Auto-Update: 2024-09-06T23:55:17.220319+00:00

This commit is contained in:
cad-safe-bot 2024-09-06 23:58:15 +00:00
parent 7fe4afc3bb
commit fd5e1c265f
37 changed files with 1994 additions and 249 deletions

View File

@ -2,17 +2,41 @@
"id": "CVE-2023-26315",
"sourceIdentifier": "security@xiaomi.com",
"published": "2024-08-26T12:15:05.387",
"lastModified": "2024-08-26T12:47:20.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:25:54.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Xiaomi router AX9000 has a post-authentication command injection vulnerability. This vulnerability is caused by the lack of input filtering, allowing an attacker to exploit it to obtain root access to the device."
},
{
"lang": "es",
"value": "El enrutador Xiaomi AX9000 tiene una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n. Esta vulnerabilidad se debe a la falta de filtrado de entrada, lo que permite a un atacante aprovecharla para obtener acceso ra\u00edz al dispositivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@xiaomi.com",
"type": "Secondary",
@ -35,10 +59,56 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=546",
"source": "security@xiaomi.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mi:ax9000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "1.0.174",
"matchCriteriaId": "5A0CFBA2-2F5A-48AD-BD76-3AE1B9BE45DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mi:ax9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F71A5A-A7D4-4218-B371-25BE040BB320"
}
]
}
]
}
],
"references": [
{
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=546",
"source": "security@xiaomi.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52535",
"sourceIdentifier": "security@unisoc.com",
"published": "2024-04-08T03:15:08.923",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-09-06T22:35:00.460",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el controlador vsp, es posible que falte una entrada incorrecta de verificaci\u00f3n. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1777148475750809602",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30802",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:23:53.007",
"lastModified": "2024-05-14T16:13:02.773",
"lastModified": "2024-09-06T23:35:00.597",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Vehicle Management System 7.31.0.3_20230412 permite a un atacante escalar privilegios a trav\u00e9s del componente login.html."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1393"
}
]
}
],
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/TTX.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30939",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-25T19:15:49.970",
"lastModified": "2024-04-26T12:58:17.720",
"lastModified": "2024-09-06T23:35:01.567",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema descubierto en Yealink VP59 Teams Editions con la versi\u00f3n de firmware 91.15.0.118 permite que un atacante f\u00edsicamente cercano obtenga el control de una cuenta a trav\u00e9s de una falla en el procedimiento de restablecimiento de f\u00e1brica."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://medium.com/%40deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T00:15:07.293",
"lastModified": "2024-04-17T12:48:07.510",
"lastModified": "2024-09-06T22:35:01.557",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de carga de archivos en Shibang Communications Co., Ltd. IP network intercom broadcasting system v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente my_parser.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/heidashuai5588/cve/blob/main/upload.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32911",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-06-13T21:15:55.173",
"lastModified": "2024-07-16T14:57:13.803",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T23:35:02.557",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-327"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33903",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T01:15:09.600",
"lastModified": "2024-04-29T12:42:03.667",
"lastModified": "2024-09-06T23:35:03.347",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En CARLA hasta 0.9.15.2, el sensor de colisi\u00f3n maneja mal algunas situaciones que involucran a peatones o bicicletas, en parte porque la funci\u00f3n del sensor de colisi\u00f3n no est\u00e1 expuesta a la librer\u00eda Blueprint."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://github.com/carla-simulator/carla/blob/60bd026b4822b4edb8a68cc17b9119866f303853/Docs/core_concepts.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35133",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-29T17:15:07.250",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:55:33.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
@ -51,14 +71,46 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/291026",
"source": "psirt@us.ibm.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndIncluding": "10.0.8",
"matchCriteriaId": "64518F40-55CF-4DC8-A15E-AAACCC38BAD1"
},
{
"url": "https://www.ibm.com/support/pages/node/7166712",
"source": "psirt@us.ibm.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndIncluding": "10.0.8",
"matchCriteriaId": "7CE089A7-24AA-4AC4-A630-D787E4BD4F0D"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/291026",
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7166712",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3865",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-04-16T16:15:08.957",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-09-06T22:35:02.500",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Errores de seguridad de la memoria presentes en Firefox 124. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de la memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 125."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881076%2C1884887%2C1885359%2C1889049",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41964",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-29T17:15:07.980",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:56:18.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,73 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23",
"source": "security-advisories@github.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.6.6.6",
"matchCriteriaId": "FB5113F1-0EAB-408F-9574-7A9545905C52"
},
{
"url": "https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh",
"source": "security-advisories@github.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7.0",
"versionEndExcluding": "3.7.5.5",
"matchCriteriaId": "8A9E85FE-0FC5-41C1-99EB-6CEE106864E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8.0",
"versionEndExcluding": "3.8.4.4",
"matchCriteriaId": "DC6DA7E2-7EA2-4F0B-BECD-0481489E1A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndExcluding": "3.9.8.2",
"matchCriteriaId": "815FC984-F946-463C-8CDC-2923BF51D85D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10.0",
"versionEndExcluding": "3.10.1.1",
"matchCriteriaId": "A359C0A7-92E0-428B-A3D1-32B43929EC6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.3.1",
"matchCriteriaId": "45D93D8F-70F6-4E50-A7A7-511593473868"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-43700",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-08-29T11:15:26.757",
"lastModified": "2024-08-29T20:36:51.570",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:52:41.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment."
},
{
"lang": "es",
"value": "Las versiones de xfpt anteriores a la 1.01 no pueden manejar adecuadamente algunos par\u00e1metros dentro de los datos de entrada, lo que genera una vulnerabilidad de desbordamiento de b\u00fafer en la pila. Cuando se enga\u00f1a a un usuario del producto afectado para que procese un archivo especialmente manipulado, se puede ejecutar c\u00f3digo arbitrario en el entorno del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,18 +81,45 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/PhilipHazel/xfpt",
"source": "vultures@jpcert.or.jp"
},
"nodes": [
{
"url": "https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4",
"source": "vultures@jpcert.or.jp"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://jvn.jp/en/vu/JVNVU96498690/",
"source": "vultures@jpcert.or.jp"
"vulnerable": true,
"criteria": "cpe:2.3:a:philiphazel:xfpt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.01",
"matchCriteriaId": "9F8826E7-454A-427E-8472-3A45AAD6B730"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PhilipHazel/xfpt",
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4",
"source": "vultures@jpcert.or.jp",
"tags": [
"Patch"
]
},
{
"url": "https://jvn.jp/en/vu/JVNVU96498690/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43804",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-29T17:15:08.193",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:57:01.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-qc52-vwwj-5585",
"source": "security-advisories@github.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roxy-wi:roxy-wi:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E92EACAF-6384-4331-8F22-5CF3B2EB4B5E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-qc52-vwwj-5585",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44796",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-26T20:15:08.200",
"lastModified": "2024-08-27T13:02:05.683",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T23:35:04.340",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,111 @@
"value": "Una vulnerabilidad de cross-site scripting (XSS) en el componente /auth/AzureRedirect.php de el commit de PicUploader fcf82ea permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro error_description."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "http://picuploader.com",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"url": "https://github.com/xiebruce/PicUploader",
"source": "cve@mitre.org"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"url": "https://github.com/xiebruce/PicUploader/issues/90",
"source": "cve@mitre.org"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024-02-13",
"matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F"
}
]
}
]
}
],
"references": [
{
"url": "http://picuploader.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/xiebruce/PicUploader",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/xiebruce/PicUploader/issues/90",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44797",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-26T20:15:08.257",
"lastModified": "2024-08-27T15:35:18.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:27:16.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,45 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://gazelle.com",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/WhatCD/Gazelle",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/WhatCD/Gazelle/issues/130",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2016-11-08",
"matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4"
}
]
}
]
}
],
"references": [
{
"url": "http://gazelle.com",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/WhatCD/Gazelle",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/WhatCD/Gazelle/issues/130",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44838",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-06T22:15:02.147",
"lastModified": "2024-09-06T22:15:02.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the username parameter at /resource/runlogin.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/OpenRapid/rapidcms/issues/17",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44839",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-06T22:15:02.210",
"lastModified": "2024-09-06T22:15:02.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the articleid parameter at /default/article.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/OpenRapid/rapidcms/issues/18",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44919",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T17:15:08.670",
"lastModified": "2024-08-30T16:15:09.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:54:56.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44919.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/second.md",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44919.md",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/second.md",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45321",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-27T04:15:09.010",
"lastModified": "2024-09-06T14:35:13.113",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T22:30:19.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-494"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,47 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/miyagawa/cpanminus/issues/611",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/miyagawa/cpanminus/pull/674",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:app\\:\\:cpanminus_project:app\\:\\:cpanminus:*:*:*:*:*:perl:*:*",
"versionEndIncluding": "1.7047",
"matchCriteriaId": "E7633BA7-2A2E-45A8-9A0F-69E1E35D0D2A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/miyagawa/cpanminus/issues/611",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/miyagawa/cpanminus/pull/674",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45771",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-06T22:15:02.267",
"lastModified": "2024-09-06T22:15:02.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the password parameter at /resource/runlogin.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/OpenRapid/rapidcms/issues/17",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4883",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:12.320",
"lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:46:17.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -59,14 +89,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com"
},
"nodes": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4884",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:12.547",
"lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:45:59.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -59,14 +89,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com"
},
"nodes": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4885",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:12.970",
"lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:44:27.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com"
},
"nodes": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5008",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:13.173",
"lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:43:49.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com"
},
"nodes": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5009",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:13.427",
"lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:43:04.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com"
},
"nodes": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5010",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:13.617",
"lastModified": "2024-06-26T14:15:11.250",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:42:39.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,18 +81,45 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com"
},
"nodes": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1933",
"source": "security@progress.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com",
"tags": [
"Product"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1933",
"source": "security@progress.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5011",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:13.810",
"lastModified": "2024-06-26T14:15:11.350",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:41:46.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,18 +81,45 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com"
},
"nodes": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1934",
"source": "security@progress.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com",
"tags": [
"Product"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1934",
"source": "security@progress.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5991",
"sourceIdentifier": "facts@wolfssl.com",
"published": "2024-08-27T19:15:18.080",
"lastModified": "2024-08-28T12:57:39.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:51:41.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -73,10 +105,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://https://github.com/wolfSSL/wolfssl/pull/7604",
"source": "facts@wolfssl.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.7.0",
"matchCriteriaId": "68EDAD3E-B3D4-44BA-8F48-44DF39F1842C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wolfSSL/wolfssl/pull/7604",
"source": "nvd@nist.gov",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://https://github.com/wolfSSL/wolfssl/pull/7604",
"source": "facts@wolfssl.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6789",
"sourceIdentifier": "security@m-files.com",
"published": "2024-08-27T10:15:05.460",
"lastModified": "2024-08-27T13:01:37.913",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:31:04.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security@m-files.com",
"type": "Secondary",
@ -73,10 +105,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://product.m-files.com/security-advisories/cve-2024-6789/",
"source": "security@m-files.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:m-files:m-files_server:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "24.2.13421.15",
"matchCriteriaId": "CE8AAF74-E9A5-4E11-BE98-651E76D8F29C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:m-files:m-files_server:*:*:*:*:-:*:*:*",
"versionEndExcluding": "24.8.13981.0",
"matchCriteriaId": "E75C928B-8D24-4B22-A20D-41C2ACD44795"
}
]
}
]
}
],
"references": [
{
"url": "https://product.m-files.com/security-advisories/cve-2024-6789/",
"source": "security@m-files.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7593",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-08-13T19:15:16.940",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:13:21.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -55,10 +85,57 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D5652006-FA06-419F-90DB-B23195E1383C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.3:-:*:*:*:*:*:*",
"matchCriteriaId": "63BF5D63-D156-4BEB-9F7B-35AF9DEABDAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "8F23C040-4451-4CBF-B9A8-741C404121D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.5:r1:*:*:*:*:*:*",
"matchCriteriaId": "0A4F948D-F3AE-451A-A68A-013900133B83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.6:r1:*:*:*:*:*:*",
"matchCriteriaId": "32931B52-335D-4887-9B2B-4DE42589496D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "4F1CCCDD-05F4-430A-979B-B050E75FE3B0"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7720",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-08-27T18:15:15.840",
"lastModified": "2024-08-28T14:35:14.160",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T22:33:30.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/",
"source": "hp-security-alert@hp.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:security_manager:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2A3433EC-7F52-43BA-9BBC-4141EBF57495"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/",
"source": "hp-security-alert@hp.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8163",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-26T13:15:06.670",
"lastModified": "2024-08-26T15:15:23.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:18:19.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this vulnerability is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como cr\u00edtica. La funci\u00f3n destroyFiles del archivo /admin/file_manager/files es afectada por esta vulnerabilidad. La manipulaci\u00f3n de los archivos de argumentos conduce a un path traversal. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +140,53 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://vuldb.com/?ctiid.275761",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.275761",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.393374",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5.5",
"matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.275761",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.275761",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.393374",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8164",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-26T14:15:08.063",
"lastModified": "2024-08-26T15:15:23.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:19:53.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function rename of the file /Admin/Http/Controllers/FileManagerController.php. The manipulation of the argument new_name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como cr\u00edtica. La funci\u00f3n rename del archivo /Admin/Http/Controllers/FileManagerController.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nuevo_nombre conduce a una carga sin restricciones. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +140,53 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-2.md",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://vuldb.com/?ctiid.275762",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.275762",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.393375",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5.5",
"matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-2.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.275762",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.275762",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.393375",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-26T14:15:08.337",
"lastModified": "2024-08-26T15:15:23.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:20:41.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. This affects the function exportZip of the file /admin/file_manager/export. The manipulation of the argument path leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n exportZip del archivo /admin/file_manager/export. La manipulaci\u00f3n del camino del argumento conduce al path traversal. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +140,52 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE18-1.md",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://vuldb.com/?ctiid.275763",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.275763",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.393376",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5.5",
"matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE18-1.md",
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.275763",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.275763",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.393376",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8255",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-08-29T16:15:10.140",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T22:53:34.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -73,10 +95,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-242-02",
"source": "ics-cert@hq.dhs.gov"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deltaww:dtn_soft:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.1",
"matchCriteriaId": "D098FC76-914E-4871-AD27-E67CA85CC7F8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-242-02",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-8439",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T22:15:02.320",
"lastModified": "2024-09-06T22:15:02.320",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that the issue does not pose a security risk as it falls within the expected functionality and security controls of the application."
}
],
"metrics": {},
"references": []
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-06T22:00:17.582193+00:00
2024-09-06T23:55:17.220319+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-06T21:59:00.830000+00:00
2024-09-06T23:35:04.340000+00:00
```
### Last Data Feed Release
@ -33,49 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
262108
262112
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `4`
- [CVE-2024-34155](CVE-2024/CVE-2024-341xx/CVE-2024-34155.json) (`2024-09-06T21:15:11.947`)
- [CVE-2024-34156](CVE-2024/CVE-2024-341xx/CVE-2024-34156.json) (`2024-09-06T21:15:12.020`)
- [CVE-2024-34158](CVE-2024/CVE-2024-341xx/CVE-2024-34158.json) (`2024-09-06T21:15:12.083`)
- [CVE-2024-44844](CVE-2024/CVE-2024-448xx/CVE-2024-44844.json) (`2024-09-06T21:15:12.160`)
- [CVE-2024-44845](CVE-2024/CVE-2024-448xx/CVE-2024-44845.json) (`2024-09-06T21:15:12.217`)
- [CVE-2024-44838](CVE-2024/CVE-2024-448xx/CVE-2024-44838.json) (`2024-09-06T22:15:02.147`)
- [CVE-2024-44839](CVE-2024/CVE-2024-448xx/CVE-2024-44839.json) (`2024-09-06T22:15:02.210`)
- [CVE-2024-45771](CVE-2024/CVE-2024-457xx/CVE-2024-45771.json) (`2024-09-06T22:15:02.267`)
- [CVE-2024-8439](CVE-2024/CVE-2024-84xx/CVE-2024-8439.json) (`2024-09-06T22:15:02.320`)
### CVEs modified in the last Commit
Recently modified CVEs: `61`
Recently modified CVEs: `31`
- [CVE-2024-37898](CVE-2024/CVE-2024-378xx/CVE-2024-37898.json) (`2024-09-06T21:16:55.600`)
- [CVE-2024-37900](CVE-2024/CVE-2024-379xx/CVE-2024-37900.json) (`2024-09-06T21:06:34.223`)
- [CVE-2024-37901](CVE-2024/CVE-2024-379xx/CVE-2024-37901.json) (`2024-09-06T20:54:20.857`)
- [CVE-2024-38429](CVE-2024/CVE-2024-384xx/CVE-2024-38429.json) (`2024-09-06T21:38:04.370`)
- [CVE-2024-38430](CVE-2024/CVE-2024-384xx/CVE-2024-38430.json) (`2024-09-06T21:39:15.287`)
- [CVE-2024-38431](CVE-2024/CVE-2024-384xx/CVE-2024-38431.json) (`2024-09-06T21:41:43.017`)
- [CVE-2024-38432](CVE-2024/CVE-2024-384xx/CVE-2024-38432.json) (`2024-09-06T21:43:36.463`)
- [CVE-2024-39568](CVE-2024/CVE-2024-395xx/CVE-2024-39568.json) (`2024-09-06T21:26:14.400`)
- [CVE-2024-39569](CVE-2024/CVE-2024-395xx/CVE-2024-39569.json) (`2024-09-06T21:26:49.890`)
- [CVE-2024-39570](CVE-2024/CVE-2024-395xx/CVE-2024-39570.json) (`2024-09-06T21:20:26.347`)
- [CVE-2024-39571](CVE-2024/CVE-2024-395xx/CVE-2024-39571.json) (`2024-09-06T21:20:00.153`)
- [CVE-2024-41819](CVE-2024/CVE-2024-418xx/CVE-2024-41819.json) (`2024-09-06T21:34:29.067`)
- [CVE-2024-41947](CVE-2024/CVE-2024-419xx/CVE-2024-41947.json) (`2024-09-06T20:46:01.477`)
- [CVE-2024-42008](CVE-2024/CVE-2024-420xx/CVE-2024-42008.json) (`2024-09-06T21:48:31.597`)
- [CVE-2024-42009](CVE-2024/CVE-2024-420xx/CVE-2024-42009.json) (`2024-09-06T21:50:47.813`)
- [CVE-2024-44401](CVE-2024/CVE-2024-444xx/CVE-2024-44401.json) (`2024-09-06T21:35:13.733`)
- [CVE-2024-44402](CVE-2024/CVE-2024-444xx/CVE-2024-44402.json) (`2024-09-06T21:35:15.770`)
- [CVE-2024-44408](CVE-2024/CVE-2024-444xx/CVE-2024-44408.json) (`2024-09-06T21:35:17.720`)
- [CVE-2024-45057](CVE-2024/CVE-2024-450xx/CVE-2024-45057.json) (`2024-09-06T20:15:04.443`)
- [CVE-2024-45058](CVE-2024/CVE-2024-450xx/CVE-2024-45058.json) (`2024-09-06T20:15:04.547`)
- [CVE-2024-45059](CVE-2024/CVE-2024-450xx/CVE-2024-45059.json) (`2024-09-06T20:15:04.637`)
- [CVE-2024-5138](CVE-2024/CVE-2024-51xx/CVE-2024-5138.json) (`2024-09-06T20:35:18.950`)
- [CVE-2024-7569](CVE-2024/CVE-2024-75xx/CVE-2024-7569.json) (`2024-09-06T21:57:23.037`)
- [CVE-2024-7570](CVE-2024/CVE-2024-75xx/CVE-2024-7570.json) (`2024-09-06T21:59:00.830`)
- [CVE-2024-7652](CVE-2024/CVE-2024-76xx/CVE-2024-7652.json) (`2024-09-06T21:35:19.660`)
- [CVE-2024-33903](CVE-2024/CVE-2024-339xx/CVE-2024-33903.json) (`2024-09-06T23:35:03.347`)
- [CVE-2024-35133](CVE-2024/CVE-2024-351xx/CVE-2024-35133.json) (`2024-09-06T22:55:33.543`)
- [CVE-2024-3865](CVE-2024/CVE-2024-38xx/CVE-2024-3865.json) (`2024-09-06T22:35:02.500`)
- [CVE-2024-41964](CVE-2024/CVE-2024-419xx/CVE-2024-41964.json) (`2024-09-06T22:56:18.010`)
- [CVE-2024-43700](CVE-2024/CVE-2024-437xx/CVE-2024-43700.json) (`2024-09-06T22:52:41.727`)
- [CVE-2024-43804](CVE-2024/CVE-2024-438xx/CVE-2024-43804.json) (`2024-09-06T22:57:01.697`)
- [CVE-2024-44796](CVE-2024/CVE-2024-447xx/CVE-2024-44796.json) (`2024-09-06T23:35:04.340`)
- [CVE-2024-44797](CVE-2024/CVE-2024-447xx/CVE-2024-44797.json) (`2024-09-06T22:27:16.177`)
- [CVE-2024-44919](CVE-2024/CVE-2024-449xx/CVE-2024-44919.json) (`2024-09-06T22:54:56.927`)
- [CVE-2024-45321](CVE-2024/CVE-2024-453xx/CVE-2024-45321.json) (`2024-09-06T22:30:19.337`)
- [CVE-2024-4883](CVE-2024/CVE-2024-48xx/CVE-2024-4883.json) (`2024-09-06T22:46:17.103`)
- [CVE-2024-4884](CVE-2024/CVE-2024-48xx/CVE-2024-4884.json) (`2024-09-06T22:45:59.233`)
- [CVE-2024-4885](CVE-2024/CVE-2024-48xx/CVE-2024-4885.json) (`2024-09-06T22:44:27.840`)
- [CVE-2024-5008](CVE-2024/CVE-2024-50xx/CVE-2024-5008.json) (`2024-09-06T22:43:49.557`)
- [CVE-2024-5009](CVE-2024/CVE-2024-50xx/CVE-2024-5009.json) (`2024-09-06T22:43:04.747`)
- [CVE-2024-5010](CVE-2024/CVE-2024-50xx/CVE-2024-5010.json) (`2024-09-06T22:42:39.017`)
- [CVE-2024-5011](CVE-2024/CVE-2024-50xx/CVE-2024-5011.json) (`2024-09-06T22:41:46.253`)
- [CVE-2024-5991](CVE-2024/CVE-2024-59xx/CVE-2024-5991.json) (`2024-09-06T22:51:41.470`)
- [CVE-2024-6789](CVE-2024/CVE-2024-67xx/CVE-2024-6789.json) (`2024-09-06T22:31:04.833`)
- [CVE-2024-7593](CVE-2024/CVE-2024-75xx/CVE-2024-7593.json) (`2024-09-06T22:13:21.197`)
- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-09-06T22:33:30.767`)
- [CVE-2024-8163](CVE-2024/CVE-2024-81xx/CVE-2024-8163.json) (`2024-09-06T22:18:19.283`)
- [CVE-2024-8164](CVE-2024/CVE-2024-81xx/CVE-2024-8164.json) (`2024-09-06T22:19:53.907`)
- [CVE-2024-8165](CVE-2024/CVE-2024-81xx/CVE-2024-8165.json) (`2024-09-06T22:20:41.553`)
- [CVE-2024-8255](CVE-2024/CVE-2024-82xx/CVE-2024-8255.json) (`2024-09-06T22:53:34.187`)
## Download and Usage

View File

@ -93922,7 +93922,7 @@ CVE-2017-1000249,0,0,3140698e470efa540827b2fcefa473861882638ae3d9d2c44ca64cf092a
CVE-2017-1000250,0,0,21cccbdb024260a84237111cb83289e4c7e8c636b7b840bf370bab1c371ee906,2018-02-17T02:29:02.283000
CVE-2017-1000251,0,0,e83929b0cc760c5c9618969d4ee424f2ddfc5bd92a9caca156ec7f5d6fbb8de6,2023-01-19T15:53:39.780000
CVE-2017-1000252,0,0,9eea6472d04eeaf32df8b8fd22d143af69543d35d1254252d432260f2ebb8018,2019-10-03T00:03:26.223000
CVE-2017-1000253,0,1,da1948e215774ef80914a0fafba29848ebdc16a771bd399481a88c671b7c5d60,2024-09-06T20:35:00.883000
CVE-2017-1000253,0,0,da1948e215774ef80914a0fafba29848ebdc16a771bd399481a88c671b7c5d60,2024-09-06T20:35:00.883000
CVE-2017-1000254,0,0,2c437201d4072ed57e29421c399393b6fc19b110c7cd6c9df970aa004560ef63,2023-11-07T02:37:56.077000
CVE-2017-1000255,0,0,64c86fde651745d2a520f25af2dd721f03cb9d4867f5aedc3c0057d889738a48,2018-04-11T01:29:00.540000
CVE-2017-1000256,0,0,1ba938b667acbbdb5a5a82ad18f7e44094d40463d59112d0f41ca2b5aa05b499,2023-11-07T02:37:56.177000
@ -181710,7 +181710,7 @@ CVE-2021-39807,0,0,62ccf7edd8dc9caf624d578e63be70c237f0b3c84eb56d1f3452785739662
CVE-2021-39808,0,0,6552244cfbacfabe118545b3b68ffc69cdaa6de85cab59066cf773dfb9d9ea67,2022-07-12T17:42:04.277000
CVE-2021-39809,0,0,43281f2921fea01353739d0535437439d176201a8f946531369994f6ee661147,2022-04-20T15:01:56.223000
CVE-2021-3981,0,0,36d9a95398596799dc6304ee5061e93b29dbfcf63034bda831574908a1d5af51,2024-01-16T01:15:34.110000
CVE-2021-39810,0,1,98b7425db0b6c22241a2482c95a6c202d7e527d598b20d9e3eed1f9bb9c30b70,2024-09-06T21:35:00.760000
CVE-2021-39810,0,0,98b7425db0b6c22241a2482c95a6c202d7e527d598b20d9e3eed1f9bb9c30b70,2024-09-06T21:35:00.760000
CVE-2021-39812,0,0,a8c6b6992203023cbbb031e0a6d712046b550b001a0c24137ec5c45dc58d28f2,2022-04-20T14:56:48.470000
CVE-2021-39814,0,0,24197212b38ccf6945c124fc47a9c545d376fb1514a80a146c80e1765ccc4917,2022-04-20T15:12:01.263000
CVE-2021-39815,0,0,2590baf73ac20d5dd9ea8519c94ffc40753b833417e22f46e4d6fe53264c2d08,2022-08-29T01:03:24.013000
@ -210199,7 +210199,7 @@ CVE-2022-45724,0,0,a56acbec26c12264b64394fe5ff676fdb1ede46f6330e3ed427ce8a775b03
CVE-2022-45725,0,0,7d19bf373e5f37884d5838049c5244ece7b33402c2dde8efee79801c39e51747,2023-08-08T14:21:49.707000
CVE-2022-45728,0,0,232c0f6c81afdd6419bc760d2cff9446824707eddce45f26dc4ab06a7d2086a9,2023-11-14T20:28:42.417000
CVE-2022-45729,0,0,7a4f183504886c3fae369b096edd9121121fb7a91cd48a17ea06746536032ed2,2023-11-14T20:28:42.417000
CVE-2022-4573,0,1,cfbce652698239b68cd5fe182f30b9c511ec35e276576ae09b9021d4fe49f003,2024-09-06T21:35:01.913000
CVE-2022-4573,0,0,cfbce652698239b68cd5fe182f30b9c511ec35e276576ae09b9021d4fe49f003,2024-09-06T21:35:01.913000
CVE-2022-45730,0,0,8fcd028cc7daa4573e32d7069b9029ec2a4bc3d503ea3ef7002d074dfb0d949d,2023-11-14T20:28:42.417000
CVE-2022-4574,0,0,99ebe8cbe281a8699b19c2a6ad0c35ccacdec0cb0796b1f58967307d7342b6c8,2023-11-08T00:24:33.087000
CVE-2022-45748,0,0,17934955b2a8e030ad347f76eb1a3ab533d6cf7f18388292068553d79a6577e9,2023-01-28T03:38:19.033000
@ -215539,7 +215539,7 @@ CVE-2023-21294,0,0,ea0c41050220ecdbee05caac36ee7c5e3f1205dc47b2cd8ced9b5f5736c33
CVE-2023-21295,0,0,bbbaac0f428f9007dd95a9d7f835154513a18e5f6b1c73f8d63d73088b0032c9,2023-11-07T00:45:33.037000
CVE-2023-21296,0,0,6a66e33a6f06eae6279202129d38e6e1cfbc6f7bfb3d569e81468b2c49d3d321,2023-11-06T17:29:14.137000
CVE-2023-21297,0,0,2f94743ac68abeafa4648e486337856f981434cffdb6c03ef499bfa7fe09d7e0,2023-11-06T17:36:33.883000
CVE-2023-21298,0,1,718baa41571aebbb7b14fdaf458aa93bf02bcf1453fbdb57b03a4e590188e682,2024-09-06T21:35:03.240000
CVE-2023-21298,0,0,718baa41571aebbb7b14fdaf458aa93bf02bcf1453fbdb57b03a4e590188e682,2024-09-06T21:35:03.240000
CVE-2023-21299,0,0,0d74a4cef1230479428525e07442bae2d424015921d2845d41022d6e154d24ce,2023-11-06T17:45:22.607000
CVE-2023-2130,0,0,49235d8db8cac3bb3cf8bd76e90ec4bef70a1ec47f724ede82c3f69aca9fb1bf,2024-05-17T02:22:41.240000
CVE-2023-21300,0,0,27b0bd25448b1107e304a4af276ce9e24c341140ec54c25cc9d82b9281eca70d,2023-11-06T17:45:39.737000
@ -215567,7 +215567,7 @@ CVE-2023-2132,0,0,63d2413c9f97227792af21b2461b99b4deee7861989a9f9808c25ea23f4d2e
CVE-2023-21320,0,0,bf5c27a898752221d2d16e07d30c8abb763d6f13f92b26c620916650d964815f,2023-11-06T17:57:55.523000
CVE-2023-21321,0,0,b8f716c502ea85352702b7a43c185f78a5bc6a5ea81a610fc1d92193697e623f,2023-11-06T17:58:03.540000
CVE-2023-21323,0,0,58f5817ca18173e3ddbf2e2ef2721d47264154dcc4681a9a7b828ff1d0b7df4a,2023-11-06T17:58:14.793000
CVE-2023-21324,0,1,0cbf889a70484b73e615c989f44bfdbffdab03f74b65bb057393b5dd088c6ddb,2024-09-06T21:35:06.720000
CVE-2023-21324,0,0,0cbf889a70484b73e615c989f44bfdbffdab03f74b65bb057393b5dd088c6ddb,2024-09-06T21:35:06.720000
CVE-2023-21325,0,0,2850018837c69988dcb2e8c6470fc88f7e0a38abfb0e896a7ab3270c619a0d23,2023-11-06T17:58:39.620000
CVE-2023-21326,0,0,e1f704547b8f50cf3e1f2abb0d4712b58178cdc74d57543f75565f7e4d61ad59,2023-11-06T17:58:57.733000
CVE-2023-21327,0,0,098143c627d33cef9785e28ec02a457bd1764a72f9fc19e2d0a8077fc74f4a10,2023-11-06T14:47:48.253000
@ -215581,14 +215581,14 @@ CVE-2023-21333,0,0,2bd340646917ee8db81d1bc53d5dacab1c6d3d813843378b576c024f4e8cd
CVE-2023-21334,0,0,2cc37bab2271647904cb54a26d33818b191a3d06b78cf0922aa6fded48d1f987,2023-11-07T00:47:46.253000
CVE-2023-21335,0,0,6b060136a8d4a1fee04e45ed9223ac2c6708a69864a5acc47a736978514aff62,2023-11-07T00:47:27.993000
CVE-2023-21336,0,0,eaf33d454d2c59c75139c93882d35fc70353c0db9db44565bbaf0a0c90e671d0,2023-11-07T00:49:26.617000
CVE-2023-21337,0,1,01e35811c40a074d28fda226e12f20e78d13dec463a0fe08c95cbc3cca4d54cd,2024-09-06T21:35:08.387000
CVE-2023-21337,0,0,01e35811c40a074d28fda226e12f20e78d13dec463a0fe08c95cbc3cca4d54cd,2024-09-06T21:35:08.387000
CVE-2023-21338,0,0,d384ab97d80ddbf1863be82befd5791882b5f4c4cb9a7f682bf1606e3b227266,2023-11-07T00:45:00.197000
CVE-2023-21339,0,1,1c44beceb91e47365aba3d7ea7677347711a15b45b2e1dac9fb3d80baa451fae,2024-09-06T20:35:03.200000
CVE-2023-21339,0,0,1c44beceb91e47365aba3d7ea7677347711a15b45b2e1dac9fb3d80baa451fae,2024-09-06T20:35:03.200000
CVE-2023-2134,0,0,f95c0539485b1029697642f141b2454db420355fbc02afabf37920a9e2632a00,2023-10-20T20:52:47.177000
CVE-2023-21340,0,0,fa3723c0de9d38e33a3c0b88fcba4d992c6bcc380ec3b5bc2a208a8f051a56b0,2023-11-07T00:43:23.113000
CVE-2023-21341,0,1,415218b88af663eae42f3dac04320f26520144012c5c630963f8109ce2ca2b17,2024-09-06T20:35:04.047000
CVE-2023-21342,0,1,259d320ebc6127c0f9f077addcaf10a8bbabb7d10b865c76456eace3d9761e7f,2024-09-06T20:35:04.803000
CVE-2023-21343,0,1,13741f341d1d55dbf27e9d2e0b06b69b24148b378c3bc2085421fdd842e89ede,2024-09-06T20:35:04.997000
CVE-2023-21341,0,0,415218b88af663eae42f3dac04320f26520144012c5c630963f8109ce2ca2b17,2024-09-06T20:35:04.047000
CVE-2023-21342,0,0,259d320ebc6127c0f9f077addcaf10a8bbabb7d10b865c76456eace3d9761e7f,2024-09-06T20:35:04.803000
CVE-2023-21343,0,0,13741f341d1d55dbf27e9d2e0b06b69b24148b378c3bc2085421fdd842e89ede,2024-09-06T20:35:04.997000
CVE-2023-21344,0,0,ae51061e7d5645c5b031bbea62d5f7626337dc20eb02a252711830635f230b87,2023-11-07T00:48:46.480000
CVE-2023-21345,0,0,bab68c716db33ae153b7eb2d386a1148f26b18d98fefbc595add6ef7e8627123,2023-11-03T17:42:55.850000
CVE-2023-21346,0,0,bcf1122126b368329b090e48ca2a189a8ecb47c37497af9cf9d246505a426f9a,2023-11-03T19:00:13.137000
@ -215621,7 +215621,7 @@ CVE-2023-21370,0,0,1ea830b517da6b3468465f72f71e3f55c4b359489447cb706691f4e78846b
CVE-2023-21371,0,0,a50c87f04b064b1ccfea6d98517fb1cb2a06b280de61319201f0da671fec7686,2023-11-02T20:38:18.707000
CVE-2023-21372,0,0,b61b4e995b6aa37e0af794ae07b3d2accbed06caa351af145000f3aec59b4f8e,2023-11-03T18:58:47.933000
CVE-2023-21373,0,0,020e4f0c50c15664024dd5b1dec72961e522f5bd221a1355a36e4cd491987d52,2023-11-04T03:22:52.047000
CVE-2023-21374,0,1,8758b35a1bed546fdf23d6d929b49c3443c5b59bcca91512d34a2db049e9666e,2024-09-06T20:35:06.647000
CVE-2023-21374,0,0,8758b35a1bed546fdf23d6d929b49c3443c5b59bcca91512d34a2db049e9666e,2024-09-06T20:35:06.647000
CVE-2023-21375,0,0,7a3fac506500bca24b016a29c0c3dd3c1420c5883471807aacb26ffa1e20b5b6,2023-11-03T19:02:57.213000
CVE-2023-21376,0,0,7725402cf736eb8f5dc7bd1d88c3035355c431f9c8db0fa0103f053ca3e4c709,2023-11-03T19:03:06.437000
CVE-2023-21377,0,0,e5fe5639f10e7519c5dcc3edfa374c24d92a1d7ebb461a3be9df3fa722e0ca98,2023-11-03T19:03:15.883000
@ -218668,7 +218668,7 @@ CVE-2023-25043,0,0,80f871cbfee4f26fcdbd3bd11f18d19d5bb1f330e0eae2b05061f16904356
CVE-2023-25044,0,0,3838d1c27051c58e78ea9b745ca07ee80c87451a22a17801992dc973ebb054e3,2023-09-01T20:47:45.390000
CVE-2023-25045,0,0,0332882a5d673fd95f16007677ce5037d5202788000eeb4e1a21e51347e40919,2023-11-08T02:18:12.263000
CVE-2023-25046,0,0,6f1bf0a6e1e58854a145ce77355b6108a8401123830999ac21bce886e3de6766,2023-11-07T04:08:48.917000
CVE-2023-25047,0,1,155b129990fc27f2e9ce424091e4b892e3c9440273a5503426b4135a7b38dc89,2024-09-06T20:35:07.623000
CVE-2023-25047,0,0,155b129990fc27f2e9ce424091e4b892e3c9440273a5503426b4135a7b38dc89,2024-09-06T20:35:07.623000
CVE-2023-25049,0,0,99209e68ded4b17aee5a6af088e791275b9d6cc10832f8adc40dcbd238eed48a,2023-11-07T04:08:49
CVE-2023-2505,0,0,6efcf779f35194644d77f093cc0fa0dbddee637b5633c00604d8702797eb7312,2023-05-31T14:01:22.207000
CVE-2023-25050,0,0,daef4eb557ea0d6701f0b52307e0f8410263dad34fe5d6af987a12eda68bb363,2024-05-17T18:36:05.263000
@ -219709,7 +219709,7 @@ CVE-2023-2631,0,0,4bd445bd2bec8da6a2695046ad2eabb2eb9ea9d2f819ee1d12353b574204d9
CVE-2023-26310,0,0,3bfe9588574a5466dd4da975adc93003243eae95ce6e16603dac925823abfd9a,2023-08-14T13:38:48.893000
CVE-2023-26311,0,0,a53302d4b1bc0fe51715261bd00ff42e22fc0ce6f61dd99c4e9bea1fdf7a9e70,2023-08-15T18:59:47.580000
CVE-2023-26314,0,0,6effb9b6980e0bc6f3ed2f4a9c1dd25114a29ad0ef15b8bc6dd364afeaa586ec,2023-03-02T20:03:30.170000
CVE-2023-26315,0,0,fbd02cf24034f691d1cabd0fe46af320ab6c0d1abc32b9fbeda3b01ea3198c63,2024-08-26T12:47:20.187000
CVE-2023-26315,0,1,7e3ab4d47f5232ab5703d804bcec5bfd7f9220cde67501bbc57773ca3ee6bedd,2024-09-06T22:25:54.637000
CVE-2023-26316,0,0,b25055cc7c5cea8ff22d07e70ae7c2d4333af8a0444497a6d65e59a6b9965ec0,2023-08-07T18:01:47.890000
CVE-2023-26317,0,0,4436e84cd6ff81a4e8afb76597369a2fd42bffc02b7acdc50dcdee19196a2376,2023-08-07T16:18:22.053000
CVE-2023-26318,0,0,d49830620df46f2dde3da449a5ab4d59351f38e41e437bccf559cb5c96c8a3d5,2023-10-16T19:00:41.267000
@ -229599,7 +229599,7 @@ CVE-2023-39277,0,0,ba1a506de93531243b1a6840927d3d5ce9ac7cde2d3aa11edc7f0d5f21e31
CVE-2023-39278,0,0,51f0307dfb979d2053bc04773faeed7c8885e53af279fab9559ab2a2eec93b7c,2023-10-19T16:44:45.767000
CVE-2023-39279,0,0,fac9fdc9f09ef37ef90e8e828c858c7233aab9273c23f45c53d69d06ba06aeca,2023-10-19T16:44:41.193000
CVE-2023-39280,0,0,f66c01ff590a5a33540c5b722d4caadbcd584ceb11eb4eb0993b46f0de37246a,2023-10-19T16:44:36.887000
CVE-2023-39281,0,1,1874434dc4ec2eaf4186681608efa6a16522c7873635fa24daa4a6f44da1496f,2024-09-06T20:35:07.887000
CVE-2023-39281,0,0,1874434dc4ec2eaf4186681608efa6a16522c7873635fa24daa4a6f44da1496f,2024-09-06T20:35:07.887000
CVE-2023-39283,0,0,33a7ba02530f9e8db4ad9f607c0258167ffb4c1905d4e9170764e0a5bf1db2a2,2023-11-10T04:12:27.713000
CVE-2023-39284,0,0,dbfd936d99a876c85f63e2e96d78f73333cf4937bda6310a3f3095ec3afb155a,2023-11-15T20:32:55.707000
CVE-2023-39285,0,0,96545ecda21d95bf4f40d74afea6ae328a7b9d29d6eb613dd7475e1a1a0c840a,2023-09-19T18:00:45.343000
@ -234729,7 +234729,7 @@ CVE-2023-46480,0,0,e61260dcb44a3f60a5f4e1ec1c5341f4b741c38331825c54396f7541beaf7
CVE-2023-46482,0,0,630ab76a1654184009f2c4141ee3045c1657f81f20ef48b367a71e569dd8a4ff,2023-11-09T00:56:40.200000
CVE-2023-46483,0,0,a6b08a99a462418e2e5e3dfea60dc526a39e77684187df959a66ed804fa72e51,2024-09-03T20:35:03.777000
CVE-2023-46484,0,0,1f8d63c7ddfe1eaa7ca1ffc9345766611214634a0c3a30ee307a44b4e8203940,2024-09-06T19:35:07.997000
CVE-2023-46485,0,1,9801d9696802c8efc10f03c7b8cea0a738062f388bd2c085b548d2aa36166388,2024-09-06T20:35:09.900000
CVE-2023-46485,0,0,9801d9696802c8efc10f03c7b8cea0a738062f388bd2c085b548d2aa36166388,2024-09-06T20:35:09.900000
CVE-2023-4649,0,0,5746162f6fcba997b2a90f73734098878aa9162b445b6437a5e3725ea805bb35,2023-09-01T14:37:08.443000
CVE-2023-46490,0,0,7572faf27c14631dc567fd10b90d8b8da5fa9678b69c09f03d211428cc7ea703,2023-11-13T14:30:41.820000
CVE-2023-46491,0,0,59e819e8800151e51f1f82f3c48345bc286d5502f13a3e02ae0077f28fc2c091,2023-11-03T20:23:49.313000
@ -235094,10 +235094,10 @@ CVE-2023-46964,0,0,0d7def73494b6867df0b91db2d842e5c633f4a9bb171d96b528d1e1045602
CVE-2023-46967,0,0,8e0dc51372022fead7ea238ca0342fb708c07b5a138f4ce2e8f8fcb4db9359c9,2024-08-06T17:35:01.070000
CVE-2023-4697,0,0,5cd6e03e2cabe495720e6ef9b63c46f9baf3a0316a8b4b482e402bc10576e126,2023-09-01T13:07:07.767000
CVE-2023-46974,0,0,0b604dc4e986a27c2206d301607504c33793e4001240929900dcff4d61e041ee,2023-12-09T04:51:31.277000
CVE-2023-46976,0,1,3b32e217954a43183a3da831b4e8da9b146568c9a89ac458ec88563772adf972,2024-09-06T20:35:10.803000
CVE-2023-46977,0,1,43f7688072581fa12cf48597f3669a381013f7206f3ad1a6cb54258132aaa8ff,2024-09-06T20:35:11.550000
CVE-2023-46978,0,1,a4fc554a62aeb85604d3256754afbbeb9a8b11fd08d3f484459b6520d26968c0,2024-09-06T20:35:12.317000
CVE-2023-46979,0,1,6a36e4406edd653e24fafa4b26e51f2757f62ad2690f05fb13c8cf8e7a6bd8c7,2024-09-06T20:35:13.130000
CVE-2023-46976,0,0,3b32e217954a43183a3da831b4e8da9b146568c9a89ac458ec88563772adf972,2024-09-06T20:35:10.803000
CVE-2023-46977,0,0,43f7688072581fa12cf48597f3669a381013f7206f3ad1a6cb54258132aaa8ff,2024-09-06T20:35:11.550000
CVE-2023-46978,0,0,a4fc554a62aeb85604d3256754afbbeb9a8b11fd08d3f484459b6520d26968c0,2024-09-06T20:35:12.317000
CVE-2023-46979,0,0,6a36e4406edd653e24fafa4b26e51f2757f62ad2690f05fb13c8cf8e7a6bd8c7,2024-09-06T20:35:13.130000
CVE-2023-4698,0,0,f67219d933e95e412da2b616588dd9f7b8818435fbd1498ccb40e5f4049ed99a,2023-09-01T13:07:30.360000
CVE-2023-46980,0,0,cc67874b097e0fe762ff091e7672831ece4fc0faa50aca2caad3a6a3a1cb63e5,2024-09-06T14:35:08.953000
CVE-2023-46981,0,0,865ec0b7ef3df7198714d9479b263e54d44d5181af5d1cf0172c63bfd8768173,2023-11-13T19:37:07.107000
@ -235105,8 +235105,8 @@ CVE-2023-46987,0,0,374b064ecd125c9b3c77e3133bffffe989aa2b01517a094fbc764346da32f
CVE-2023-46989,0,0,fd52fc2c8815b71d6a3aa76a5b70a3b0954c93b4887d037a1f94f52ffb7b26c9,2024-01-04T17:14:27.397000
CVE-2023-4699,0,0,d7688971433e3a13914d674e0541b168882cd0e762c29ec4bad4b4f1236c3109,2023-11-14T19:10:18.253000
CVE-2023-46990,0,0,ce43f0fc3bb795f8d83320e9a48981a22398e3c8dcf2800cd3722d82e4112167,2023-11-28T21:59:25.917000
CVE-2023-46992,0,1,d215b6f8d4c730393fd9a8c7825d0c451c3046c57aecea0ee0af590c2c4eca07,2024-09-06T20:35:14.107000
CVE-2023-46993,0,1,345b57a0f6b34073fa8800603bdf10a7fd580e2443040efea05347af1d1b5306,2024-09-06T20:35:14.960000
CVE-2023-46992,0,0,d215b6f8d4c730393fd9a8c7825d0c451c3046c57aecea0ee0af590c2c4eca07,2024-09-06T20:35:14.107000
CVE-2023-46993,0,0,345b57a0f6b34073fa8800603bdf10a7fd580e2443040efea05347af1d1b5306,2024-09-06T20:35:14.960000
CVE-2023-46998,0,0,6e25fd61c866543a07d01980630aaacdfbd481c71dfffbe0cc0eec62842e2dce,2023-12-20T20:09:44.320000
CVE-2023-4700,0,0,54f537d8bd565ac9e7043f20cc4db7f0e44d4a83a7ddcc004638adf6277a6d5a,2023-11-14T20:00:25.203000
CVE-2023-47003,0,0,3bceaa921e377ee6166234257569cfbd597868e87e0fb9bbf1a2f34b3fce5f8b,2024-08-14T19:35:11.287000
@ -238946,7 +238946,7 @@ CVE-2023-52531,0,0,139c545d33ba10eb3343fe2ebed8bb6f85f222cd821926b67d690a1cf30ff
CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbfcfe,2024-03-04T13:58:23.447000
CVE-2023-52533,0,0,87288d9acffdcc3f04e0528abc716d93f9a78d72735b2ac13e2dfefa20c9889c,2024-08-26T18:35:02.780000
CVE-2023-52534,0,0,561b04782ad233f3a992132df8769a7ea9cca6fb96df63b18027307d5770e0c6,2024-04-08T18:48:40.217000
CVE-2023-52535,0,0,fe6b3187a44c437c26ab3318b1139c9091f6bec389d5c218d94a801b45cfd652,2024-04-08T18:48:40.217000
CVE-2023-52535,0,1,a8b46149ce833cf00e265bd878fbc4e9f6f9152b7344f1759d13bc7224de07eb,2024-09-06T22:35:00.460000
CVE-2023-52536,0,0,31a4fc764ec17dfd98dd3f2041aa9cf3362d0496d5ba27ab57e1ac620a9f85cd,2024-04-08T18:48:40.217000
CVE-2023-52537,0,0,2559d90b1b1794296f22fc0badef4074c5581bcf37f52502d595b11857600810,2024-08-01T14:35:02.953000
CVE-2023-52538,0,0,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb2ee,2024-08-01T13:45:38.693000
@ -245331,7 +245331,7 @@ CVE-2024-23494,0,0,1761cecf4d1aa42fc2142275287576a82851a4af1416d215b879da20539b4
CVE-2024-23495,0,0,3343f5ee522cdf1bf3831719df667c337f0dd432d4bf69c58d9e4b3f2cc7f568,2024-08-31T03:38:43.080000
CVE-2024-23496,0,0,c3856130b65624b5767002912c0501b965e2549e4b94367c7a809441839aa00b,2024-02-26T18:15:07.580000
CVE-2024-23497,0,0,7141d52f3f16ac03f06f3ea37af329ea1f4b81b12e27f099e14cb8aa990ac67b,2024-08-14T17:49:14.177000
CVE-2024-23499,0,1,351ed9c1ca3148c2c989549db13cddbea86ce2f99d15546ec7ae8fbdde1e39ca,2024-09-06T20:43:04.353000
CVE-2024-23499,0,0,351ed9c1ca3148c2c989549db13cddbea86ce2f99d15546ec7ae8fbdde1e39ca,2024-09-06T20:43:04.353000
CVE-2024-2350,0,0,b224bf65ace6a631c4679b3350fe7c7082c8e455c9408f918ff58e10f6a6fd6a,2024-07-25T12:57:24.040000
CVE-2024-23500,0,0,9f0ca72522aa1768710bac3d52af84b3704000817095134026ac1a86c6c1c178,2024-03-28T12:42:56.150000
CVE-2024-23501,0,0,e5aebbfbd9d9417005e3d705da6a35d8860fa8db7dc1ef11a82d27e4462980c8,2024-02-29T13:49:29.390000
@ -245692,9 +245692,9 @@ CVE-2024-23902,0,0,23fa1c3089afd507b048db06e4ea2ffdd19863f614f27f719de97ada3a6cc
CVE-2024-23903,0,0,46f92003a51fde0f978d2b6023e8270332b2634481c35191ff5ffb1ffce33c63,2024-08-29T20:36:08.670000
CVE-2024-23904,0,0,a951ec872dbe283943db2cda1f329d6103f39dc8a3dbbab6b3bff9a6b9e2af38,2024-01-29T19:26:29.770000
CVE-2024-23905,0,0,a35e7dacddd2c1f3b32033e91045b0ad026e0a51c2fa232b2e0b46787dc2be1c,2024-01-29T19:26:11.517000
CVE-2024-23907,0,1,0cc1665330e952366866888dfdc7237aa87fdcd95bb20538ca6e0b49e80090fc,2024-09-06T20:38:29.490000
CVE-2024-23907,0,0,0cc1665330e952366866888dfdc7237aa87fdcd95bb20538ca6e0b49e80090fc,2024-09-06T20:38:29.490000
CVE-2024-23908,0,0,8bfe961f2cd2fcb2503f4aff8306f89c58f7b0b3f54719b8f5407f1616c019ad,2024-08-14T17:49:14.177000
CVE-2024-23909,0,1,553111dd06cef2fea922046bd97385fac9dc9e02c030684ae1bbf37bf08d132e,2024-09-06T20:33:05.670000
CVE-2024-23909,0,0,553111dd06cef2fea922046bd97385fac9dc9e02c030684ae1bbf37bf08d132e,2024-09-06T20:33:05.670000
CVE-2024-2391,0,0,60da3844b5911777951235a640805c94e8dc2cfa119cea41ed5149fa8aa45d94,2024-05-17T02:38:12.397000
CVE-2024-23910,0,0,21defb9e6d6dbf8d0f521ec76503d783a0a5ec9ee34bb29da0316f9a979d5f65,2024-08-01T13:47:21.280000
CVE-2024-23911,0,0,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df94ef,2024-07-03T01:48:10
@ -245724,7 +245724,7 @@ CVE-2024-23978,0,0,b11564d73d018e8762d289ccbaa0f5f641bc89f2639fd60e4b0e0ef314e8b
CVE-2024-23979,0,0,6fdd5509f38519be7582661a9525c018d02e080bbc0d3ec491dc3a617317722d,2024-02-14T18:04:45.380000
CVE-2024-2398,0,0,1df50a613e2f34671ada45040fb8ddc3d4f8857a9d7670bf2946d253e5c24780,2024-07-30T02:15:05.450000
CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000
CVE-2024-23981,0,1,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000
CVE-2024-23981,0,0,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000
CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000
CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000
CVE-2024-2399,0,0,6767e789c5e7e80586d75b3b6704c8a0508ed89afe73da734c95859ddd63a842,2024-03-15T12:53:06.423000
@ -246292,7 +246292,7 @@ CVE-2024-24978,0,0,b182fc4dea5fb8dabebc670a8efcee22aa4dd4621b4f7e4a6eb2d8d06cf52
CVE-2024-24980,0,0,3fdf73457b919755fcf59939500686a4e764152c575eabbdfb315f29409758ab,2024-08-14T17:49:14.177000
CVE-2024-24981,0,0,4778c6815162129c19c427caa98fb743cbc1e80e4ace882077c64de825799123,2024-07-03T01:48:32.340000
CVE-2024-24983,0,0,e552e4af213b0ab57adb4ba19aeb0c4530827148e23a2e1c19c3f213b7957135,2024-08-14T17:49:14.177000
CVE-2024-24986,0,1,77b300319c7ee1ccc9e61dd316d3dcaa5e475b38e28730cee5e5deb88cc75c00,2024-09-06T20:23:48.690000
CVE-2024-24986,0,0,77b300319c7ee1ccc9e61dd316d3dcaa5e475b38e28730cee5e5deb88cc75c00,2024-09-06T20:23:48.690000
CVE-2024-24988,0,0,9e4f6f88273498e8474a945212f722bcba31b159d34f99737f4277d72dd9fb6e,2024-02-29T13:49:29.390000
CVE-2024-24989,0,0,81a2a87b35bcbca4ec34d5e22214bdf976ca0d87c889c16ca05e31de151ff5e5,2024-06-10T17:16:21.607000
CVE-2024-2499,0,0,8ffef5ee2ad79ac60ba3298cecf691939796c05eb8a23e6745e9e8cfbf777b2d,2024-04-08T18:49:25.863000
@ -246644,7 +246644,7 @@ CVE-2024-2557,0,0,dc8b54b171bbdaa8e41888d89825f630dc10d84a726786b12c4c722ec5ac93
CVE-2024-25572,0,0,a19a9cf36c077c05dc278f38e37ca145a9759fc24272e685a0d3f0ff41385f00,2024-07-03T01:49:10.700000
CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d8df,2024-04-02T12:50:42.233000
CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000
CVE-2024-25576,0,1,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e821105e,2024-09-06T20:17:14.003000
CVE-2024-25576,0,0,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e821105e,2024-09-06T20:17:14.003000
CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000
CVE-2024-25579,0,0,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000
@ -246970,7 +246970,7 @@ CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156
CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000
CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000
CVE-2024-26020,0,0,c3af68fd4e405a95ac1ee216ac5199ad392060554e72b2c1dedcf9e863dfab9a,2024-07-24T12:55:13.223000
CVE-2024-26022,0,1,a26ae471637132c4dd9ca0e595e7538384876862971be53dda4b80cd7b3fdc6d,2024-09-06T20:16:27.330000
CVE-2024-26022,0,0,a26ae471637132c4dd9ca0e595e7538384876862971be53dda4b80cd7b3fdc6d,2024-09-06T20:16:27.330000
CVE-2024-26023,0,0,edcfd807fdc96925d4b0905ae74cd6e42a43795e1d81a6569987258b521eef13,2024-08-01T13:47:58.927000
CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4ac8a,2024-05-29T13:02:09.280000
CVE-2024-26025,0,0,3352cb4bf9ea0c839d1741e6282396ec44178b4e8d69bb56155c91bf1b50fdf8,2024-09-06T18:54:37.007000
@ -249033,7 +249033,7 @@ CVE-2024-28751,0,0,befef9aaad239486418cde9be9e0a53c20b96e9db24dd8e70484385d86fc3
CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e95ca,2024-08-01T13:49:17.413000
CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000
CVE-2024-28754,0,0,b825517ec09be0ea62da6389e64d9784f7fd2758d87d7ecb524c18a858c8d2f8,2024-03-11T01:32:39.697000
CVE-2024-28755,0,1,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000
CVE-2024-28755,0,0,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000
CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000
CVE-2024-28757,0,0,38e35916340cc7b59636f71fd12bb6c865345cd709ec2ad97abfbd0121697391,2024-05-01T19:15:22.567000
CVE-2024-28759,0,0,dcdc9bf6250fc5bc69b9326038bec864cb143a6aab76dd04534ae889181ed6fb,2024-05-14T16:13:02.773000
@ -250546,7 +250546,7 @@ CVE-2024-30799,0,0,d0be2d0f006d2c4f92e204846e2ae37ca4e292273d3e14437b5fe8a98380d
CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe9a,2024-06-17T12:43:31.090000
CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000
CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000
CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000
CVE-2024-30802,0,1,1376f3b4e3d1d6ed6e73bef87767a1a17df2d57663c8be14203281e52f5ae9c3,2024-09-06T23:35:00.597000
CVE-2024-30804,0,0,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000
CVE-2024-30806,0,0,d64ba375e8a4aee4aa1348cdd3ca4e1493d138147be36aa2ff70b6291ff84259,2024-09-04T16:35:07.870000
CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000
@ -250610,7 +250610,7 @@ CVE-2024-30929,0,0,7150ed17033c783d22cb10cc7e29801b4cdbd11e710f0261447b2fe790494
CVE-2024-3093,0,0,fe746195c4e2001fde57b14e03afb6f54529d797bc86f2aa9c4028e9fadd8f82,2024-05-07T13:15:48.260000
CVE-2024-30931,0,0,1c68d82180e73b8514f26d33f19b69f95be31480b9f9d1b6b39915134b180669,2024-07-03T01:54:23.343000
CVE-2024-30938,0,0,29b8e40617dee21c8890e6dc6801cc20a4d0cd635b3d627aba79e0fa49cbd6d1,2024-07-03T01:54:24.137000
CVE-2024-30939,0,0,533ddd8e3c3323adc4540b47a20f0ad2914d0e15fa0a4366e01edaff34cffd58,2024-04-26T12:58:17.720000
CVE-2024-30939,0,1,4fde734a2c1073b7ace1dcb3955f64c312d3d3cb950014608581b57b7c19af95,2024-09-06T23:35:01.567000
CVE-2024-3094,0,0,98d623c51c3718f594d063257facb535556f13c6eb9aedf81f112b165abed8fb,2024-05-01T19:15:27.340000
CVE-2024-30946,0,0,7c64f57becf760e1029c7f17f5554dd3b55e452eafcf4a611ce8a9042ae36380,2024-07-03T01:54:24.920000
CVE-2024-30949,0,0,202e32279483c8a9ccf9bc2c69e9e5054a0d5627a3e5e9f84dfb1934bcd5644c,2024-08-21T15:48:31.937000
@ -250652,7 +250652,7 @@ CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c
CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000
CVE-2024-3102,0,0,b23588dfddb3d82632a71207907da6ef98bd35bc4bfa522f8686e7f4473229c0,2024-06-07T14:56:05.647000
CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000
CVE-2024-31025,0,1,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000
CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000
CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000
@ -251115,7 +251115,7 @@ CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e
CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000
CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000
CVE-2024-3168,0,0,e53f03656f19e0e47c6622c3da3e06f5dd93aaeae623b38784e05f0c565a375b,2024-08-01T13:56:21.960000
CVE-2024-31680,0,0,7e1908b87f42141dc482d017d5b62a6782bb8342605d50fe2c839034d8e94921,2024-04-17T12:48:07.510000
CVE-2024-31680,0,1,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187619,2024-09-06T22:35:01.557000
CVE-2024-31682,0,0,80a6fa070deb0370560504b4fbd6eefe7a627d5dbcf4ad67176d2e92301ec450,2024-08-01T13:51:05.133000
CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000
CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000
@ -252022,7 +252022,7 @@ CVE-2024-32908,0,0,f22243bdf03341c4f49fe8c95d52c9746f5d3123ec78466cf58d8b7d93534
CVE-2024-32909,0,0,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000
CVE-2024-3291,0,0,1fc26be05fd4e8c0c75776f8dbce085d67ae03152f1c480f017ccf6b064046b2,2024-05-17T18:35:35.070000
CVE-2024-32910,0,0,96fa2d9d7d031cd1f9c1fc15158945931873ec9256f8a9c2c7692b992096082b,2024-07-16T14:56:46.903000
CVE-2024-32911,0,0,27d438335c273d9cab85185e9356d83b9e09719cfc0b2be8a5561f1c5c77b7f4,2024-07-16T14:57:13.803000
CVE-2024-32911,0,1,3a0fef0abd5eab29360573b4c903482bbebef01629598c289909e1af8d4e6f74,2024-09-06T23:35:02.557000
CVE-2024-32912,0,0,fd994f36adaadcf11decff8c54cb9ed9dfd2529041b080833bc870baeef2b9e7,2024-07-16T14:56:26.787000
CVE-2024-32913,0,0,996f6595bdd5fe8c40fd4536473f9753d8a3be1f0d10e2434d28fb6144612388,2024-08-19T14:35:08.433000
CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c36e,2024-06-17T12:43:31.090000
@ -252614,7 +252614,7 @@ CVE-2024-33898,0,0,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363
CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000
CVE-2024-33900,0,0,269cc21c173c9c584795c12f1ce91d2738b696474fbebedc5c423a95f8259b67,2024-08-02T03:15:33.783000
CVE-2024-33901,0,0,a1f0948d73a23ff6210c02030912794a258b1439fa01bfbefd0ef5985673396e,2024-08-02T03:15:33.887000
CVE-2024-33903,0,0,66fa6f18457541069e9742d7224c491d6b0a223ce231b54f3cf8ba6c6e111733,2024-04-29T12:42:03.667000
CVE-2024-33903,0,1,86a5cd54828614b1e7bfc3cb006bb1bc8de68743de80985523a5471be5cea7ae,2024-09-06T23:35:03.347000
CVE-2024-33904,0,0,7f612cc39cf5cffef556560adbc4e6bcc771b421fa11cf86490b14ea4a43c0ba,2024-08-22T20:35:09.343000
CVE-2024-33905,0,0,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000
CVE-2024-33907,0,0,51edf1f50248f36c9e87b8d73ea1cc5abed4f93b57bba096b80e73be40374db3,2024-05-07T13:39:32.710000
@ -252844,9 +252844,9 @@ CVE-2024-34148,0,0,39bc79113db1a4cb24c1e032d2832991ff9777a6aea1f2d179dc9afdce78b
CVE-2024-34149,0,0,bc997c41063649e77025e7b523e84ecd9251e3e152bcf881c50ffb65d253004a,2024-08-02T03:15:37.863000
CVE-2024-3415,0,0,34ccb97766fc5acac460b5429af5d66fea7f850526947b377f986615d31afcf6,2024-05-17T02:39:54.247000
CVE-2024-34152,0,0,2436c8a621b0d09dd7154ff9aa9ad8e75fea3818a8a19b6b0802746c78436018,2024-05-28T12:39:28.377000
CVE-2024-34155,1,1,16098580cbaff82b0c7090020256093dd240c2791e1babd972e5fb3d4ddc876e,2024-09-06T21:15:11.947000
CVE-2024-34156,1,1,4ee5acde94d8bbc56dbdd2bde22f7f0d38dd09dd279009b64e363bf2a2a5d13c,2024-09-06T21:15:12.020000
CVE-2024-34158,1,1,b5aaa917cff7ef86bde2c94b409b7991426ecb9453d606928df88e2bb83fb707,2024-09-06T21:15:12.083000
CVE-2024-34155,0,0,16098580cbaff82b0c7090020256093dd240c2791e1babd972e5fb3d4ddc876e,2024-09-06T21:15:11.947000
CVE-2024-34156,0,0,4ee5acde94d8bbc56dbdd2bde22f7f0d38dd09dd279009b64e363bf2a2a5d13c,2024-09-06T21:15:12.020000
CVE-2024-34158,0,0,b5aaa917cff7ef86bde2c94b409b7991426ecb9453d606928df88e2bb83fb707,2024-09-06T21:15:12.083000
CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000
CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000
CVE-2024-34163,0,0,0359aa2bf9352c87fe65864c9b7813550ee369295a4e0ccc20c368017d1c80c6,2024-08-14T17:49:14.177000
@ -253462,7 +253462,7 @@ CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff1
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000
CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000
CVE-2024-35133,0,0,e6e600efbe6019a46042b8497356765bfde6faebef1427fb84fa89f43d45b975,2024-08-30T13:00:05.390000
CVE-2024-35133,0,1,94682ccdd5820af4bb9202a3fe7f8708ae8d6add58e631948e27e68678fff48d,2024-09-06T22:55:33.543000
CVE-2024-35136,0,0,3020783d3d271d3fdae4d9e8c7d963280063bef97bcec52f880461e4f52c833a,2024-08-23T19:08:06.993000
CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000
CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000
@ -255144,12 +255144,12 @@ CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd
CVE-2024-37485,0,0,a28d87feb836359698fd84c975d93a2c25e461c295a0332494f41ca668e6a305,2024-07-25T15:51:09.387000
CVE-2024-37486,0,0,cf55487adcabeafd4a4ef78235d46e39d7a0cbef985b2f1b50f1d6c8b1afa29e,2024-08-02T20:35:14.243000
CVE-2024-37487,0,0,326134cd41feff5ec6f404851524659a0bcd77d5c05096f40d7b132ca0985100,2024-08-30T21:19:20.460000
CVE-2024-37488,0,1,fad03ef288403ea21b704ba7e4e89b6d9c5a40fb2c82414d8c2526d0c9547477,2024-09-06T21:24:24.240000
CVE-2024-37489,0,1,7d67184809360fa706b40329dd6fff480ab2c0356505cffc07cc81b386b2f5df,2024-09-06T21:25:14.303000
CVE-2024-37488,0,0,fad03ef288403ea21b704ba7e4e89b6d9c5a40fb2c82414d8c2526d0c9547477,2024-09-06T21:24:24.240000
CVE-2024-37489,0,0,7d67184809360fa706b40329dd6fff480ab2c0356505cffc07cc81b386b2f5df,2024-09-06T21:25:14.303000
CVE-2024-3749,0,0,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000
CVE-2024-37492,0,0,f3971a670c66fc0fbc6bcf86ec5f1638cfe5a7702343a7218c60024704d58bab,2024-07-22T13:00:31.330000
CVE-2024-37494,0,0,bb1430912d6aa0321558ee1d9d4f0c8cb5896005bedfb50082e08532d4e67d5c,2024-08-02T20:32:21.170000
CVE-2024-37495,0,1,04aecffbaafcf85a77c5bcc572ea18dc4705b2313de79edcab2cafcd3fe72fda,2024-09-06T21:25:56.120000
CVE-2024-37495,0,0,04aecffbaafcf85a77c5bcc572ea18dc4705b2313de79edcab2cafcd3fe72fda,2024-09-06T21:25:56.120000
CVE-2024-37497,0,0,a5e078ff0e5f137ef0821d3799d044ca0d639a06d66db12953c2763c25fbc8d3,2024-07-09T18:19:14.047000
CVE-2024-37498,0,0,3906b98c498ae3be512e51b42c4fa048b310c8a030ff54a6e9ec3a0bdb0a209a,2024-07-11T13:05:54.930000
CVE-2024-37499,0,0,33077733cf962ec7124fd968ab822e83cb89a629fa94472ef274e5c155a1765b,2024-07-09T18:19:14.047000
@ -255163,13 +255163,13 @@ CVE-2024-37509,0,0,f9e93ade29c9918317e48d188ce4960d290a72c7e104c763985255a9648c8
CVE-2024-3751,0,0,ba887ac321a2bfaf7155c820936f84a156f9ef9329c91d46297abdea58a2350b,2024-08-01T13:56:40.890000
CVE-2024-37512,0,0,b154a0241cfb0d8ca130eab910ec84648220c774892017c20117684126ece261,2024-07-22T13:00:31.330000
CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000
CVE-2024-37514,0,1,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000
CVE-2024-37514,0,0,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000
CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000
CVE-2024-37519,0,1,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000
CVE-2024-37519,0,0,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000
CVE-2024-3752,0,0,239ab2a4fa8a03a6a793fd7bad6c5508294cfd1be75f4ce013e63852e68d9c42,2024-05-06T12:44:56.377000
CVE-2024-37520,0,0,1cad459c20e2d875630bdc07513eda15868aad6421fe450388baf16c360c4642,2024-08-29T18:39:02.407000
CVE-2024-37521,0,1,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000
CVE-2024-37522,0,1,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000
CVE-2024-37521,0,0,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000
CVE-2024-37522,0,0,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000
CVE-2024-37523,0,0,95e87c6e9b764d7f190ed1df123d3a1fe4f39f3cc605d9d4771329a8df3befb4,2024-08-30T20:24:32.837000
CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000
CVE-2024-37529,0,0,f9accff698127aa01ca28b864c7fa6ff8749b3c683fd8343d39e26a6d0d3d7fd,2024-08-23T18:55:48.257000
@ -255350,11 +255350,11 @@ CVE-2024-37894,0,0,5c3e1c011e44e5c8bcf6a6398118ad2efcba003a19994815d77c769e906a4
CVE-2024-37895,0,0,83fc999b914f31ef5377ea2f4739df1f86727e09c7234e6711ade849e83102e2,2024-06-20T12:44:22.977000
CVE-2024-37896,0,0,accc5cd71320f643f30fd3c58fb4ef952e3edd98e66520b2d1ebf95954392e5e,2024-06-20T12:44:22.977000
CVE-2024-37897,0,0,eb358c8b4bf1d804a542a3de3cc644f3b57f51c972b900353c845858b20c9acf,2024-06-21T11:22:01.687000
CVE-2024-37898,0,1,48ad19e1b9c6ab72c2a55d0111d8350370696bdef2f1e15844074d6b677b7bd6,2024-09-06T21:16:55.600000
CVE-2024-37898,0,0,48ad19e1b9c6ab72c2a55d0111d8350370696bdef2f1e15844074d6b677b7bd6,2024-09-06T21:16:55.600000
CVE-2024-37899,0,0,b15b2f0659684c15abe8d3b9fc90e954532acfe6178361a33640834566aa7b12,2024-06-21T11:22:01.687000
CVE-2024-3790,0,0,54ff85acf33b27347b60794a0d91a04db9e5fdd7b0bb2899aaf68ff18e5328b6,2024-05-14T16:11:39.510000
CVE-2024-37900,0,1,2fd5dd44fe4c1400ec72d3a6e323496bfc14e747150e8c52ec70fb9c5004f180,2024-09-06T21:06:34.223000
CVE-2024-37901,0,1,7ba4e42556021b302fdecc554777630628b083580b29d09ee281a6a95b82f20b,2024-09-06T20:54:20.857000
CVE-2024-37900,0,0,2fd5dd44fe4c1400ec72d3a6e323496bfc14e747150e8c52ec70fb9c5004f180,2024-09-06T21:06:34.223000
CVE-2024-37901,0,0,7ba4e42556021b302fdecc554777630628b083580b29d09ee281a6a95b82f20b,2024-09-06T20:54:20.857000
CVE-2024-37902,0,0,914ec46cc1273d7c21c7b2dab73f39d6c3f01e86944529e46279ac98efc57a11,2024-06-20T12:44:22.977000
CVE-2024-37903,0,0,886576036d4d085b682af52548aacb4c341112369e14bf61e8ca80c2c202d58c,2024-07-08T15:49:22.437000
CVE-2024-37904,0,0,4a1838bfa872e93babcec91edc2a58b1f777ff60512a3a43aa04f02c821270dc,2024-06-20T12:44:01.637000
@ -255711,11 +255711,11 @@ CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41
CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
CVE-2024-38428,0,0,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000
CVE-2024-38429,0,1,c10e8ced8854fd8685412c45d492895eff59703298cb77e7d0526108d5505667,2024-09-06T21:38:04.370000
CVE-2024-38429,0,0,c10e8ced8854fd8685412c45d492895eff59703298cb77e7d0526108d5505667,2024-09-06T21:38:04.370000
CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000
CVE-2024-38430,0,1,1a296d96b0261a37f7877ae5b1666dcd3db3faea9a2a0f9613e8491365987413,2024-09-06T21:39:15.287000
CVE-2024-38431,0,1,14b4403defebccfd4ffe89c9743c48305830cc6a4e2ac2bbc3e0ac4651e7fb53,2024-09-06T21:41:43.017000
CVE-2024-38432,0,1,a57fb5b473d87c3852d9d382c609d40f396cea8b1e958d16b82eaf9758ceff8b,2024-09-06T21:43:36.463000
CVE-2024-38430,0,0,1a296d96b0261a37f7877ae5b1666dcd3db3faea9a2a0f9613e8491365987413,2024-09-06T21:39:15.287000
CVE-2024-38431,0,0,14b4403defebccfd4ffe89c9743c48305830cc6a4e2ac2bbc3e0ac4651e7fb53,2024-09-06T21:41:43.017000
CVE-2024-38432,0,0,a57fb5b473d87c3852d9d382c609d40f396cea8b1e958d16b82eaf9758ceff8b,2024-09-06T21:43:36.463000
CVE-2024-38433,0,0,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000
CVE-2024-38434,0,0,4a8e238d88d3486572dfa29923d4eb1c064ff172ae0f1ad768133acfd895c782,2024-07-22T13:00:31.330000
CVE-2024-38435,0,0,f20d01d49eebbc5ac4d21ace173944062cbdc481675d02e13da68c525504eca1,2024-08-30T20:59:05.307000
@ -255925,7 +255925,7 @@ CVE-2024-3864,0,0,c7c600ab2d47995fde4727e677425dc294b0dc7019ce4f56ba3ea3d46f02c4
CVE-2024-38640,0,0,0a9cd90ebfbe37ad1e2182183348d7a0f69130cdae9c1211d208c9fcc20b6758,2024-09-06T17:15:16.443000
CVE-2024-38641,0,0,911194a65196a2372b31f65b46b0030ec8684f073af8b9dde60a51379b15a532,2024-09-06T17:15:16.550000
CVE-2024-38642,0,0,0bad981e037cb7c53782d01ba764ae7638d3436cd6e0adf410e8b18a9609bdb3,2024-09-06T17:15:16.677000
CVE-2024-3865,0,0,d6f5dd3766d85f1a043ebf5d3172442b73d2c19e5b446b7220941e0632bb3f23,2024-04-17T12:48:31.863000
CVE-2024-3865,0,1,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000
CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000
CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
@ -256455,11 +256455,11 @@ CVE-2024-39561,0,0,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbc
CVE-2024-39562,0,0,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000
CVE-2024-39565,0,0,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000
CVE-2024-39567,0,0,4a57ded9184af902b793d10964e38343dbe75d3e891132b111e62e60ba12ed7c,2024-07-09T18:19:14.047000
CVE-2024-39568,0,1,f8994573b47195905c9ccbf8be81e7fc1ac765b7d83d3cc49f6dd1813186217f,2024-09-06T21:26:14.400000
CVE-2024-39569,0,1,687e396635e4f2901591254e1b6191c3e6e1f055a04ea6bddeeda6b72621c623,2024-09-06T21:26:49.890000
CVE-2024-39568,0,0,f8994573b47195905c9ccbf8be81e7fc1ac765b7d83d3cc49f6dd1813186217f,2024-09-06T21:26:14.400000
CVE-2024-39569,0,0,687e396635e4f2901591254e1b6191c3e6e1f055a04ea6bddeeda6b72621c623,2024-09-06T21:26:49.890000
CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd78064902,2024-05-02T18:00:37.360000
CVE-2024-39570,0,1,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000
CVE-2024-39571,0,1,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000
CVE-2024-39570,0,0,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000
CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000
CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000
@ -257572,7 +257572,7 @@ CVE-2024-41815,0,0,ba208e21e1cc4072b07e7947a406e2fc77ed18be9dcff08d15af01e0491d3
CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000
CVE-2024-41817,0,0,c3e50103d6a8f469b4238c3f312796b0087815956d0c470348037696e81257f6,2024-07-29T16:21:52.517000
CVE-2024-41818,0,0,4db2007d5d263ef00adddd9e1d74cef5ae3a3c480a8569b96e9fc77a6bc18e63,2024-08-02T20:17:01.807000
CVE-2024-41819,0,1,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000
CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
CVE-2024-41820,0,0,66761f44932ba996701075032b581c0ebc2041a25ba2c4f14ccc68178ac408dd,2024-08-06T16:30:24.547000
CVE-2024-41824,0,0,566dbbd1161c5c39870de656941ff3b3b11969b1e888b31722918c2b50080cfa,2024-08-07T20:46:14.917000
@ -257662,7 +257662,7 @@ CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a6
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000
CVE-2024-41946,0,0,0c8984641c723ad5c183e5dd0f3ccca9c504d7530b3c6a092508aec5b06adaf1,2024-09-05T16:09:45.503000
CVE-2024-41947,0,1,0778bf62cfd1d78df175ba8432cda918a6d31369bf275494698802504a895693,2024-09-06T20:46:01.477000
CVE-2024-41947,0,0,0778bf62cfd1d78df175ba8432cda918a6d31369bf275494698802504a895693,2024-09-06T20:46:01.477000
CVE-2024-41948,0,0,95b8e7bd495b369e148a4aee32aaebfe7255dd0e1bf38771c2e96e2af8f6ed4e,2024-08-09T18:38:47.533000
CVE-2024-41949,0,0,ca775db8fe7ff2b3f65a9b7415410183458d660652f7e7a24514bfd892cb0821,2024-08-09T18:32:53.153000
CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000
@ -257680,7 +257680,7 @@ CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f1
CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000
CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000
CVE-2024-41962,0,0,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000
CVE-2024-41964,0,0,00845ae65bb3534784c9b8fbbb60096d7620e97ac61d54d3b5042120c50027b6,2024-08-30T13:00:05.390000
CVE-2024-41964,0,1,54621a6adee825c0636e7afd8773c219e1650b44db222dda2ec93364b11574bb,2024-09-06T22:56:18.010000
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
CVE-2024-41976,0,0,28d622db4b0702423d465fd5f760fc3d4baf285e2f7024720bdb5fee42ef0c33,2024-08-23T18:40:16.173000
@ -257698,8 +257698,8 @@ CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb
CVE-2024-42005,0,0,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000
CVE-2024-42006,0,0,cac16dcebbdfd7db60164c8c9c083b31913f86e474f6e93c1530c3119039cdca,2024-08-21T13:26:54.577000
CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000
CVE-2024-42008,0,1,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e2c4,2024-09-06T21:48:31.597000
CVE-2024-42009,0,1,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000
CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e2c4,2024-09-06T21:48:31.597000
CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
@ -258598,7 +258598,7 @@ CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696
CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000
CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000
CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000
CVE-2024-43700,0,0,fca232fae54c235f85f645739c5bbda87608d8ad0ce7d2e114cc15b4fe70f6e0,2024-08-29T20:36:51.570000
CVE-2024-43700,0,1,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000
CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988cf,2024-05-21T12:37:59.687000
CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000
@ -258628,7 +258628,7 @@ CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de
CVE-2024-43801,0,0,3057bc3523c59b7a2ce3a49766bca817655c19ea20647a6ae5a515942f4aa7c4,2024-09-03T12:59:02.453000
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
CVE-2024-43803,0,0,d39ec93af35560ca8e8a0de326d7fde6d56bf46a552a9709abae1dbb94d4c159,2024-09-03T19:40:46.783000
CVE-2024-43804,0,0,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000
CVE-2024-43804,0,1,dfcc6bb057a0133a6590fad8e3f17989c092b880dfeea4c7e4ce29f3c77ba4ff,2024-09-06T22:57:01.697000
CVE-2024-43805,0,0,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
@ -258841,9 +258841,9 @@ CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef
CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000
CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000
CVE-2024-44400,0,0,46cca54dff368c30e19e4d79a9e5fc6607a7b0ccd1e0fdcd2b02aab471f7abd6,2024-09-06T16:15:03.030000
CVE-2024-44401,0,1,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f41ae,2024-09-06T21:35:13.733000
CVE-2024-44402,0,1,b38946a6f0e5c6bfd13c5f46b6835ff57cc45dc65dbcc124685a3fc4210d5d2e,2024-09-06T21:35:15.770000
CVE-2024-44408,0,1,79e6da73dfd60da300e8d621dc4645956a3af34e4d3870aab752a63a7e02ecfa,2024-09-06T21:35:17.720000
CVE-2024-44401,0,0,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f41ae,2024-09-06T21:35:13.733000
CVE-2024-44402,0,0,b38946a6f0e5c6bfd13c5f46b6835ff57cc45dc65dbcc124685a3fc4210d5d2e,2024-09-06T21:35:15.770000
CVE-2024-44408,0,0,79e6da73dfd60da300e8d621dc4645956a3af34e4d3870aab752a63a7e02ecfa,2024-09-06T21:35:17.720000
CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
@ -258907,8 +258907,8 @@ CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe3
CVE-2024-44793,0,0,475809f13ca115bedace2b70621dd1b06c8befeab10468b4f5b0fa1c27241f87,2024-09-05T18:28:42.687000
CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239fc4,2024-09-05T18:28:09.247000
CVE-2024-44795,0,0,2459dd83721718e1502976fd61ac15b289981ba6005e92e7c41d33d2e6b740f8,2024-09-05T18:26:41.490000
CVE-2024-44796,0,0,ea2f83fd317230dba37a019c6df79333d03496931fcac69fc846f82ae10f3010,2024-08-27T13:02:05.683000
CVE-2024-44797,0,0,7bc801096aef27df0c5244f5a3c761f34dc19dd9fff98d1b382da189467f2dbf,2024-08-27T15:35:18.880000
CVE-2024-44796,0,1,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d3eb,2024-09-06T23:35:04.340000
CVE-2024-44797,0,1,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000
CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
@ -258921,9 +258921,11 @@ CVE-2024-44820,0,0,f15637d2ac032c543e5fcbbe9f5d1cb1b7c83c8e990be9337cf6d7655fcc3
CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000
CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000
CVE-2024-44837,0,0,253c4b98d471b14a46b3f3274bda3284d342567e55e989a3afe5e23485326395,2024-09-06T16:46:26.830000
CVE-2024-44838,1,1,2159668e53931421004ef7f63efc6eecd8f2ac02a40ae2dabff642d324a59a36,2024-09-06T22:15:02.147000
CVE-2024-44839,1,1,959d94abeeeaec1d019ee96b4425b53b7c7bad4a88fdd78dbb6e75a39d39b095,2024-09-06T22:15:02.210000
CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000
CVE-2024-44844,1,1,d5b523a8978a6ebedf01d85cd10b0ccea4097d23e938547b9d6c495c6f14e8c4,2024-09-06T21:15:12.160000
CVE-2024-44845,1,1,ff18ab52379dc0931d16896a3679392539e78d16852233be39538265b14e027f,2024-09-06T21:15:12.217000
CVE-2024-44844,0,0,d5b523a8978a6ebedf01d85cd10b0ccea4097d23e938547b9d6c495c6f14e8c4,2024-09-06T21:15:12.160000
CVE-2024-44845,0,0,ff18ab52379dc0931d16896a3679392539e78d16852233be39538265b14e027f,2024-09-06T21:15:12.217000
CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000
CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000
CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000
@ -258937,7 +258939,7 @@ CVE-2024-44914,0,0,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d4
CVE-2024-44915,0,0,599d20f62f376d9c9860ebd338604a632ba16d7b9219c3aadc9555ff97ab4b9e,2024-08-30T16:01:10.753000
CVE-2024-44916,0,0,268f2c861c0c259cfc6a8f5831922421cd3f20b464855cae3b767189bdeba765,2024-09-03T12:59:02.453000
CVE-2024-44918,0,0,3a0c5f40de5f64cdd7c350975f1e36ef79f8fc6234af40bbc8a6ef2e7aab0507,2024-09-03T12:59:02.453000
CVE-2024-44919,0,0,4ce1b96ddb0a7c15b96ca851eaf197d01501859f99507e5fc4c267c2fc748b54,2024-08-30T16:15:09.720000
CVE-2024-44919,0,1,ec1497e018c6f806f08d6bb2e463ee45aec94409b9fec3dcd0eb96daadbf42bc,2024-09-06T22:54:56.927000
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
CVE-2024-44920,0,0,12f1b6eb8fb8d99f08a0b224eeeb570d2ee08178391a3e25e8980965db9b7928,2024-09-04T14:59:58.250000
CVE-2024-44921,0,0,b581e2c2532137589de006c20122d6cbe14e56f4b907946bd0416f760b5174f5,2024-09-04T15:00:15.103000
@ -259049,9 +259051,9 @@ CVE-2024-45052,0,0,8b5354ce3732be9a4ec5c7e0d7652b2053216fa0d00ab80b71e08b5337152
CVE-2024-45053,0,0,f91ffa38b1f1473a6604647a2be1fa377450e287db4b7cdb71eb6f698ce9f726,2024-09-06T18:20:35.430000
CVE-2024-45054,0,0,b9a631b4140dc3b625193d3b302c7a5fbf5e7defa5c6f149bad3cc57b44dfb5d,2024-08-29T13:25:27.537000
CVE-2024-45056,0,0,691057e2a8bd235b7cec2ff9d1864de57863221b46b0db10be9809732ea41217,2024-09-03T15:14:54.877000
CVE-2024-45057,0,1,103b6de50ea8c78a895eccb4e8970b15e6d1e5c072b0541da4b181b9fbcee5a8,2024-09-06T20:15:04.443000
CVE-2024-45058,0,1,e14ae7cd8c630ee9558396031b963ae5f55888ff4a83970664d1742bc54c6950,2024-09-06T20:15:04.547000
CVE-2024-45059,0,1,bce3ec1c940acbe142fa600c9622c1e0772acc8cfb265273dae2266b40c101ce,2024-09-06T20:15:04.637000
CVE-2024-45057,0,0,103b6de50ea8c78a895eccb4e8970b15e6d1e5c072b0541da4b181b9fbcee5a8,2024-09-06T20:15:04.443000
CVE-2024-45058,0,0,e14ae7cd8c630ee9558396031b963ae5f55888ff4a83970664d1742bc54c6950,2024-09-06T20:15:04.547000
CVE-2024-45059,0,0,bce3ec1c940acbe142fa600c9622c1e0772acc8cfb265273dae2266b40c101ce,2024-09-06T20:15:04.637000
CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000
CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000
CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000
@ -259149,7 +259151,7 @@ CVE-2024-45312,0,0,3ab127ae457c159e255763a9cac499b257dedfb3025d06ab78788175895c2
CVE-2024-45313,0,0,7f2c32db2a1d116c11ba8b1d5ff95be26c7a6f4c5dba7ff892eb13c5baf4c8a1,2024-09-03T12:59:02.453000
CVE-2024-45314,0,0,b63eb7e37a749fb3c308d5e710eb140bbcfefc4e3df4519b3385c13ecabef564,2024-09-05T12:53:21.110000
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
CVE-2024-45321,0,0,fb18f1dc20e468dc3e9b1a9f0b38a9a704b0b668d302eb3f364e6f7d26aab3c7,2024-09-06T14:35:13.113000
CVE-2024-45321,0,1,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000
@ -259247,6 +259249,7 @@ CVE-2024-45751,0,0,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46
CVE-2024-45758,0,0,2ae57583ed5e6b6b71b00c8e123d728a65162c35712be784f078e8924fe4539a,2024-09-06T18:35:13.043000
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
CVE-2024-45771,1,1,0d2b8d62b7e1308dc88774abe963b85bc32e41e5383eb66497d67169d507de0c,2024-09-06T22:15:02.267000
CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000
CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac1782253,2024-05-14T15:44:07.607000
CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000
@ -259517,9 +259520,9 @@ CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
CVE-2024-4883,0,0,2ff7450efd44772325cada3b845290dfe574175b9b5b8d8937e9a22721054fd1,2024-06-26T12:44:29.693000
CVE-2024-4884,0,0,5b0f6d7b32ac809bc696cd47d1022d1d849f4d05ea4a666b656adcd11fde616b,2024-06-26T12:44:29.693000
CVE-2024-4885,0,0,5f57649506bc0f86a710ae8ff86e41b417f875a376c5869cfc82708c69a60b8f,2024-06-26T12:44:29.693000
CVE-2024-4883,0,1,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000
CVE-2024-4884,0,1,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000
CVE-2024-4885,0,1,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000
CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000
CVE-2024-4888,0,0,fec1e03b9425eafa3abf9c794b417e5dd9f4ec5c0ccb57ecd621528833d262c0,2024-06-07T14:56:05.647000
@ -259622,10 +259625,10 @@ CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf8751902072
CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000
CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000
CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24
CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19bae,2024-06-26T12:44:29.693000
CVE-2024-5009,0,0,e5007830320ec10d10aee0ad37c5a929e2247f2929e9cd3c875dca917cc302ee,2024-06-26T12:44:29.693000
CVE-2024-5010,0,0,af35128cc9db48220726dcddff7a65b4ed403a9dff49a9c43e67e875bed0adc1,2024-06-26T14:15:11.250000
CVE-2024-5011,0,0,3893ac733a665090571cbc9b1d86bf3eb7381b999fcc8d59c6d135913d8c6665,2024-06-26T14:15:11.350000
CVE-2024-5008,0,1,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000
CVE-2024-5009,0,1,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000
CVE-2024-5010,0,1,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000
CVE-2024-5011,0,1,4026c0ac2cac7aea5c94096b029296404a58ceafdfae2ce6d40eb650db37ee86,2024-09-06T22:41:46.253000
CVE-2024-5012,0,0,5697b5fa6ba20e1501d7704fc1f19cf57893d5f71753b80662113f567a057a81,2024-08-21T13:34:41.107000
CVE-2024-5013,0,0,2b6e46c5c558997322ab16e56ac5bd13f8f3890cf64227402cfe38f28e8502bf,2024-08-21T13:35:28.750000
CVE-2024-5014,0,0,a159cfb950f4667dfac650da1dbd95c7b0726154dc655b46619c19dd5e035fa0,2024-08-21T13:36:06.417000
@ -259740,7 +259743,7 @@ CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-5138,0,1,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000
CVE-2024-5143,0,0,e21a987518c06589a6da36e0d35257f005aa787fff502677dfeaefae4b228c17,2024-05-24T01:15:30.977000
@ -260465,7 +260468,7 @@ CVE-2024-5987,0,0,59ef1dd47c3a32e79663e3d46a9f8e7914697e67936dad31245855d212c4b5
CVE-2024-5988,0,0,6a93e103554a4b2cea7532bb149420b2c5e22d63c1fab23818b5950d94f50a5e,2024-06-25T18:50:42.040000
CVE-2024-5989,0,0,5b8da9d53fdfd0fd3971e8489f4ae4ce0e952b56f28f99337bb24ad669904afb,2024-06-25T18:50:42.040000
CVE-2024-5990,0,0,815ffdec6ed9055e0c29635260b790d8ae8601700cacf3380cde4c3f20ff7240,2024-06-25T18:50:42.040000
CVE-2024-5991,0,0,e082a26a3412cd6203ddcff1c59506086c1e6d36fa06530b6a36731be74810dd,2024-08-28T12:57:39.090000
CVE-2024-5991,0,1,fe91480125318e1887501309371643eaea8c60c621bd042cca787c9779dab434,2024-09-06T22:51:41.470000
CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000
CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000
CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000
@ -261086,7 +261089,7 @@ CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0c
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
CVE-2024-6788,0,0,55fb0d510962e755b83a0ccc2efad4312001b246df777a622c08f48560e29a88,2024-08-13T17:11:53.553000
CVE-2024-6789,0,0,231bd77c8db40b763ff18cdedd6d2a472872c681c24ea5a4e63b0563b010d2cc,2024-08-27T13:01:37.913000
CVE-2024-6789,0,1,ea44c6537868ea4b0c5464bf7cf774ec36644f14fa858df1a024d527f74ea7b8,2024-09-06T22:31:04.833000
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
CVE-2024-6792,0,0,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
@ -261614,8 +261617,8 @@ CVE-2024-7561,0,0,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9c
CVE-2024-7564,0,0,9647575e3fbd33f04dc9f7112e25f0abbbf3e6266c5fe28f9ec18868dfbd0106,2024-08-07T19:59:36.240000
CVE-2024-7567,0,0,8d84928fabcffd92f0ffc65ee27fdbbaa4428b293e351afb4071fd1cdbd8dfa6,2024-08-14T02:07:05.410000
CVE-2024-7568,0,0,d240e1c33af9e03c75feb4937b0ddf33906a854d9c30167cff3fa79482350e46,2024-08-26T12:47:20.187000
CVE-2024-7569,0,1,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000
CVE-2024-7570,0,1,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000
CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000
CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
@ -261631,7 +261634,7 @@ CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e496652
CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000
CVE-2024-7591,0,0,93e76a9c527669096be2abfdb6462a0311db24e202fd8d23d80d88ff40dd1ed7,2024-09-06T12:08:21.290000
CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000
CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000
CVE-2024-7593,0,1,4da85e7ccbdae09b92bad5968b875ba9d0537591e39a68c4cb01282a2ce99145,2024-09-06T22:13:21.197000
CVE-2024-7599,0,0,a956cdc05d3339353d73900769844a6746f6caba229f81de6c9855b66ed02e8f,2024-09-06T16:46:26.830000
CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000
CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000
@ -261675,7 +261678,7 @@ CVE-2024-7647,0,0,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1
CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000
CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000
CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000
CVE-2024-7652,0,1,00323b94c746cc0f49a6bcca986d645cd4d56dd1a84ab67f71ac3f07744c2c1f,2024-09-06T21:35:19.660000
CVE-2024-7652,0,0,00323b94c746cc0f49a6bcca986d645cd4d56dd1a84ab67f71ac3f07744c2c1f,2024-09-06T21:35:19.660000
CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000
CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000
CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000
@ -261719,7 +261722,7 @@ CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde
CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
CVE-2024-7717,0,0,7bb6c5f4c19977a1c62bcb7f56c31a10a8375a822d55bfe8140c9d2426ca6889,2024-09-03T12:59:02.453000
CVE-2024-7720,0,0,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000
CVE-2024-7720,0,1,71f1c1973f29e2c7c1373dd24daaa52398594a70072a570fc445a13cbea904ba,2024-09-06T22:33:30.767000
CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000
CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000
CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000
@ -261958,9 +261961,9 @@ CVE-2024-8155,0,0,fe38ccfd4767b6e01bc47bbf13a366f64470ea038445dcb6f48d6c1a6380c4
CVE-2024-8158,0,0,8ac397614ea8bcd3bd2bf49698f88ba96c85aeae3c3edb7c31f4b63e73c01d66,2024-08-26T12:47:20.187000
CVE-2024-8161,0,0,cd13a3f8a1d31274c9ab84b7ce8fd24ad13e50be7d970e595f1245741eba1677,2024-08-26T12:47:20.187000
CVE-2024-8162,0,0,2f15be70d7b9e402b643053e8cc2849077cf4472f134c84060c0898ffb295f28,2024-08-27T14:28:46.927000
CVE-2024-8163,0,0,2b33aa12e9b5396511ceeb0ddb5c09644e462e2419cefa1d9405e7869864efad,2024-08-26T15:15:23.727000
CVE-2024-8164,0,0,b4e3e587ad2686dce20b95e66c72594ce4762348dc65ff48827050c2ee56b3f9,2024-08-26T15:15:23.727000
CVE-2024-8165,0,0,f43afc9fcf1c1e78bc7ea9af37222216d3925e3673d7d3cab857085af5387f07,2024-08-26T15:15:23.727000
CVE-2024-8163,0,1,34076faaf51f1e489aa58346c56061ee9718b828b5ae0365e6c357cdf31c941d,2024-09-06T22:18:19.283000
CVE-2024-8164,0,1,f532add158f51f094ffe0f96bd30c0edbc06f69a220e37f850c6546174add3a7,2024-09-06T22:19:53.907000
CVE-2024-8165,0,1,30af74acf30a50149c9aea2035b59ab295b6f97042636173e519627288075fcf,2024-09-06T22:20:41.553000
CVE-2024-8166,0,0,f12f4299a569f15901062ca88855adc385daab485a9c5a1ac8234fa6d74f6eec,2024-08-27T13:03:38.227000
CVE-2024-8167,0,0,e1d76d41e7f83c83df1202942336f7e4e5679c0385cffbe5279207329dff3a19,2024-08-26T18:45:44.287000
CVE-2024-8168,0,0,9955e844b80349a9eb3954506e8959a22faf2c7afd6ad4972803d0a2ade5036e,2024-08-26T18:45:02.637000
@ -262010,7 +262013,7 @@ CVE-2024-8235,0,0,d5aa509f85958c98e1ad9dcfec5d574bff6f5e3781d6d0bbdba4997de15951
CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
CVE-2024-8255,0,0,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000
CVE-2024-8255,0,1,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000
CVE-2024-8260,0,0,80de48284b9b1f60542ccd162f62ac34372df44b6034ef82705622d907f32295,2024-09-03T12:59:02.453000
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
CVE-2024-8276,0,0,6d091b531458424cc4635f6e051f410dabbe91d1101fd761130b66815a93f34d,2024-09-03T12:59:02.453000
@ -262089,6 +262092,7 @@ CVE-2024-8417,0,0,a9619e26c595954087d9c9b458e78703071fbd5bf87ff4a22ec6d8ecc7076f
CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000
CVE-2024-8427,0,0,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000
CVE-2024-8428,0,0,32f99662d2ff0a82eac2c387b5879cdce3b74766786e4d561b16e1b245df448a,2024-09-06T16:46:26.830000
CVE-2024-8439,1,1,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000
CVE-2024-8445,0,0,11be885f11a2f2b8a202932b0e16edeb442a7212afe3a0c8e195900656f3fddf,2024-09-05T17:44:56.007000
CVE-2024-8460,0,0,21c8cc38664ba19f902747cfc2492ea27c718e3ca35401645ae4d1c6ff7413b5,2024-09-06T16:30:54.027000
CVE-2024-8461,0,0,e49804a708251a77ac276dc2c87288b6f990bf8f9a9704c388f55d96a1de96d3,2024-09-05T17:45:07.877000

Can't render this file because it is too large.