,fa368ff4231d46bff92ce959939349d4377377b2a7cc5fa138cc06ab225389c8,2024-08-28T19:35:14.627000
CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000
@ -248799,7 +248799,7 @@ CVE-2024-28392,0,0,06cb10a631fd05972f01d306a65738665b321fedeaef5f914b0141bbfeeda
CVE-2024-28393,0,0,98451f8d9822a6b89492c2246ee689f6a0cd0063a443e3e1e266aaee6d314fd8,2024-08-27T20:35:26.183000
CVE-2024-28394,0,0,deda5a51a503650846c49022c68c524e604146c1517d74b07ab34d848f21e6e1,2024-08-05T17:35:09.203000
CVE-2024-28395,0,0,75690be4a0e06f64f466f922ea142c5dcb8737bca683828d65c2ab40844c2948,2024-08-01T13:49:05.027000
CVE-2024-28396,0,0,e2e5ec394ca570d1a0e7ca873049e09f9ea87c9a858dde784a7ae9cd510f7e8a,2024-03-20T17:18:26.603000
CVE-2024-28396,0,1,8cb5fabb0fee24ec43485928975014b880ae447df888f2a2c1c1b2d99d360299,2024-08-28T21:35:08.140000
CVE-2024-28397,0,0,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000
CVE-2024-2840,0,0,d22529ec081718c114a32dcf5767c6cdef3a269eb91ab5eeb1189d10f2a33e86,2024-05-02T18:00:37.360000
CVE-2024-28401,0,0,f4b5194cb0dd8b5d39958cccf56c345aac334d6aa2a694b4c9032746830c6bf8,2024-03-17T22:38:29.433000
@ -248820,7 +248820,7 @@ CVE-2024-2843,0,0,ec6fc6f68f72e3acc7e3cf9a461f6426012340a0a7859f669b2fed1af3faf2
CVE-2024-28430,0,0,1f48afa9bf4d947c1ce61d4a7a4ead3c4544a34c0818c90617ece3e71ea09b44,2024-08-02T19:35:26.997000
CVE-2024-28431,0,0,187dbaabbf0136fed911938811416ce05a422db491326bbc9a1774dcc2dbc8d0,2024-08-06T16:35:09.430000
CVE-2024-28432,0,0,fcdf955800ccb293dde53594dd09dc78313f9ac8f6f86ebf0d39d32c444079dc,2024-08-05T18:35:14.987000
CVE-2024-28434,0,0,ec4590de9963214229aa112f1c2ad2fa85380f4041b7dae287eb880ebccdce0a,2024-03-25T16:43:06.137000
CVE-2024-28434,0,1,222cca26fc6bcca325de7c3fc66f0ca84ff351a367d8e3c5edb1f1654c6b9247,2024-08-28T21:35:08.910000
CVE-2024-28435,0,0,56edd25b761c3ffb8a735b3d38a367cd1e0143a3f57c9ae6abc90ef28134618d,2024-08-26T16:35:07.230000
CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000
CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000
@ -248851,7 +248851,7 @@ CVE-2024-28547,0,0,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd13
CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000
CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000
CVE-2024-28551,0,0,c28fe5afcd679c3aa0a3784905b4c05c433762c4432fa1ed2b44c099adba75a4,2024-08-05T20:35:07.203000
CVE-2024-28553,0,1,d2d49d3b32b4ad4e5ed1fb793d3a4f18745439a22613343ef69fff92328aa945,2024-08-28T18:35:12.120000
CVE-2024-28553,0,0,d2d49d3b32b4ad4e5ed1fb793d3a4f18745439a22613343ef69fff92328aa945,2024-08-28T18:35:12.120000
CVE-2024-28556,0,0,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000
CVE-2024-28557,0,0,77a8a38b1b31bd457d2e1155d30ba64028e47880496797c0f23104b8d60d248a,2024-08-21T15:35:04.820000
CVE-2024-28558,0,0,7b30a622f0a0af74fb84bf56f284f0001ad46af28ee0c7db870ba46879fc3d39,2024-08-01T13:49:08.363000
@ -248913,12 +248913,12 @@ CVE-2024-28672,0,0,538db36b26db573d0bb55cb40ad522fa7947acf5e2956b1e113432093746b
CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000
CVE-2024-28675,0,0,80c451d1a35a0ff52d3fba9d95128727c58bec6c40fc50594a98fbdeafd67949,2024-08-06T16:35:10.273000
CVE-2024-28676,0,0,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000
CVE-2024-28677,0,1,0f69f140894f68c5b932d6edf8946595fb50d2c8b4a12358d0887d19b71fe56c,2024-08-28T19:35:15.447000
CVE-2024-28677,0,0,0f69f140894f68c5b932d6edf8946595fb50d2c8b4a12358d0887d19b71fe56c,2024-08-28T19:35:15.447000
CVE-2024-28678,0,0,b5c73aa5d385f8f65998ff1de30b4021247079d7e1aba9c219ff89ef49624a6a,2024-08-26T17:35:03.903000
CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
CVE-2024-28681,0,1,8a70f4514954d5b714df36fb204c3727ca85171b03b512322548d2cf00cd1bfc,2024-08-28T19:35:16.270000
CVE-2024-28681,0,0,8a70f4514954d5b714df36fb204c3727ca85171b03b512322548d2cf00cd1bfc,2024-08-28T19:35:16.270000
CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
@ -249417,7 +249417,7 @@ CVE-2024-29387,0,0,a7de4d7b83fd64ee90e8a52b42eaf0b9beccc3b6bea7a05d204d65990fc8f
CVE-2024-2939,0,0,2535289099c8d33fbb19094f7fbda628b2a57cb3f5893b4424d20e832d7b98bf,2024-05-17T02:38:38.230000
CVE-2024-29390,0,0,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000
CVE-2024-29392,0,0,5e4ea30f516a843bdc62850b43582fcaf1c5126262e50fed5352ce6a7a6be694,2024-05-22T18:59:20.240000
CVE-2024-29399,0,1,697a66baad6ee4bae50c3e5a1e61a40d3516a4fa5056cb7fa4cab7012d6514f5,2024-08-28T18:35:13.337000
CVE-2024-29399,0,0,697a66baad6ee4bae50c3e5a1e61a40d3516a4fa5056cb7fa4cab7012d6514f5,2024-08-28T18:35:13.337000
CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df39a,2024-06-05T20:15:13.267000
CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000
CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000
@ -249433,7 +249433,7 @@ CVE-2024-2943,0,0,f4b6ad287b4a622c4b41944858fa2f89e0fbf42a503dbbb6e34a72b168b98f
CVE-2024-29432,0,0,1f40369b53faae4e5d7b1d21dfb652ce13f2ec8046b060be84a2ef35a51b0061,2024-08-27T16:35:10.203000
CVE-2024-29433,0,0,1d2b8851aa0f5fe2986e1714c213ddc2e530a38e6018ee3fbc359ceb0627168a,2024-04-02T12:50:42.233000
CVE-2024-29434,0,0,2d35bfe8233ada26f52a8aa24ec4bb94ada1e07f5e74fe641dc47a96ca48d619,2024-04-03T12:38:04.840000
CVE-2024-29435,0,0,875cbdaf24fc385b5e7a9e6b4648f22f1ae4b6f76f07a45f82a4354af5229b55,2024-04-02T12:50:42.233000
CVE-2024-29435,0,1,20d58edc46c6a6b5293600c5a6b42d712862fc08450fab6e6e1fcd84ee305434,2024-08-28T20:35:10.057000
CVE-2024-29439,0,0,071dc3c8f449deb74ddce6b8d054e2fea88eca6c0700f7f8d6ed7663f767e1ba,2024-05-27T01:15:14.397000
CVE-2024-2944,0,0,d1dd72df0b9b939fa739d98df646f3f94ca4f14d2968c93f0c6764852c0e47b3,2024-05-17T02:38:38.893000
CVE-2024-29440,0,0,5b5e3b17b0e40e37a1bc2598ac1913c0af07a4c46f5b9983183aaa750b04d2f6,2024-05-27T01:15:14.497000
@ -249454,7 +249454,7 @@ CVE-2024-2946,0,0,220fbf3d281fb179dce3b92b2f13da4971e0ad50361a1c155497aeea2ac2f8
CVE-2024-29460,0,0,f954a0fb0d0ecede72346246898998047378b0ff85ba4078b6d862a1eed2ae65,2024-08-01T13:49:30.940000
CVE-2024-29461,0,0,7435a5125007ae496ee06dfe30d9a23e23411a0a41be62219557118da196f31f,2024-07-11T15:05:34.270000
CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000
CVE-2024-29469,0,0,2079505dc0da5a3cbf2c6e066fddfdad1eb85fcaa078af0bbb19417ca0e16ca0,2024-03-21T12:58:51.093000
CVE-2024-29469,0,1,83f06e4c8f7934a02756619832b06a82358511a99079845e0d056ac078f5e062,2024-08-28T21:35:09.653000
CVE-2024-2947,0,0,7fa842f2bc2c8f223df34834539dd7f7d20bc53e8c380819b606cea859d50c0a,2024-06-12T09:15:17.717000
CVE-2024-29470,0,0,56425811d021c212dbd848b24d323bfc83ff20dfcd604f9dd34d98a1dfae7b6e,2024-03-21T12:58:51.093000
CVE-2024-29471,0,0,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000
@ -249478,7 +249478,7 @@ CVE-2024-2951,0,0,f710e6d4245ad6c04fc32de495a410058cbe73872608e5a79d1a40f0d8a1be
CVE-2024-29510,0,0,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf0da,2024-07-08T14:18:07.743000
CVE-2024-29511,0,0,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000
CVE-2024-29513,0,0,8cfcc3ee68a773ba517d1f3723d5fc41ae5eef49bbfc2250bce477983b34e599,2024-08-01T13:49:32.137000
CVE-2024-29514,0,1,7caae15adf93c68426a0607e9f9430b69dadcf282c5b338343171d0469306829,2024-08-28T19:35:17.070000
CVE-2024-29514,0,0,7caae15adf93c68426a0607e9f9430b69dadcf282c5b338343171d0469306829,2024-08-28T19:35:17.070000
CVE-2024-29515,0,0,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535a56,2024-08-19T20:35:11.413000
CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000
CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000
@ -249540,7 +249540,7 @@ CVE-2024-29753,0,0,2fe72d442a3bd6e3a448018f4b0c5fd08bbb9368714b97406c81c1f0d2544
CVE-2024-29754,0,0,b25a573175d6d8364c520f2c021a5fa5bc0a8d78f24f393d4d4bf2a3811b35a3,2024-04-08T18:49:25.863000
CVE-2024-29755,0,0,461a086b173843c1ce38032ceaf4026cd899fd13096838c66c3bf8c91a37dca7,2024-04-08T18:49:25.863000
CVE-2024-29756,0,0,a317fd9c651464f79ee6fff622436852efb1b09b79adc8a90233c2482f2cabef,2024-08-13T20:35:08.120000
CVE-2024-29757,0,1,1258c85600b0e0b6c3574edf77ce10dfb1958d15da1a6a11aec242b319b28be3,2024-08-28T19:35:17.877000
CVE-2024-29757,0,0,1258c85600b0e0b6c3574edf77ce10dfb1958d15da1a6a11aec242b319b28be3,2024-08-28T19:35:17.877000
CVE-2024-29758,0,0,e99e03c9577f34d61d791ec358a8107af85a294778a310a65b4722e9f6af13d4,2024-03-27T15:49:41.437000
CVE-2024-29759,0,0,f4cc1ab31785f6c5323fd4d9a7da94ce475eca6cb36b30795902b25143b7dbeb,2024-03-27T15:49:41.437000
CVE-2024-2976,0,0,31ce9b59b83e33d10ee556791a66c7b468926a678a71bf4f87b9bde3e94a00ea,2024-05-17T02:38:39.800000
@ -250321,7 +250321,7 @@ CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
CVE-2024-30565,0,1,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d216,2024-08-28T19:35:18.093000
CVE-2024-30565,0,0,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d216,2024-08-28T19:35:18.093000
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000
@ -250338,14 +250338,14 @@ CVE-2024-30588,0,0,08e16a935f9fee8841f929d18032525bac7add60ccde5932cbd5663b4480d
CVE-2024-30589,0,0,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000
CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000
CVE-2024-30590,0,0,74e13fafb4ea3fa2c3367d4c745d913b8700a9f648c307a3b7eeb10d783ad4d0,2024-08-01T13:50:13.810000
CVE-2024-30591,0,1,e902c9af734db5833927060c0bddd3a7ba217bf46fdf47a12b5c187281d25d93,2024-08-28T18:35:14.280000
CVE-2024-30591,0,0,e902c9af734db5833927060c0bddd3a7ba217bf46fdf47a12b5c187281d25d93,2024-08-28T18:35:14.280000
CVE-2024-30592,0,0,507c49506de5111d6c96010bf6286cc127ab92c8bc8bbb896558bfe34d4346f9,2024-08-01T13:50:14.590000
CVE-2024-30593,0,0,408d3bb4f55aa72702260e4a6dec5da795a667370808b6fd57e94ac266b7ab6e,2024-08-01T13:50:15.377000
CVE-2024-30594,0,0,031ab14998cc22e319a2672b5d267e5c02bd96f6f8b3034c7bd0cc097da3d0fc,2024-08-16T19:35:08.517000
CVE-2024-30595,0,0,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000
CVE-2024-30596,0,0,3e2307388e29cecf1eee26f29964858677d06f5c8613113eca2047417d85c54f,2024-08-27T21:35:21.827000
CVE-2024-30597,0,0,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2f1a,2024-08-01T13:50:16.157000
CVE-2024-30598,0,1,6ed6779adc284652fa82476796af034f1e40ee104aa46937c35f6a5778b7c19a,2024-08-28T18:35:15.197000
CVE-2024-30598,0,0,6ed6779adc284652fa82476796af034f1e40ee104aa46937c35f6a5778b7c19a,2024-08-28T18:35:15.197000
CVE-2024-30599,0,0,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000
CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000
CVE-2024-30600,0,0,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000
@ -250363,7 +250363,7 @@ CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69a
CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000
CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000
CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000
CVE-2024-30624,0,1,ff6bf3285a4a0405e10b51a01d4154fed0ab5f5e8637b8cc2e4a3a03c98f121e,2024-08-28T18:35:15.953000
CVE-2024-30624,0,0,ff6bf3285a4a0405e10b51a01d4154fed0ab5f5e8637b8cc2e4a3a03c98f121e,2024-08-28T18:35:15.953000
CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000
CVE-2024-30626,0,0,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000
CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000
@ -251081,7 +251081,7 @@ CVE-2024-31815,0,0,3a4fb879bd99cdccbff5aa7dddf7124d852246045820d3d5445bebcfb10f3
CVE-2024-31816,0,0,b044f3a9b0aa1619e0c2fca0cc8f8b5745d80dbd48fcbf7e00f1caed5cc7299b,2024-08-14T14:35:18.370000
CVE-2024-31817,0,0,24b4e557f7af935e7754f7b85cb41f724f58a7b4e914343cc50d4eac0b54d001,2024-08-01T13:51:12.960000
CVE-2024-31818,0,0,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000
CVE-2024-31819,0,1,bfd6addbaf0640b479e38e78486acd7f48f4365622b9d1c32199ef52964cc949,2024-08-28T19:35:18.897000
CVE-2024-31819,0,0,bfd6addbaf0640b479e38e78486acd7f48f4365622b9d1c32199ef52964cc949,2024-08-28T19:35:18.897000
CVE-2024-3182,0,0,5b91472f2c23656576ba0485d37ef11d644641d0d37c54a71b00010283df192c,2024-08-01T16:35:10.453000
CVE-2024-31820,0,0,c45ae4d9cf96e998a8e3836a25349d6dbd49df94bb64d18020aab9488babbb10,2024-08-01T13:51:13.733000
CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000
@ -252745,6 +252745,7 @@ CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a919
CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000
CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000
CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000
CVE-2024-34195,1,1,85b392229a6201caf031923e85b74fa52c56af0784be74d04a74145fdcf21d9f,2024-08-28T20:35:10.893000
CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000
CVE-2024-34198,0,0,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000
CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000
@ -253229,7 +253230,7 @@ CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c982681
CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000
CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000
CVE-2024-34905,0,0,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000
CVE-2024-34906,0,0,2d514f74a75383567e242812745d1978f5a5608d1bafa528fe1c42a0f093f8ed,2024-05-23T20:42:22.080000
CVE-2024-34906,0,1,f750c2112b1b61a4b0d4bb941243c567b56a2b55a50a8501386482dd06b49ac1,2024-08-28T21:35:11
CVE-2024-34909,0,0,75ef6b64b1e62b9391afd10085bc7fe5995801e2be117fc0dc8d712e21d5d32b,2024-07-03T02:00:52.603000
CVE-2024-3491,0,0,3f53627a80e697de4556db2343c1e928afb824dee19f0a6a29ac6e39296f869d,2024-04-23T12:52:09.397000
CVE-2024-34913,0,0,4ee00b2163d3042020be6fa672a11467385e4c8bf271adab1a0d83cdeeaf8210,2024-05-23T20:59:34.540000
@ -253474,7 +253475,7 @@ CVE-2024-35340,0,0,1292363a48b3318ab4eea61a21d1774d64143b2f1ea71749d49412fca7f08
CVE-2024-35341,0,0,2394ba36fcc9e849f9840edb2ba384b36eee4d7eebd73846ccbdccf118ee1563,2024-08-01T13:52:36.597000
CVE-2024-35342,0,0,a4f7369f8f0a6de9d16902cacb7a44f46ba0a7d7f218612f1259029d70c7f06e,2024-05-29T13:02:09.280000
CVE-2024-35343,0,0,afbb68674236a89009facceb114c5d242ad657f17e86d5d8fbbfd0cec8107edb,2024-08-01T13:52:37.563000
CVE-2024-35344,0,0,bc74dd675a5dce7f00a3f726cd43afdec09d5a821ebe8ae8c283145b225cfc80,2024-05-29T13:02:09.280000
CVE-2024-35344,0,1,347a536906c9cd275b6604bba463b1e6f3bbbbe6dff687daf180f85bf210928a,2024-08-28T20:35:11.640000
CVE-2024-35345,0,0,94f6cac212d9f349d4de9b7da46a3407365d342f37822b3360eee738ef0a1e40,2024-08-19T17:35:17.703000
CVE-2024-35349,0,0,11658c700be6076291828420e77d9bdb67d68c65b2a15cfc033913a7e5b5639c,2024-08-01T13:52:38.343000
CVE-2024-3535,0,0,73d791a5850d78576003eae31f8a489c9a6c4b90f35033ec73a578c9367a898c,2024-05-17T02:39:59.803000
@ -254892,7 +254893,7 @@ CVE-2024-37321,0,0,e43d264e800a81e0d6029e42f0d44c2c5a3a79449b2b0be508db95416510e
CVE-2024-37322,0,0,d2c3e4ead54adc24099fd08e32c15f700d67b352b7a8bd2d3b4bfc1ce21a81e9,2024-08-20T15:47:23.830000
CVE-2024-37323,0,0,4d91cfc2869ee17646bfec1969f43f1ccc3bb5b998368edbb19a54f7b2235add,2024-08-20T15:47:26.383000
CVE-2024-37324,0,0,abc8ac852770b9e6c0196ac0f888a778413aab684c72411dcdd7abfdca6af10e,2024-08-20T15:47:29.147000
CVE-2024-37325,0,0,1d87585535a572046f3269d4a6e53e39d113df4fc37e43ad494b3059408daa64,2024-06-13T18:36:09.013000
CVE-2024-37325,0,1,6294d12bef740deef9232a4260a6662461a231eb0cf805c573aaa423ed122236,2024-08-28T21:29:34.533000
CVE-2024-37326,0,0,ac7472d1fb1d18503007a35e6fe41ee1151b7dc6ef627e10a11e757c5664ebf5,2024-08-20T15:47:31.987000
CVE-2024-37327,0,0,6d3d3ead5193ba04066eb6050d2d8a7e0a77d229a7111950b5a3609d911907f0,2024-08-20T15:47:34.730000
CVE-2024-37328,0,0,76f8e407d4325cd98c4d4d2117be19b060f62c1c032de62e6462543f2d8b8dac,2024-08-20T15:47:37.937000
@ -256231,14 +256232,14 @@ CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9
CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000
CVE-2024-39502,0,0,99b689f6371529c59a665d9c426727398f43183fffa63b58cc95bb184d69fa0a,2024-07-12T16:34:58.687000
CVE-2024-39503,0,0,5e4d34ef2c4459378b0d2181b74587a03eb064853eaebcf5be4aab1548d06b82,2024-07-12T16:34:58.687000
CVE-2024-39504,0,1,bdccaf811e8fa1282cf93f14389fa178db83a9dd861ab1a8383eecda34377824,2024-08-28T19:58:45.653000
CVE-2024-39504,0,0,bdccaf811e8fa1282cf93f14389fa178db83a9dd861ab1a8383eecda34377824,2024-08-28T19:58:45.653000
CVE-2024-39505,0,0,33dc1a3989cb5c060d5c4f30fa91554943c85a657f65588f826529ceef0f94a9,2024-07-12T16:34:58.687000
CVE-2024-39506,0,1,8c462840acc6bb08d9230b602444b2f73c8c80f6b650776b8310449d2261b908,2024-08-28T19:58:56.013000
CVE-2024-39506,0,0,8c462840acc6bb08d9230b602444b2f73c8c80f6b650776b8310449d2261b908,2024-08-28T19:58:56.013000
CVE-2024-39507,0,0,1f47c187fd37c3a4a4dbd94d24344ef551d55fa35ab3ff979c4b1cc67002f4d5,2024-07-12T16:34:58.687000
CVE-2024-39508,0,0,26013578589e34725fa81a94c339e09cc309ea5ca5a92a64ba271fcd81f91dee,2024-07-12T16:34:58.687000
CVE-2024-39509,0,0,6f4a3358b91af56191a71e0d0b835dd811a8ac97ff57de735049825822c090da,2024-07-12T16:34:58.687000
CVE-2024-3951,0,0,5ca8c536acbbd299aeb225ced02a6adee99ff33cec2e6b61bb0e0674eb9863cc,2024-05-08T17:05:24.083000
CVE-2024-39510,0,1,219c25ef60503ac3e7f220cf8600d0b269f5ff3251fb7cce8e3ea23df3d2c0a2,2024-08-28T19:59:12.947000
CVE-2024-39510,0,0,219c25ef60503ac3e7f220cf8600d0b269f5ff3251fb7cce8e3ea23df3d2c0a2,2024-08-28T19:59:12.947000
CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000
CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000
CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000
@ -256396,7 +256397,7 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
CVE-2024-39717,0,1,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
@ -256666,8 +256667,8 @@ CVE-2024-40520,0,0,a2ac37b5fe4993386ad0c401ff27a90a4ee5d292a95a31b8ec4196b4a0643
CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
CVE-2024-40530,0,1,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000
CVE-2024-40531,0,1,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000
CVE-2024-40530,0,0,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000
CVE-2024-40531,0,0,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000
CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
@ -256853,7 +256854,7 @@ CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
CVE-2024-40897,0,0,7f0ff77f7480d176e5ca1f86675f7cea8983627e8b9afaea0e9328e4e4b96a32,2024-08-27T13:52:53.790000
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
CVE-2024-40899,0,1,e780b074d783a002df6b4261424c6db082994ffa39e09f112feba6d38138eca6,2024-08-28T19:59:22.927000
CVE-2024-40899,0,0,e780b074d783a002df6b4261424c6db082994ffa39e09f112feba6d38138eca6,2024-08-28T19:59:22.927000
CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000
@ -256889,9 +256890,9 @@ CVE-2024-40929,0,0,922566e6896182fcd86bab51cbd2b2f5e83578ebe1d9528e2a3d395a2a144
CVE-2024-4093,0,0,4094c134af1a117994cc6fa0b479bc18db1d53d46b6fa3e1bad5f760245c30a1,2024-05-17T02:40:15.433000
CVE-2024-40930,0,0,b4f4f0f521513c469fe141e4f04568fa708146afbf26b9e43ef67c49fbb97034,2024-07-12T16:34:58.687000
CVE-2024-40931,0,0,1ce51d0c1cf3e56971909d12fef17b7b190325030f87851f102025b07310a339,2024-07-12T16:34:58.687000
CVE-2024-40932,0,1,a9cf96830b006378bce6c68ed0757ef896fae1b35ee3940d03a768e94ae65c5a,2024-08-28T19:48:53.420000
CVE-2024-40932,0,0,a9cf96830b006378bce6c68ed0757ef896fae1b35ee3940d03a768e94ae65c5a,2024-08-28T19:48:53.420000
CVE-2024-40933,0,0,96771d62b803cb6fb8413f216e98fe7325b9f160d5178302017c1ebbfdf41ad1,2024-07-12T16:34:58.687000
CVE-2024-40934,0,1,0f4fa006864a9d48c0a4ffb7ec8d6898f10d1c1eb85215eb8c4ca2a5d7b3ba19,2024-08-28T19:49:04.307000
CVE-2024-40934,0,0,0f4fa006864a9d48c0a4ffb7ec8d6898f10d1c1eb85215eb8c4ca2a5d7b3ba19,2024-08-28T19:49:04.307000
CVE-2024-40935,0,0,a229105c5d2bb66ee17d53a34892f169d9c296108d2f7d99e57d4944bc30c1f0,2024-07-12T16:34:58.687000
CVE-2024-40936,0,0,34f66f9dfd47f0ce49d1c77b26ffc55123e4f460cffd6c4a4b7f8e6444317e13,2024-07-12T16:34:58.687000
CVE-2024-40937,0,0,18b0b0dc1e836fe3ae2e170c8982a2b4836f0393f58deb5f92b95d810e69aed1,2024-07-12T16:34:58.687000
@ -256913,12 +256914,12 @@ CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
CVE-2024-40954,0,1,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000
CVE-2024-40955,0,1,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000
CVE-2024-40956,0,1,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000
CVE-2024-40957,0,1,4169395d36d8df754af0ff2f0952d94b9d03cad9228a2cd953255dac27d54c21,2024-08-28T18:58:59.793000
CVE-2024-40958,0,1,4055162d5de8cf1b7ae3f4360cf522ef9d8bb94c58b99c5968e7d3b887a367e8,2024-08-28T18:46:29.543000
CVE-2024-40959,0,1,3efe7268d6bd3d9c0e7792eede131c4531003b8b0a406d93c2abed58e13790c2,2024-08-28T18:46:52.453000
CVE-2024-40954,0,0,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000
CVE-2024-40955,0,0,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000
CVE-2024-40956,0,0,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000
CVE-2024-40957,0,0,4169395d36d8df754af0ff2f0952d94b9d03cad9228a2cd953255dac27d54c21,2024-08-28T18:58:59.793000
CVE-2024-40958,0,0,4055162d5de8cf1b7ae3f4360cf522ef9d8bb94c58b99c5968e7d3b887a367e8,2024-08-28T18:46:29.543000
CVE-2024-40959,0,0,3efe7268d6bd3d9c0e7792eede131c4531003b8b0a406d93c2abed58e13790c2,2024-08-28T18:46:52.453000
CVE-2024-4096,0,0,50bdcb96d8146d46d54f79639093726453baeacacf83f329111a9e971fb9861d,2024-08-01T13:59:25.313000
CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb3e1,2024-08-21T16:53:01.407000
CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000
@ -257125,7 +257126,7 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
CVE-2024-41226,0,0,0f1b0fab09deb513b318e5339bb250b54a4148cca3ff553dad16500490764bac,2024-08-12T16:01:32.383000
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
CVE-2024-41236,1,1,c4e6a64b54b2e943aa2644b716126f214c4e5e917f99a2fe950f6695e8ec8574,2024-08-28T18:35:16.790000
CVE-2024-41236,0,0,c4e6a64b54b2e943aa2644b716126f214c4e5e917f99a2fe950f6695e8ec8574,2024-08-28T18:35:16.790000
CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000
CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
@ -257819,11 +257820,11 @@ CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff
CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000
CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000
CVE-2024-42461,0,0,bba68fac1714eca06b2f70a5c715b9fe71087992bafdb6d29066928e025c5f76,2024-08-16T16:51:40.270000
CVE-2024-42462,0,0,b19edc28fc2a0bfff5cef08f2bf42ed64517efd4df4ba40c3d5c0700285641c9,2024-08-19T13:00:23.117000
CVE-2024-42463,0,0,81d9a620e868a0ee28f0a813c40c25ffd53a77197edb11311bdbccacef4f97a2,2024-08-19T13:00:23.117000
CVE-2024-42464,0,0,d02c3f121530d2f61ac64a8500ff797e919368a6bce85f1a457f8ab7d180089e,2024-08-19T13:00:23.117000
CVE-2024-42465,0,0,370301b2cfcf79d37c820942768e011b48c883a5ad5f34c844a8b31f6c852503,2024-08-19T13:00:23.117000
CVE-2024-42466,0,0,b7b0b6e42cec15c89fd794bcf02c2ed85362d59270ae7e0a3cc806f9fa81dfcd,2024-08-19T13:00:23.117000
CVE-2024-42462,0,1,8ae903dc9e00dcb9d20585b4534acebe4eef4829225fa8001c74505d7d4227e8,2024-08-28T20:46:39.227000
CVE-2024-42463,0,1,1887d4b9dbb205a7918713aab61d422ae1234ef53aa6637fd3664544692f6740,2024-08-28T20:38:25.227000
CVE-2024-42464,0,1,c028981b0f05209b8f9398c3d10076a5d141612668af4661ca8e9b565e3a5a68,2024-08-28T20:35:52.940000
CVE-2024-42465,0,1,cc1706811a59c806dba0a5fe5e46aaf63eb46135d4336575a42fc94641a6632d,2024-08-28T20:32:31.737000
CVE-2024-42466,0,1,b147a6143c0f1b29bc81d9c541a33cc57bd399450bc78084e7c0d7553a8f8a24,2024-08-28T20:48:14.917000
CVE-2024-42467,0,0,e23e0abc0a807db2a53f3a498d6ca2ef36fe18197da36ac218027e00b6ca7984,2024-08-12T13:41:36.517000
CVE-2024-42468,0,0,20ab5d9f17a6b01a0da06bad1509e9a4dc8119cebd6158ac0abf8cefec4df7e5,2024-08-12T13:41:36.517000
CVE-2024-42469,0,0,30cb7e23c62f8ac5ce9bc45ebb27cbde0a399d6ba51c92609f7c3b2c2f4965cc,2024-08-12T13:41:36.517000
@ -258012,6 +258013,7 @@ CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f0
CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000
CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000
CVE-2024-42792,0,0,4eaaa19a355275b40166aa1a2acd468fef8bb5420612bb7385f6e2e1abaacd08,2024-08-26T19:10:09.607000
CVE-2024-42793,1,1,2fd1699f07cb06cbca846a8c551b761a2dfd05d711fbd58716ff3794ae7bdac7,2024-08-28T20:35:12.570000
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000
@ -258024,7 +258026,7 @@ CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9e
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28
CVE-2024-42851,0,1,00274099170db6704046005a45a40a4a9a23778f1139c6df90d1c8a79410eb5f,2024-08-28T20:15:07.787000
CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9775,2024-08-23T19:35:15.240000
CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000
CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000
@ -258032,10 +258034,10 @@ CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bf
CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000
CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000
CVE-2024-42900,0,0,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
CVE-2024-42905,1,1,63b2e3708e6370f68c8f0eab942c4bf94d6d07b2bc063f6d5b24c75cc4e46eeb,2024-08-28T19:35:20.503000
CVE-2024-42905,0,0,63b2e3708e6370f68c8f0eab942c4bf94d6d07b2bc063f6d5b24c75cc4e46eeb,2024-08-28T19:35:20.503000
CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000
CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000
CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000
CVE-2024-42913,0,1,4ee002af12bf9d3762c244fec3fad984905617a81f77c95a7eb3d308c6c9d288,2024-08-28T20:15:07.880000
CVE-2024-42914,0,0,3f5ac8ab7960d4d4afba31e3c38cdf6845691feab9592a20b6c730d697770531,2024-08-26T17:35:10.510000
CVE-2024-42915,0,0,f864c31afbca80b902e69688b4024ae2389f775878951406a546e92d288d6fa4,2024-08-23T18:35:05.490000
CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4e17,2024-08-27T14:47:12.097000
@ -258333,7 +258335,7 @@ CVE-2024-43444,0,0,fbee9de686ac80a9fde5553d13b4aef0864614401bc5081d1c7ab76503d44
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000
CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000
CVE-2024-43472,0,1,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000
CVE-2024-43472,0,0,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000
CVE-2024-43477,0,0,7032b6e49493834ede52e5f56f0a124d3ffe61f7e9da696a9c0c79526fdcc194,2024-08-23T16:18:28.547000
CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
@ -258379,6 +258381,7 @@ CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8
CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59df9c,2024-08-23T18:46:31.730000
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
CVE-2024-43805,1,1,b99c33cd6517c00926284743df2ece4d29840e6987c1cb900e897f113c9998cd,2024-08-28T20:15:07.963000
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000
@ -258593,7 +258596,8 @@ CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
CVE-2024-44761,1,1,361838cb7a1b116b9f497344dd8aff3b164952f24f968d85f6ede5ec3de92766,2024-08-28T19:15:08.933000
CVE-2024-44760,1,1,9cf81a9e0ab04798a87becebbd5fde247ae48b2da57114bbb10303113ed6f0ac,2024-08-28T21:35:14.657000
CVE-2024-44761,0,1,7d80c180501c990311d966122b1346cb700cb148eb429229d3870413a61d343c,2024-08-28T20:35:14.040000
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
@ -258614,9 +258618,9 @@ CVE-2024-4488,0,0,1067ee59b8b50187d3b6e6dcedd09634fc158d8d3cf8abb63a1cced20ae50a
CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
CVE-2024-44913,1,1,3d0a718f021ba05c36d3cde74252c706d497214671f8cff4d115bea728d16df4,2024-08-28T19:35:21.377000
CVE-2024-44914,1,1,f9f8ba7025d22966f03b97ab83fc8a2749a603d218d7389ac39cfd20db2d5481,2024-08-28T19:35:22.160000
CVE-2024-44915,1,1,9030bbe2236b67114df101ba08f9c9855f4e55916353587c850f6e3720a8d862,2024-08-28T19:35:22.957000
CVE-2024-44913,0,0,3d0a718f021ba05c36d3cde74252c706d497214671f8cff4d115bea728d16df4,2024-08-28T19:35:21.377000
CVE-2024-44914,0,0,f9f8ba7025d22966f03b97ab83fc8a2749a603d218d7389ac39cfd20db2d5481,2024-08-28T19:35:22.160000
CVE-2024-44915,0,0,9030bbe2236b67114df101ba08f9c9855f4e55916353587c850f6e3720a8d862,2024-08-28T19:35:22.957000
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
@ -258646,8 +258650,15 @@ CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e
CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000
CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
CVE-2024-45043,1,1,64e1d74029a8220ee97cc913320ac0ff74a6720da3a17522c390ec0155ccaf98,2024-08-28T20:15:08.347000
CVE-2024-45046,1,1,8cdac0b20865765113a8b4b0b2d2ef87a79d79d8e2fc42a7271e4d63391523e6,2024-08-28T21:15:06.603000
CVE-2024-45048,1,1,f69fdb24175b6f7ace06b9eb02d37b28bd8091a69e42131265e80e387c282be3,2024-08-28T21:15:06.817000
CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000
CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000
CVE-2024-45054,1,1,a13624c329f0bdd0fd7658e8735d8dc858ccaeb0147d1b3630226002f3177470,2024-08-28T20:15:08.547000
CVE-2024-45057,1,1,dae225468c5e970563487e367d430f56eab47b0de224e37bbd34b62154462c20,2024-08-28T21:15:07.027000
CVE-2024-45058,1,1,1d7b030bfdf11ee9e7b86fb4c1f5d13d8fdd33b4e5da1c1474457fed7bc73e59,2024-08-28T21:15:07.283000
CVE-2024-45059,1,1,1b1554031fc92d503bcd73c79a9939703fac7a68247e1643f55a22d235390e8e,2024-08-28T21:15:07.473000
CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000
CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000
CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000
@ -258672,9 +258683,9 @@ CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9
CVE-2024-45189,0,0,a1a91d374d9461d5778df63a2cf5d241a6c11d01b78d41c23bf70fd5616239fd,2024-08-26T12:47:20.187000
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943350,2024-08-26T12:47:20.187000
CVE-2024-45191,0,1,24320cb2d6c99102884a32a46b7a31b3437a78a394995949745365d8548a79f9,2024-08-28T19:15:09.110000
CVE-2024-45192,0,1,4666f187009b1a4ab720c7a921aa9d4f66b4b44b91cc16546d5c51cd8fcccab7,2024-08-28T19:15:09.210000
CVE-2024-45193,0,1,450979f4ae6c2f3dd1e7534dcc90d4edb6b061770952d9d6772a5ec5592929a7,2024-08-28T19:15:09.297000
CVE-2024-45191,0,0,24320cb2d6c99102884a32a46b7a31b3437a78a394995949745365d8548a79f9,2024-08-28T19:15:09.110000
CVE-2024-45192,0,0,4666f187009b1a4ab720c7a921aa9d4f66b4b44b91cc16546d5c51cd8fcccab7,2024-08-28T19:15:09.210000
CVE-2024-45193,0,0,450979f4ae6c2f3dd1e7534dcc90d4edb6b061770952d9d6772a5ec5592929a7,2024-08-28T19:15:09.297000
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
@ -260246,7 +260257,7 @@ CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69
CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000
CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000
CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000
CVE-2024-6361,0,1,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000
CVE-2024-6361,0,0,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000
@ -260700,7 +260711,7 @@ CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830ad
CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
CVE-2024-7061,0,1,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000
CVE-2024-7061,0,0,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000
CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000
CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000
CVE-2024-7064,0,0,5f6dedf11b173ba1a8a6a366c520a45122cad062892b1564ebd329daa4d14d92,2024-08-15T13:01:10.150000
@ -261053,8 +261064,8 @@ CVE-2024-7569,0,0,07c556a0d4f236c73af8fac785c7f2963a3da01e4fc90b977a8fbdbb989590
CVE-2024-7570,0,0,5fffab459f0b197c9cc8f01b0f615f787054152c65ebadc4d4a680afc4fd51fa,2024-08-14T02:07:05.410000
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
CVE-2024-7578,0,1,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
CVE-2024-7579,0,1,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000
CVE-2024-7581,0,0,f07aa40688c73c9e33d119ea47382f8f327c1f1763032f4818fad72345e632d2,2024-08-07T19:59:00.853000
CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000
@ -261206,12 +261217,12 @@ CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b025
CVE-2024-7848,0,0,0ee368073eef37c35843cc78ada12ebce75ec11f5e51f0fe556018a4bb2deefe,2024-08-22T12:48:02.790000
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
CVE-2024-7851,0,0,a3f499a96b03d0001447f268138d29dda5356c0889ebe13c4e09da447417c59f,2024-08-19T13:00:23.117000
CVE-2024-7852,0,0,d81b5371e4f0add1d395c3b1194a942c6ec099c1cdc2d46560d4b57bf5d930b7,2024-08-19T13:00:23.117000
CVE-2024-7853,0,0,602b79ace26812f03f94bfc9d8a0781cb4744715aed03debdd7aa8ad39738b45,2024-08-19T13:00:23.117000
CVE-2024-7851,0,1,a6804e632dae2a5227b1aeec5affef71a5e6512f1f3daab8681dcd169bd0ed5e,2024-08-28T21:10:07.750000
CVE-2024-7852,0,1,90686965379176e60723e17deb3351871fe4c0caf2dc6a3e7de2597d0bb591c0,2024-08-28T21:07:30.690000
CVE-2024-7853,0,1,14a48e1ad8f1b546c0c87aa2d80a70dd8973b153912e39385d618671fd730a73,2024-08-28T21:03:35.003000
CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3a0,2024-08-21T12:30:33.697000
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
CVE-2024-7867,0,0,82b57dfccdd939abae2ae322a7ca7d62e21983bdf28e6531a7b846c252314b6b,2024-08-19T13:00:23.117000
CVE-2024-7867,0,1,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000
CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000
CVE-2024-7885,0,0,53926a53ab4f71fc31c04b79b6d61e8c39bb180f373c05a721578db45aa87a6a,2024-08-23T17:05:24.343000
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000

Can't render this file because it is too large.