diff --git a/CVE-2018/CVE-2018-163xx/CVE-2018-16310.json b/CVE-2018/CVE-2018-163xx/CVE-2018-16310.json index 9065bfcc8c1..02a3f7878b7 100644 --- a/CVE-2018/CVE-2018-163xx/CVE-2018-16310.json +++ b/CVE-2018/CVE-2018-163xx/CVE-2018-16310.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16310", "sourceIdentifier": "cve@mitre.org", "published": "2018-09-06T23:29:01.350", - "lastModified": "2024-08-05T11:15:27.340", + "lastModified": "2024-08-27T21:35:00.747", "vulnStatus": "Modified", "cveTags": [ { @@ -23,28 +23,6 @@ } ], "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 4.9, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.2, - "impactScore": 3.6 - } - ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2022/CVE-2022-399xx/CVE-2022-39996.json b/CVE-2022/CVE-2022-399xx/CVE-2022-39996.json index 1155d0980ce..def0416c2b5 100644 --- a/CVE-2022/CVE-2022-399xx/CVE-2022-39996.json +++ b/CVE-2022/CVE-2022-399xx/CVE-2022-39996.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39996", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T18:15:13.197", - "lastModified": "2024-08-27T19:35:01.613", + "lastModified": "2024-08-27T21:35:01.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -18,8 +18,8 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", @@ -27,10 +27,10 @@ "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 5.4, + "baseScore": 4.8, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.3, + "exploitabilityScore": 1.7, "impactScore": 2.7 } ] diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41506.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41506.json index ac1b067f607..3f88f02a00e 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41506.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41506.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41506", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T02:15:06.267", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-27T20:35:01.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Actualizar/Editar imagen de perfil del estudiante de Student Enrollment In PHP v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2023-41506/blob/main/CVE-23", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42954.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42954.json index 3838ff06aac..93e057ad370 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42954.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42954.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42954", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-21T23:15:09.517", - "lastModified": "2024-03-22T12:45:36.130", + "lastModified": "2024-08-27T20:35:05.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Exist\u00eda un problema de escalada de privilegios en FileMaker Server, que potencialmente expon\u00eda informaci\u00f3n confidencial a sitios web front-end al iniciar sesi\u00f3n en la Consola de administraci\u00f3n con una funci\u00f3n de administrador. Este problema se solucion\u00f3 en FileMaker Server 20.3.1 reduciendo la informaci\u00f3n enviada en las solicitudes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], "references": [ { "url": "https://support.claris.com/s/answerview?anum=000041424&language=en_US", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json index ca5fa013ff9..cf386e83383 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47132", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T23:15:09.877", - "lastModified": "2024-02-15T17:07:31.827", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T21:35:02.060", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50967.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50967.json index 5f420d86576..357b49a3a09 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50967.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50967.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50967", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T16:15:07.570", - "lastModified": "2024-04-19T23:15:09.330", + "lastModified": "2024-08-27T21:35:03.017", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Latchset jose hasta la versi\u00f3n 11 permite a los atacantes provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de un valor grande de p2c (tambi\u00e9n conocido como PBES2 Count)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/P3ngu1nW/CVE_Request/blob/main/latch-jose.md", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50969.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50969.json index 34016bc484b..87cba482607 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50969.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50969.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50969", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T23:15:46.137", - "lastModified": "2024-03-29T12:45:02.937", + "lastModified": "2024-08-27T20:35:06.427", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Thales Imperva SecureSphere WAF 14.7.0.40 permite a atacantes remotos eludir las reglas WAF mediante una solicitud POST manipulada, una vulnerabilidad diferente a CVE-2021-45468." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://docs.imperva.com/bundle/v14.7-waf-administration-guide/page/9282.htm", diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51015.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51015.json index b9adaad3441..90d317099fb 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51015.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51015.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51015", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-22T19:15:09.450", - "lastModified": "2023-12-27T21:10:05.557", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T20:35:06.640", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51026.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51026.json index aeccbe13fd2..de46025a60b 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51026.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51026.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51026", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-22T18:15:07.907", - "lastModified": "2023-12-27T21:10:48.950", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T21:35:04.070", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51786.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51786.json index 4fbdb95c1b4..fa471a9fb9f 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51786.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51786.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51786", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T01:15:52.180", - "lastModified": "2024-05-01T18:15:11.990", + "lastModified": "2024-08-27T21:35:04.790", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en las versiones 2.13.x, 2.14.x y 2.15.x anteriores a la 2.15.4 de Lustre que permite a los atacantes escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del control de acceso incorrecto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "http://lists.lustre.org/pipermail/lustre-announce-lustre.org/2024/000270.html", diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json index f11941e2ffc..f96a25642ec 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52160", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T17:15:08.263", - "lastModified": "2024-03-10T04:15:06.897", + "lastModified": "2024-08-27T20:35:07.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7203.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7203.json index 23e76c1246b..9b9893639d6 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7203.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7203.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7203", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-27T09:15:37.450", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-27T21:35:05.583", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Smart Forms de WordPress anterior a 2.6.87 no tiene autorizaci\u00f3n en varias acciones AJAX, lo que podr\u00eda permitir a usuarios con un rol tan bajo como suscriptor llamarlos y realizar acciones no autorizadas, como eliminar entradas. El complemento tambi\u00e9n carece de comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF, como eliminar entradas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/b514b631-c3e3-4793-ab5d-35ed0c38b011/", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1333.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1333.json index cf257c67b61..73cdfbeb6b9 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1333.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1333.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1333", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-18T16:15:07.170", - "lastModified": "2024-03-18T19:40:00.173", + "lastModified": "2024-08-27T21:35:07.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Responsive Pricing Table de WordPress anterior a 5.1.11 no valida ni escapa algunas de sus opciones de la tabla de precios antes de mostrarlas nuevamente en una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode relacionado, lo que podr\u00eda permitir a los usuarios con el rol de autor y superior realizar ataque de Cross-Site Scripting Almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/30546402-03b8-4e18-ad7e-04a6b556ffd7/", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1939.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1939.json index 3ae137b7d5d..68f9c1cf928 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1939.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1939.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1939", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-29T01:43:57.640", - "lastModified": "2024-03-07T23:15:07.250", + "lastModified": "2024-08-27T21:35:07.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Type Confusion en V8 en Google Chrome anterior a 122.0.6261.94 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_27.html", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20018.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20018.json index 6bdb1bcf88d..3d321cc862e 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20018.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20018.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20018", "sourceIdentifier": "security@mediatek.com", "published": "2024-03-04T03:15:07.017", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-08-27T21:35:08.523", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el controlador WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00348479; ID del problema: MSV-1019." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/March-2024", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22857.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22857.json index 6468694af14..c77f92d0f98 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22857.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22857.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22857", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T01:15:52.640", - "lastModified": "2024-04-19T01:15:06.297", + "lastModified": "2024-08-27T20:35:09.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "zlog 1.2.16 tiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la estructura zlog_rule_s mientras crea una nueva regla que ya est\u00e1 definida en el archivo de configuraci\u00f3n proporcionado. Un usuario normal puede lograr la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/HardySimpson/zlog/", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23052.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23052.json index 064b7d720da..bc711263569 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23052.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23052.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23052", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:07.820", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-27T20:35:10.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en WuKongOpenSource WukongCRM v.72crm_9.0.1_20191202 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n parseObject() en el componente fastjson." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/WukongCRM_9.0.md#1remote-code-execution-vulnerability", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23285.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23285.json index 11d6ee3f125..e125934ef6e 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23285.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23285.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23285", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.930", - "lastModified": "2024-03-13T21:15:58.280", + "lastModified": "2024-08-27T21:35:09.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 mejorando el manejo de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda crear enlaces simb\u00f3licos a regiones protegidas del disco." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23727.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23727.json index 5fb0e6c04e3..5eda60e6610 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23727.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23727.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23727", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T21:16:01.413", - "lastModified": "2024-03-29T12:45:02.937", + "lastModified": "2024-08-27T20:35:12.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n YI Smart Kami Vision com.kamivision.yismart hasta 1.0.0_20231219 para Android permite a un atacante remoto ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s de una intenci\u00f3n impl\u00edcita en el componente com.ants360.yicamera.activity.WebViewActivity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/yi/blob/main/com.kamivision.yismart.V1.0.0_20231219.md", diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24042.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24042.json index 1065be269cf..2597703a099 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24042.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24042.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24042", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T07:15:09.097", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-27T21:35:10.387", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed", diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24278.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24278.json index d344a8e8120..d523355f2c5 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24278.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24278.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24278", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T23:15:07.633", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-08-27T21:35:11.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el cliente de escritorio Teamwire Windows v.2.0.1 a v.2.4.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipula para la funci\u00f3n de mensaje." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25250.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25250.json index cf7fce16168..afeb1d86bda 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25250.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25250.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25250", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:15:58.943", - "lastModified": "2024-03-14T12:52:16.723", + "lastModified": "2024-08-27T20:35:13.350", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en code-projects Agro-School Management System 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la p\u00e1gina de inicio de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-25250./blob/main/CVE-38", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25398.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25398.json index 4d6c3cc87e0..b1b7381850d 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25398.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25398.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25398", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T16:15:46.427", - "lastModified": "2024-02-28T14:07:00.563", + "lastModified": "2024-08-27T21:35:12.350", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Srelay (el proxy y retransmisi\u00f3n SOCKS) v.0.4.8p3, un payload de red especialmente manipulado puede desencadenar una condici\u00f3n de denegaci\u00f3n de servicio e interrumpir el servicio. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/Nivedita-22/SRELAY-exploit-writeup/blob/main/Srelay.md", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25501.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25501.json index 3018d5ae9aa..7b99d7f8f41 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25501.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25501.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25501", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-09T08:15:05.973", - "lastModified": "2024-03-11T01:32:29.610", + "lastModified": "2024-08-27T20:35:14.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema con WinMail v.7.1 y v.5.1 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro de correo electr\u00f3nico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://gist.github.com/Drun1baby/8270239bed2952dbd99cc8d4262728e8", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25845.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25845.json index 8b67720eb3e..1f02cc9e448 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25845.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25845.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25845", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-08T02:15:50.477", - "lastModified": "2024-03-08T14:02:57.420", + "lastModified": "2024-08-27T20:35:14.373", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"CD Custom Fields 4 Orders\" (cdcustomfields4orders) <= 1.0.0 de Cleanpresta.com para PrestaShop, un invitado puede realizar inyecci\u00f3n SQL en las versiones afectadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/03/05/cdcustomfields4orders.html", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25868.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25868.json index c43a6818c4c..da0a72d330d 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25868.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25868.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25868", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T22:15:26.657", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-27T20:35:15.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en CodeAstro Membership Management System en PHP v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro memberType en el componente add_type.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Stored_XSS_Add_Type.md", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25986.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25986.json index 915ce093e93..4686974271d 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25986.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25986.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25986", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:47.560", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-27T21:35:13.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En ppmp_unprotect_buf de drm_fw.c, existe un posible compromiso de la memoria protegida debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda llevar a una escalada local de privilegios a TEE sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26333.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26333.json index de55ada0a70..6aa3825667e 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26333.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26333.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26333", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T08:15:39.500", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-27T20:35:16.533", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que swftools v0.9.2 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n a trav\u00e9s de la funci\u00f3n free_lines en swftools/lib/modules/swfshape.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://github.com/matthiaskramm/swftools/issues/219", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26471.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26471.json index a9d66e22669..6ab65e66c31 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26471.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26471.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26471", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:18.963", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-27T20:35:17.533", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad reflejada de Cross-Site Scripting (XSS) en zhimengzhe iBarn v1.5 permite a los atacantes inyectar JavaScript malicioso en el navegador web de una v\u00edctima a trav\u00e9s del par\u00e1metro de b\u00fasqueda en offer.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26471", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26521.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26521.json index a03e55fea26..f9472bb5d94 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26521.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26521.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26521", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T05:15:47.653", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-27T21:35:14.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n HTML en CE Phoenix v1.0.8.20 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el componente english.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/capture0x/Phoenix", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27206.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27206.json index 628703a4fbf..52e5fb18951 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27206.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27206.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27206", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:48.020", - "lastModified": "2024-03-15T20:15:08.743", + "lastModified": "2024-08-27T21:35:15.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En tbd de tbd, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27221.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27221.json index 5c3dab0300f..91aec2788ca 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27221.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27221.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27221", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:48.513", - "lastModified": "2024-03-15T20:15:09.050", + "lastModified": "2024-08-27T21:35:16.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En update_policy_data de TBD, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27561.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27561.json index febaad5b0d0..636f86c21af 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27561.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27561.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27561", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T17:15:06.887", - "lastModified": "2024-03-05T18:50:18.333", + "lastModified": "2024-08-27T20:35:18.613", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Server-Side Request Forgery (SSRF) en la funci\u00f3n installUpdateThemePluginAction de WonderCMS v3.1.3 permite a los atacantes forzar a la aplicaci\u00f3n a realizar solicitudes arbitrarias mediante la inyecci\u00f3n de URL manipuladas en el par\u00e1metro installThemePlugin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27718.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27718.json index 56c4a397575..5c1cb36d690 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27718.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27718.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27718", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.507", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-27T20:35:19.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Baizhuo Network Smart s200 Management Platform v.S200 permite a un atacante local obtener informaci\u00f3n confidencial y escalar privilegios a trav\u00e9s del componente /importexport.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/tldjgggg/cve/blob/main/sql.md", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27757.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27757.json index 6ca90c5aaa4..dc6a2339869 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27757.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27757.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27757", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T04:15:09.667", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-08-27T21:35:16.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Flusity CMS hasta 2.45 permite herramientas/addons_model.php Nombre de galer\u00eda XSS. El reportero indica que este producto \u201cces\u00f3 su desarrollo a partir de febrero de 2024\u201d." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/jubilianite/flusity-CMS/security/advisories/GHSA-5843-5m74-7fqh", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28012.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28012.json index d44f2af35e2..3c185fabb36 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28012.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28012.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28012", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2024-03-28T01:15:47.620", - "lastModified": "2024-04-02T06:15:15.263", + "lastModified": "2024-08-27T20:35:21.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF8 00HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP , WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR41 00N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S , WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN y MR02LN, todas las versiones permiten a un atacante ejecutar un comando arbitrario con privilegios de root a trav\u00e9s de Internet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt-info@cyber.jp.nec.com", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28159.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28159.json index acbbed9b753..41d1101c143 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28159.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28159.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28159", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.987", - "lastModified": "2024-05-01T18:15:17.100", + "lastModified": "2024-08-27T20:35:21.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una verificaci\u00f3n de permiso faltante en el complemento Jenkins Subversion Partial Release Manager 1.0.1 y versiones anteriores permite a atacantes con permiso de elemento/lectura activar una compilaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28287.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28287.json index 4bd47c137a5..8579d5c6a14 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28287.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28287.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28287", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T17:15:46.550", - "lastModified": "2024-04-02T18:12:16.283", + "lastModified": "2024-08-27T20:35:23.683", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una redirecci\u00f3n abierta basada en DOM en el par\u00e1metro returnUrl de INSTINCT UI Web Client 6.5.0 permite a los atacantes redirigir a los usuarios a sitios maliciosos a trav\u00e9s de una URL manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40rajput.thakur/dom-based-malicious-redirection-cve-2024-28287-304ac8e7f992", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28353.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28353.json index 441ba39f67d..25c3589d91d 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28353.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28353.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28353", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T08:15:06.393", - "lastModified": "2024-03-15T12:53:06.423", + "lastModified": "2024-08-27T20:35:25.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el router TRENDnet TEW-827DRU con la versi\u00f3n de firmware 2.10B01. Un atacante puede inyectar comandos en los par\u00e1metros de solicitud posterior usapps.config.smb_admin_name en la interfaz apply.cgi, obteniendo as\u00ed privilegios de root en el shell." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://warp-desk-89d.notion.site/TEW-827DRU-5c40fb20572148f0b00f329d69273791", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28392.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28392.json index fd99883b333..e18470b0416 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28392.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28392.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28392", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T14:15:08.523", - "lastModified": "2024-03-20T17:18:26.603", + "lastModified": "2024-08-27T21:35:17.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SQL injection vulnerability in pscartabandonmentpro v.2.0.11 and before allows a remote attacker to escalate privileges via the pscartabandonmentproFrontCAPUnsubscribeJobModuleFrontController::setEmailVisualized() method." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/en/remarketing-shopping-cart-abandonment/16535-abandoned-cart-reminder-pro.html", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28393.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28393.json index 8ecd163b819..07240c6d701 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28393.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28393.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28393", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T14:15:09.663", - "lastModified": "2024-03-25T16:43:06.137", + "lastModified": "2024-08-27T20:35:26.183", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Scalapay v.1.2.41 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s del m\u00e9todo ScalapayReturnModuleFrontController::postProcess()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/fr/paiement-en-plusieurs-fois/87023-scalapay-payez-en-3-fois-sans-frais.html", diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28423.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28423.json index e32734395b0..ca4aeb65278 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28423.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28423.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28423", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T19:15:50.877", - "lastModified": "2024-03-14T20:11:36.180", + "lastModified": "2024-08-27T21:35:18.580", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Airflow-Diagrams v2.1.0 conten\u00eda una vulnerabilidad de carga de archivos arbitraria en la funci\u00f3n unsafe_load en cli.py. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo YML manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/bayuncao/vul-cve-15", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28713.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28713.json index 68ed95a39c3..72e96eb2900 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28713.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28713.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28713", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T19:15:48.630", - "lastModified": "2024-03-28T20:53:20.813", + "lastModified": "2024-08-27T20:35:27.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Mblog Blog system v.3.5.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado en la funci\u00f3n de administraci\u00f3n de temas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "http://mblog.com", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29009.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29009.json index 19751f2ec52..9ed74c593ef 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29009.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29009.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29009", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-25T05:15:50.913", - "lastModified": "2024-08-02T01:15:54.740", + "lastModified": "2024-08-27T21:35:19.367", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en easy-popup-show todas las versiones permite a un atacante remoto no autenticado secuestrar la autenticaci\u00f3n del administrador y realizar operaciones no deseadas si el administrador ve una p\u00e1gina maliciosa mientras est\u00e1 conectado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN86206017/", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json index bcd6141a76f..d1050963508 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29273", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T04:15:11.857", - "lastModified": "2024-03-22T12:45:36.130", + "lastModified": "2024-08-27T21:35:20.250", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Hay cross-site scripting almacenadas (XSS) en dzzoffice 2.02.1 SC UTF8 en el archivo de carga en index.php, con el payload XSS en un documento SVG." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/zyx0814/dzzoffice/issues/244", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29413.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29413.json index d0b7c7551b2..cf592faaec0 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29413.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29413.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29413", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T22:15:07.237", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-08-27T20:35:28.013", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en Webasyst v.2.9.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del campo de mensajer\u00eda instant\u00e1nea en la funci\u00f3n de informaci\u00f3n de contacto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2024-29413", diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29504.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29504.json index c16007c242a..e14619c2072 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29504.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29504.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29504", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T22:15:07.287", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-27T20:35:28.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Summernote v.0.8.18 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro codeview." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/phoenix118go/a9192281efcfa518daa709ab7638712b", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30587.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30587.json index a8de3af719c..8fdd676c161 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30587.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30587.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30587", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.183", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-27T20:35:30.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro URL de la funci\u00f3n saveParentControlInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_urls.md", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30596.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30596.json index d3e63aaf50b..da3078a6f2d 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30596.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30596.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30596", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T13:15:48.063", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-27T21:35:21.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro deviceId de la funci\u00f3n formSetDeviceName." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_deviceId.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30604.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30604.json index e02a969106e..90997bf68f0 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30604.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30604.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30604", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T15:15:46.850", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-27T20:35:30.857", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro list1 de la funci\u00f3n fromDhcpListClient." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33854.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33854.json index 84b59a905a5..3365bb5fe16 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33854.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33854.json @@ -2,16 +2,55 @@ "id": "CVE-2024-33854", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T17:15:06.690", - "lastModified": "2024-08-23T18:46:51.787", + "lastModified": "2024-08-27T20:35:31.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability exists in the Graph Template component in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en el componente Graph Template en Centreon Web 24.04.x anterior a 24.04.3, 23.10.x anterior a 23.10.13, 23.04.x anterior a 23.04.19 y 22.10.x anterior a 22.10.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/centreon/centreon/releases", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36534.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36534.json index 1852523b747..7cdf88c8c52 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36534.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36534.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36534", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:03.967", - "lastModified": "2024-07-25T12:36:39.947", + "lastModified": "2024-08-27T20:35:32.427", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los permisos inseguros en hwameistor v0.14.3 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/0de688e6b874e480ddc1154350368450", diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38545.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38545.json index 6bbf94c0c6a..ee6486244fe 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38545.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38545.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38545", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:14.787", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T20:03:02.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/hns: corrige UAF para el evento cq async El recuento de CQ no est\u00e1 protegido por bloqueos. Cuando los eventos asincr\u00f3nicos de CQ y la destrucci\u00f3n de CQ son simult\u00e1neos, es posible que se haya liberado CQ, lo que provocar\u00e1 UAF. Utilice xa_lock() para proteger el recuento de CQ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "558DCAFD-41BB-42C2-AC56-6875391DF830" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38546.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38546.json index fd2e5d9e956..582d4bb47a3 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38546.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38546.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38546", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:14.877", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T20:03:18.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm: vc4: corrige posible desreferencia del puntero nulo En vc4_hdmi_audio_init() of_get_address() puede devolver NULL, que luego se desreferencia. Corrija este error agregando una verificaci\u00f3n NULL. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "58594503-2699-4CEB-8D05-6DFB3484E37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2a345fe928c21de6f3c3c7230ff509d715153a31", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d9adecc88ab678785b581ab021f039372c324cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/42c22b63056cea259d5313bf138a834840af85a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6cf1874aec42058a5ad621a23b5b2f248def0e96", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80431ea3634efb47a3004305d76486db9dd8ed49", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd7827d46d403f8cdb43d16744cb1114e4726b21", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c534b63bede6cb987c2946ed4d0b0013a52c5ba7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42789.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42789.json index a48e6aa2adc..828f203513a 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42789.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42789.json @@ -2,16 +2,55 @@ "id": "CVE-2024-42789", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T15:15:08.543", - "lastModified": "2024-08-26T15:15:23.727", + "lastModified": "2024-08-27T20:35:34.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/music/controller.php?page=test\" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via the \"page\" parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Reflejado en \"/music/controller.php?page=test\" en Kashipara Music Management System v1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro \"p\u00e1gina\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Reflected%20XSS%20-%20Controller.pdf", diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45038.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45038.json new file mode 100644 index 00000000000..3cd5325c034 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45038.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45038", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-27T21:15:07.380", + "lastModified": "2024-08-27T21:15:07.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Meshtastic device firmware is a firmware for meshtastic devices to run an open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices. Meshtastic device firmware is subject to a denial of serivce vulnerability in MQTT handling, fixed in version 2.4.1 of the Meshtastic firmware and on the Meshtastic public MQTT Broker. It's strongly suggested that all users of Meshtastic, particularly those that connect to a privately hosted MQTT server, update to this or a more recent stable version right away. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/meshtastic/firmware/security/advisories/GHSA-3x3r-vw9f-pxq5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45049.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45049.json new file mode 100644 index 00000000000..45a58d39f9b --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45049.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-45049", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-27T21:15:07.603", + "lastModified": "2024-08-27T21:15:07.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hydra is a Continuous Integration service for Nix based projects. It is possible to trigger evaluations in Hydra without any authentication. Depending on the size of evaluations, this can impact the availability of systems. The problem can be fixed by applying https://github.com/NixOS/hydra/commit/f73043378907c2c7e44f633ad764c8bdd1c947d5 to any Hydra package. Users are advised to upgrade. Users unable to upgrade should deny the `/api/push` route in a reverse proxy. This also breaks the \"Evaluate jobset\" button in the frontend." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NixOS/hydra/commit/f73043378907c2c7e44f633ad764c8bdd1c947d5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NixOS/hydra/security/advisories/GHSA-xv29-v93r-2f5v", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NixOS/nixpkgs/pull/337766", + "source": "security-advisories@github.com" + }, + { + "url": "https://mastodon.delroth.net/@delroth/113029832631860419", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5814.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5814.json index 9f26f8c4cd8..d6ee4187440 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5814.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5814.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5814", "sourceIdentifier": "facts@wolfssl.com", "published": "2024-08-27T19:15:17.980", - "lastModified": "2024-08-27T19:15:17.980", + "lastModified": "2024-08-27T20:35:37.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -57,6 +57,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#add_later", diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8212.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8212.json new file mode 100644 index 00000000000..34eda48a9da --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8212.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2024-8212", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T20:15:09.110", + "lastModified": "2024-08-27T20:15:09.110", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been rated as critical. This issue affects the function cgi_FMT_R12R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_2nd_DiskMGR.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275921", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275921", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.397276", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8213.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8213.json new file mode 100644 index 00000000000..96dc9c9df47 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8213.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2024-8213", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T20:15:09.423", + "lastModified": "2024-08-27T20:15:09.423", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_FMT_R12R5_1st_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_1st_DiskMGR.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275922", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275922", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.397277", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8214.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8214.json new file mode 100644 index 00000000000..19d6648cd48 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8214.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2024-8214", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T20:15:09.703", + "lastModified": "2024-08-27T20:15:09.703", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected by this vulnerability is the function cgi_FMT_Std2R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275923", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275923", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.397278", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8216.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8216.json new file mode 100644 index 00000000000..5efd4646adf --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8216.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-8216", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T21:15:07.830", + "lastModified": "2024-08-27T21:15:07.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file editPayment.php of the component Payment Handler. The manipulation of the argument recipt_no leads to improper access controls. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.275924", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275924", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.393532", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8217.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8217.json new file mode 100644 index 00000000000..9b715a1434c --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8217.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-8217", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T21:15:08.093", + "lastModified": "2024-08-27T21:15:08.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester E-Commerce Website 1.0 and classified as critical. This vulnerability affects unknown code of the file /Admin/registration.php. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Online-Art-Gallary-Management-System-onlinadvisory-sqli.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275926", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275926", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.398157", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8218.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8218.json new file mode 100644 index 00000000000..f5c60b30246 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8218.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-8218", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T21:15:08.350", + "lastModified": "2024-08-27T21:15:08.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Online Quiz Site 1.0 and classified as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument loginid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/t4rrega/cve/issues/7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275927", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275927", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.398204", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 066345077fa..12d7a979df2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-27T20:00:17.835238+00:00 +2024-08-27T22:00:17.482108+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-27T19:57:48.560000+00:00 +2024-08-27T21:35:21.827000+00:00 ``` ### Last Data Feed Release @@ -33,60 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261319 +261327 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` - -- [CVE-2022-39996](CVE-2022/CVE-2022-399xx/CVE-2022-39996.json) (`2024-08-27T18:15:13.197`) -- [CVE-2022-39997](CVE-2022/CVE-2022-399xx/CVE-2022-39997.json) (`2024-08-27T19:15:15.953`) -- [CVE-2024-1544](CVE-2024/CVE-2024-15xx/CVE-2024-1544.json) (`2024-08-27T19:15:16.547`) -- [CVE-2024-36068](CVE-2024/CVE-2024-360xx/CVE-2024-36068.json) (`2024-08-27T18:15:14.427`) -- [CVE-2024-42851](CVE-2024/CVE-2024-428xx/CVE-2024-42851.json) (`2024-08-27T18:15:14.993`) -- [CVE-2024-43414](CVE-2024/CVE-2024-434xx/CVE-2024-43414.json) (`2024-08-27T18:15:15.083`) -- [CVE-2024-43783](CVE-2024/CVE-2024-437xx/CVE-2024-43783.json) (`2024-08-27T18:15:15.403`) -- [CVE-2024-45037](CVE-2024/CVE-2024-450xx/CVE-2024-45037.json) (`2024-08-27T19:15:17.583`) -- [CVE-2024-5288](CVE-2024/CVE-2024-52xx/CVE-2024-5288.json) (`2024-08-27T19:15:17.797`) -- [CVE-2024-5814](CVE-2024/CVE-2024-58xx/CVE-2024-5814.json) (`2024-08-27T19:15:17.980`) -- [CVE-2024-5991](CVE-2024/CVE-2024-59xx/CVE-2024-5991.json) (`2024-08-27T19:15:18.080`) -- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-08-27T18:15:15.840`) -- [CVE-2024-8208](CVE-2024/CVE-2024-82xx/CVE-2024-8208.json) (`2024-08-27T18:15:15.950`) -- [CVE-2024-8209](CVE-2024/CVE-2024-82xx/CVE-2024-8209.json) (`2024-08-27T18:15:16.617`) -- [CVE-2024-8210](CVE-2024/CVE-2024-82xx/CVE-2024-8210.json) (`2024-08-27T19:15:18.250`) -- [CVE-2024-8211](CVE-2024/CVE-2024-82xx/CVE-2024-8211.json) (`2024-08-27T19:15:18.553`) +Recently added CVEs: `8` + +- [CVE-2024-45038](CVE-2024/CVE-2024-450xx/CVE-2024-45038.json) (`2024-08-27T21:15:07.380`) +- [CVE-2024-45049](CVE-2024/CVE-2024-450xx/CVE-2024-45049.json) (`2024-08-27T21:15:07.603`) +- [CVE-2024-8212](CVE-2024/CVE-2024-82xx/CVE-2024-8212.json) (`2024-08-27T20:15:09.110`) +- [CVE-2024-8213](CVE-2024/CVE-2024-82xx/CVE-2024-8213.json) (`2024-08-27T20:15:09.423`) +- [CVE-2024-8214](CVE-2024/CVE-2024-82xx/CVE-2024-8214.json) (`2024-08-27T20:15:09.703`) +- [CVE-2024-8216](CVE-2024/CVE-2024-82xx/CVE-2024-8216.json) (`2024-08-27T21:15:07.830`) +- [CVE-2024-8217](CVE-2024/CVE-2024-82xx/CVE-2024-8217.json) (`2024-08-27T21:15:08.093`) +- [CVE-2024-8218](CVE-2024/CVE-2024-82xx/CVE-2024-8218.json) (`2024-08-27T21:15:08.350`) ### CVEs modified in the last Commit -Recently modified CVEs: `75` - -- [CVE-2024-3088](CVE-2024/CVE-2024-30xx/CVE-2024-3088.json) (`2024-08-27T18:35:09.493`) -- [CVE-2024-31033](CVE-2024/CVE-2024-310xx/CVE-2024-31033.json) (`2024-08-27T18:35:09.280`) -- [CVE-2024-31498](CVE-2024/CVE-2024-314xx/CVE-2024-31498.json) (`2024-08-27T19:35:26.363`) -- [CVE-2024-38547](CVE-2024/CVE-2024-385xx/CVE-2024-38547.json) (`2024-08-27T19:56:36.727`) -- [CVE-2024-38549](CVE-2024/CVE-2024-385xx/CVE-2024-38549.json) (`2024-08-27T19:57:48.560`) -- [CVE-2024-38551](CVE-2024/CVE-2024-385xx/CVE-2024-38551.json) (`2024-08-27T19:54:39.717`) -- [CVE-2024-38552](CVE-2024/CVE-2024-385xx/CVE-2024-38552.json) (`2024-08-27T19:55:05.303`) -- [CVE-2024-38553](CVE-2024/CVE-2024-385xx/CVE-2024-38553.json) (`2024-08-27T19:45:18.157`) -- [CVE-2024-38554](CVE-2024/CVE-2024-385xx/CVE-2024-38554.json) (`2024-08-27T19:55:32.897`) -- [CVE-2024-38555](CVE-2024/CVE-2024-385xx/CVE-2024-38555.json) (`2024-08-27T19:54:04.720`) -- [CVE-2024-38591](CVE-2024/CVE-2024-385xx/CVE-2024-38591.json) (`2024-08-27T18:36:09.777`) -- [CVE-2024-38597](CVE-2024/CVE-2024-385xx/CVE-2024-38597.json) (`2024-08-27T18:36:47.313`) -- [CVE-2024-38598](CVE-2024/CVE-2024-385xx/CVE-2024-38598.json) (`2024-08-27T18:36:57.630`) -- [CVE-2024-39248](CVE-2024/CVE-2024-392xx/CVE-2024-39248.json) (`2024-08-27T18:32:45.907`) -- [CVE-2024-39427](CVE-2024/CVE-2024-394xx/CVE-2024-39427.json) (`2024-08-27T18:32:28.710`) -- [CVE-2024-40395](CVE-2024/CVE-2024-403xx/CVE-2024-40395.json) (`2024-08-27T18:33:14.247`) -- [CVE-2024-41622](CVE-2024/CVE-2024-416xx/CVE-2024-41622.json) (`2024-08-27T18:35:10.613`) -- [CVE-2024-43788](CVE-2024/CVE-2024-437xx/CVE-2024-43788.json) (`2024-08-27T18:33:14.247`) -- [CVE-2024-44340](CVE-2024/CVE-2024-443xx/CVE-2024-44340.json) (`2024-08-27T18:35:11.777`) -- [CVE-2024-44341](CVE-2024/CVE-2024-443xx/CVE-2024-44341.json) (`2024-08-27T18:35:12.540`) -- [CVE-2024-44342](CVE-2024/CVE-2024-443xx/CVE-2024-44342.json) (`2024-08-27T18:35:13.327`) -- [CVE-2024-45264](CVE-2024/CVE-2024-452xx/CVE-2024-45264.json) (`2024-08-27T18:33:14.247`) -- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-27T19:39:04.953`) -- [CVE-2024-8199](CVE-2024/CVE-2024-81xx/CVE-2024-8199.json) (`2024-08-27T18:33:14.247`) -- [CVE-2024-8200](CVE-2024/CVE-2024-82xx/CVE-2024-8200.json) (`2024-08-27T18:33:14.247`) +Recently modified CVEs: `56` + +- [CVE-2024-27221](CVE-2024/CVE-2024-272xx/CVE-2024-27221.json) (`2024-08-27T21:35:16.047`) +- [CVE-2024-27561](CVE-2024/CVE-2024-275xx/CVE-2024-27561.json) (`2024-08-27T20:35:18.613`) +- [CVE-2024-27718](CVE-2024/CVE-2024-277xx/CVE-2024-27718.json) (`2024-08-27T20:35:19.607`) +- [CVE-2024-27757](CVE-2024/CVE-2024-277xx/CVE-2024-27757.json) (`2024-08-27T21:35:16.843`) +- [CVE-2024-28012](CVE-2024/CVE-2024-280xx/CVE-2024-28012.json) (`2024-08-27T20:35:21.220`) +- [CVE-2024-28159](CVE-2024/CVE-2024-281xx/CVE-2024-28159.json) (`2024-08-27T20:35:21.767`) +- [CVE-2024-28287](CVE-2024/CVE-2024-282xx/CVE-2024-28287.json) (`2024-08-27T20:35:23.683`) +- [CVE-2024-28353](CVE-2024/CVE-2024-283xx/CVE-2024-28353.json) (`2024-08-27T20:35:25.153`) +- [CVE-2024-28392](CVE-2024/CVE-2024-283xx/CVE-2024-28392.json) (`2024-08-27T21:35:17.627`) +- [CVE-2024-28393](CVE-2024/CVE-2024-283xx/CVE-2024-28393.json) (`2024-08-27T20:35:26.183`) +- [CVE-2024-28423](CVE-2024/CVE-2024-284xx/CVE-2024-28423.json) (`2024-08-27T21:35:18.580`) +- [CVE-2024-28713](CVE-2024/CVE-2024-287xx/CVE-2024-28713.json) (`2024-08-27T20:35:27.150`) +- [CVE-2024-29009](CVE-2024/CVE-2024-290xx/CVE-2024-29009.json) (`2024-08-27T21:35:19.367`) +- [CVE-2024-29273](CVE-2024/CVE-2024-292xx/CVE-2024-29273.json) (`2024-08-27T21:35:20.250`) +- [CVE-2024-29413](CVE-2024/CVE-2024-294xx/CVE-2024-29413.json) (`2024-08-27T20:35:28.013`) +- [CVE-2024-29504](CVE-2024/CVE-2024-295xx/CVE-2024-29504.json) (`2024-08-27T20:35:28.797`) +- [CVE-2024-30587](CVE-2024/CVE-2024-305xx/CVE-2024-30587.json) (`2024-08-27T20:35:30.073`) +- [CVE-2024-30596](CVE-2024/CVE-2024-305xx/CVE-2024-30596.json) (`2024-08-27T21:35:21.827`) +- [CVE-2024-30604](CVE-2024/CVE-2024-306xx/CVE-2024-30604.json) (`2024-08-27T20:35:30.857`) +- [CVE-2024-33854](CVE-2024/CVE-2024-338xx/CVE-2024-33854.json) (`2024-08-27T20:35:31.627`) +- [CVE-2024-36534](CVE-2024/CVE-2024-365xx/CVE-2024-36534.json) (`2024-08-27T20:35:32.427`) +- [CVE-2024-38545](CVE-2024/CVE-2024-385xx/CVE-2024-38545.json) (`2024-08-27T20:03:02.983`) +- [CVE-2024-38546](CVE-2024/CVE-2024-385xx/CVE-2024-38546.json) (`2024-08-27T20:03:18.263`) +- [CVE-2024-42789](CVE-2024/CVE-2024-427xx/CVE-2024-42789.json) (`2024-08-27T20:35:34.673`) +- [CVE-2024-5814](CVE-2024/CVE-2024-58xx/CVE-2024-5814.json) (`2024-08-27T20:35:37.640`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 650fa373cae..994e4cfe1d9 100644 --- a/_state.csv +++ b/_state.csv @@ -116661,7 +116661,7 @@ CVE-2018-16307,0,0,19221261a18f7140f0fe43612676b210436b7d9f3ac7fff7a32115e5a047e CVE-2018-16308,0,0,70050ee1aa7ef862c1868e49b8935ea424fefbc9805d5595475b7a1a5ee1d52e,2020-08-24T17:37:01.140000 CVE-2018-16309,0,0,d9c06b54e9e7feb73e731212f602f25ec5bb0b3382c1b63e1ca1af994a8b7398,2023-11-07T02:53:44.803000 CVE-2018-1631,0,0,97fd896a79086286f22001017f5a7a17c7c91262891cae8edfe8e26b9963237a,2023-02-24T00:14:33.947000 -CVE-2018-16310,0,0,a5e1b93f6a2cd169cc015d232704153c385e419789ba5ecb4225a38aa49f0243,2024-08-05T11:15:27.340000 +CVE-2018-16310,0,1,8d1465fe190511b6630d315f5d396d866e3c70341018499c73b2217513a98efe,2024-08-27T21:35:00.747000 CVE-2018-16313,0,0,f44ef4adeb44a6ea0a01d7fb63e9d6fbc99c8f75641ca46a6a93940742204c0c,2018-11-02T22:17:43.130000 CVE-2018-16314,0,0,9364408a4c5e1c835b769367b474e38a6891ab7dd4edb5df0f136dfdea2281cf,2018-11-13T17:48:15.513000 CVE-2018-16315,0,0,e804eb162adefd037c4cbed53cc493a21514d46972a79137665d04fec867f6b1,2018-10-25T13:40:09.570000 @@ -136133,7 +136133,7 @@ CVE-2019-19045,0,0,fc01e461bb9b2ba8974285aa95a998c79b0de7295691eb276f75da5096908 CVE-2019-19046,0,0,29f0169712cb176eb133c3619fd121e85641c1e247b25765997a37b092cc33c5,2024-08-05T02:15:57.587000 CVE-2019-19047,0,0,0e7737100319e03cb0b83f3d90a8c402cffc2f1292282edf1de2fa1ef0923c89,2020-08-24T17:37:01.140000 CVE-2019-19048,0,0,db07d8da03a9e9a9fbc05a6b48c21c9ab7e60e2b75fe2603a423df23685c997e,2023-01-17T21:32:10.783000 -CVE-2019-19049,0,1,e330d8745dc6ac299dfc9c92c74d7175c2753f04cc17d41829f8773942305ac4,2024-08-27T18:44:14.520000 +CVE-2019-19049,0,0,e330d8745dc6ac299dfc9c92c74d7175c2753f04cc17d41829f8773942305ac4,2024-08-27T18:44:14.520000 CVE-2019-1905,0,0,69c7f3b62e394447902822ba2ec444464634c488c7230e9a2a3c0b8ec892d842,2019-10-09T23:48:30.987000 CVE-2019-19050,0,0,cdc05e07a8d47c6d5cbc1e6f7215c6685af1d77c83f05a1d42a6f7963dcbc7c9,2023-11-07T03:07:24.293000 CVE-2019-19051,0,0,295b1fe67bc75003432a4ec3224e24b22c7ff4dd3e9f42640dd64642238774ef,2022-11-07T14:55:55.527000 @@ -136150,7 +136150,7 @@ CVE-2019-19060,0,0,23fd6d3274a6e32e35a24a697e82921004ff2644dd60ff0d73308aea43b25 CVE-2019-19061,0,0,e4e170f9e3e6615177d4da116e229e9e512fea636006122a40c08ed09bb01f6c,2023-01-19T20:08:29.547000 CVE-2019-19062,0,0,ec645ecd0e91a1d60b5cc1fe3d10bb0ab72df5e5bd41aabd82c21c6792b822ce,2023-11-07T03:07:27.043000 CVE-2019-19063,0,0,299e8e500ec2e02cbb9d3957ed397e889c05cb95b2123e5ff9c122ac302e5fd6,2023-11-07T03:07:27.137000 -CVE-2019-19064,0,1,2ea1431a57a8aa85ddd720f2eae24365fe3628242f5539278abcb7b3204d848c,2024-08-27T19:38:19.673000 +CVE-2019-19064,0,0,2ea1431a57a8aa85ddd720f2eae24365fe3628242f5539278abcb7b3204d848c,2024-08-27T19:38:19.673000 CVE-2019-19065,0,0,3b53dd34c7b106112e3313db77b2f9f60c75df38be7808454550143c0c436f33,2024-08-05T02:15:58.677000 CVE-2019-19066,0,0,a42e595615ac1288c4e5f9737428e321bc5b3e1ce595e39bc49860b62f9b2798,2023-11-07T03:07:27.377000 CVE-2019-19067,0,0,21c60c0589e856788f81153cf254f0ba2c34cb413df62b70d73735206dd99373,2024-08-05T02:15:58.843000 @@ -180347,7 +180347,7 @@ CVE-2021-38156,0,0,7093c4be273c44b51d624a0582321085d0d7e6a29dc97438a15b8f95294f4 CVE-2021-38157,0,0,97edafe64be1568552092835ff813b82b20d2c0ff91f731c02a247ed76bd19dd,2024-08-04T02:15:30.733000 CVE-2021-38159,0,0,79393c41bcd337d8c607644e021b3415da5e3fe32adf94fcef38b8960a376bf1,2021-08-14T15:53:34.980000 CVE-2021-3816,0,0,30dc11b7e36e4e3f77a9924804066eddf19b6d8fa65eeebf9c2e536bf2e9f37b,2022-01-25T16:19:11.950000 -CVE-2021-38160,0,1,e85865d058aca3e839a3938c3fb48ce2be06a45e6238c8ca662b74f7770fcf16,2024-08-27T19:37:50.600000 +CVE-2021-38160,0,0,e85865d058aca3e839a3938c3fb48ce2be06a45e6238c8ca662b74f7770fcf16,2024-08-27T19:37:50.600000 CVE-2021-38161,0,0,f12d82ddd230e7d5307906a2d35bd6f9146d06ee99699b4b198df41fc34d4ff0,2022-10-25T15:30:25.020000 CVE-2021-38162,0,0,1bf6bc4e3a2a8094f32230f1da0537535558a0ea76cacb4f46bdaeb71711a51f,2023-07-10T18:15:10.387000 CVE-2021-38163,0,0,35bb994b2593f35cdff51ee6a670348a5203e05a395d0a30e2d39b88b8e9bea2,2024-06-28T14:14:53.897000 @@ -201393,7 +201393,7 @@ CVE-2022-34265,0,0,fc950ca1e3f54cd970a0dbf608c39f846b97dc896b84fc8a6ec68fcd698a3 CVE-2022-34266,0,0,557fb7394cbbe9eacb6b5b35000534f3ca6cb23b7eab5719edaf381e581c668e,2022-09-23T15:19:54.597000 CVE-2022-34267,0,0,0079fc66602e72d5c2594a90774759c916a60052b2b6090492949883e022a933,2024-01-04T01:19:05.293000 CVE-2022-34268,0,0,1e0db119741017d8de4c1b7c1f1cdb028c7106b341d87a193a3ba87d46af2dbe,2024-01-03T23:10:41.060000 -CVE-2022-34269,0,1,f9587d4351096b71548f044c6a9f4b2407ca3f3e91dc87bd5c6c8f1cf087abbf,2024-08-27T18:35:00.573000 +CVE-2022-34269,0,0,f9587d4351096b71548f044c6a9f4b2407ca3f3e91dc87bd5c6c8f1cf087abbf,2024-08-27T18:35:00.573000 CVE-2022-3427,0,0,710d56f10629ce45fd03f70d8b89c63fb345e4e1fabb40e9fa63e7c475c4f843,2023-11-07T03:51:14.290000 CVE-2022-34270,0,0,7e9d5beea9d538ec33f87a5dca04906e81cdb3b68c67d8442f6a52d41e6185aa,2024-08-01T13:42:46.790000 CVE-2022-34271,0,0,31f548b27df0dcd3bebe3ca096fdf47ffee64dc6a056d36fde164e373b96f9ac,2023-11-07T03:48:31.317000 @@ -205857,8 +205857,8 @@ CVE-2022-39987,0,0,935e129be5736816f1f64b48bbd72f708d4658000d85ae733b0eebdff57e6 CVE-2022-39988,0,0,9f069419049172b539dd2423b25d3d05c1cc2c011ba2c6a9dcec6c5b14ff3854,2022-10-06T23:35:22.903000 CVE-2022-39989,0,0,7ffdce84d8cd26b98c707b03c57c173dd5d7b41678d150601e81ecbc1bbf6f23,2023-05-04T19:49:24.510000 CVE-2022-3999,0,0,56326c6b077d7a3c7ca90954778c1f40832d60973c4c7842e4f24fc67bbe6eef,2023-11-07T03:52:05.753000 -CVE-2022-39996,1,1,a673538646be2b526556cda7803815db135ba40e765c7cbfeac91111057cf042,2024-08-27T19:35:01.613000 -CVE-2022-39997,1,1,1309ea0328785e03a7575bb8d3a68e06eea3a09084972b8522156f94cd4c6507,2024-08-27T19:15:15.953000 +CVE-2022-39996,0,1,515d89341d75fc891c2495715479db343fbd6a795549afa8dc6e58128081b767,2024-08-27T21:35:01.140000 +CVE-2022-39997,0,0,1309ea0328785e03a7575bb8d3a68e06eea3a09084972b8522156f94cd4c6507,2024-08-27T19:15:15.953000 CVE-2022-4000,0,0,293c79822977efd995079bd9f91c2bb859b092b412fd024b23d45cadf6837091,2023-11-07T03:56:39.273000 CVE-2022-40000,0,0,b2c90b4cd331ea48eb1c696df1cfed736f89b655e360d832a043e7696dd829cb,2022-12-19T16:23:40.887000 CVE-2022-40001,0,0,53944e40d3dc029fd806c75d13f9eb446512b7b5067631d8fcb6e9c0e4408b76,2022-12-19T16:23:53.913000 @@ -212116,7 +212116,7 @@ CVE-2022-48622,0,0,8603f3223b9efff6b371bdc90b7040dc59471154fa80a88ca2d72860d2113 CVE-2022-48623,0,0,903da016b4a21385c85cb533e0b0fbe60d9e83c91876ab8bbe25078b9f10265b,2024-08-19T17:35:04.530000 CVE-2022-48624,0,0,ea5513f2cbde0a9cdff3d197db7e4adb0a5ac7da8f42a8c9f8ae3134bd040db0,2024-06-10T18:15:19.857000 CVE-2022-48625,0,0,5d912021e84b827be17b6fcdcc1fceb7197614c850a6ba728db3d8a621c14c33,2024-02-20T19:50:53.960000 -CVE-2022-48626,0,1,fc58451bcf554cb6d7596ed91f1d4bac3d14dee8e91d35aa41459c2e76fb613b,2024-08-27T18:54:45.263000 +CVE-2022-48626,0,0,fc58451bcf554cb6d7596ed91f1d4bac3d14dee8e91d35aa41459c2e76fb613b,2024-08-27T18:54:45.263000 CVE-2022-48627,0,0,1c5ba43c57e15c20868a7719b8b597bd7966d9eb144dc2e8795a79d72f631cf4,2024-06-27T12:15:13.380000 CVE-2022-48628,0,0,ceea607df19dd86785346a0794b198b9994cba32c0926340c10f946e11d1e532,2024-03-04T13:58:23.447000 CVE-2022-48629,0,0,e891c69ca957bbf297b8083e0219ef44c2d49f5751aae1302d2d546d861aa415,2024-03-21T02:44:43.813000 @@ -217871,7 +217871,7 @@ CVE-2023-24047,0,0,7cddea95290518482ba572ba61ff6ffd7c6d10e232629e625d358672d8d46 CVE-2023-24048,0,0,c65916b10d06871abd9d0ac9956f07e67def9dc981f6a7ff3893ab568cb935e9,2024-08-01T13:43:20.007000 CVE-2023-24049,0,0,7f5a544db31b64f02d345fc1dffe034f34858f4164cc81b20851a90cc863a683,2024-08-01T13:43:20.783000 CVE-2023-2405,0,0,ff728851c53b3f2060ea00b935480fc0578d39878ec1030d59b00051e87ad9a3,2023-11-07T04:12:36.747000 -CVE-2023-24050,0,1,f8a95f5932b2e8cdc5d1e2f146edde58bf3378ec3f305d0469e0a2aed2e42388,2024-08-27T19:35:03.300000 +CVE-2023-24050,0,0,f8a95f5932b2e8cdc5d1e2f146edde58bf3378ec3f305d0469e0a2aed2e42388,2024-08-27T19:35:03.300000 CVE-2023-24051,0,0,da2566614f35722c2e25d0bc13092f34f4e7cfd99edcf9ae6e3415de8dd3a48a,2024-08-01T13:43:22.350000 CVE-2023-24052,0,0,15db580f8c37666e0af74cc4da9b778f8a5926c7335bb4c5aa1c8695fde9d169,2024-08-01T13:43:23.130000 CVE-2023-24054,0,0,2a49b721be9be42218a52c6e6c5f5d8c6575d5cc32c6a7365e2ec43afafef21a,2023-11-07T04:08:18.513000 @@ -219643,7 +219643,7 @@ CVE-2023-26262,0,0,c072b13dbde8b5f8b8239293cc82dc4f5b88361d00968b656c6efe6c9cc05 CVE-2023-26263,0,0,0673340ba7be15962c0a73223415435f4464991e461b1b00aa1da8add064a11f,2023-04-21T04:13:20.080000 CVE-2023-26264,0,0,539b72a3788b58d6b3bf0bee772b4d3f69b2271b1ad27c8a81375756fa17c11c,2023-04-21T04:19:13.443000 CVE-2023-26265,0,0,a5a96bf4a479000dcaf17d180456468d1f58e3b8cfc40b1cb5ae0d097e5bf0c9,2023-03-02T23:05:23.857000 -CVE-2023-26266,0,1,48db5ce845c1a283a9e2d6356dbc1b316f83bb3f1c498b5aaf283d61acad5b0c,2024-08-27T19:40:05.087000 +CVE-2023-26266,0,0,48db5ce845c1a283a9e2d6356dbc1b316f83bb3f1c498b5aaf283d61acad5b0c,2024-08-27T19:40:05.087000 CVE-2023-26267,0,0,4ee62ec08f811c303cf14885467b575d838f218d3495de5ceccf08eb40bc5c42,2023-03-02T16:01:23.653000 CVE-2023-26268,0,0,acba0f9f3727dac791768c3b96e68b01dd35481cb8eeba7a893714f55c71e756,2023-05-10T16:08:34.207000 CVE-2023-26269,0,0,3fc74b2e1b6e5e008c233812fdd6e3e283304fb6cbd0cb973fc9820127806764,2023-04-18T03:15:07.593000 @@ -222311,7 +222311,7 @@ CVE-2023-29478,0,0,62088b44e781a63d746c03bb883f02ca5e6b8616e00401b2abb5928c56e04 CVE-2023-29479,0,0,3452487cc01d05d054d053273a0100beb17b0352b31fe0cf3e34c6c79982aadc,2023-05-03T16:56:35.370000 CVE-2023-2948,0,0,33cf13ba5f6d57be09bcda640459cc9c5923bc30c2c40ba887cb48b95bbc5070,2023-06-01T03:51:17.350000 CVE-2023-29480,0,0,f5120f6370e825ec7cd76ec9504018974aa6f905b2a4473f0b6503286a3c439f,2023-05-03T17:11:10.983000 -CVE-2023-29483,0,1,58e2322426237eca9abe7736fdf3ecdaed6c37949cdc7de712b669b3a230d8a5,2024-08-27T19:35:04.147000 +CVE-2023-29483,0,0,58e2322426237eca9abe7736fdf3ecdaed6c37949cdc7de712b669b3a230d8a5,2024-08-27T19:35:04.147000 CVE-2023-29484,0,0,0af1d62089b04f5905550be8f2ff1223e88f2c2513ac49736af1c0960d31fe0c,2023-10-24T13:39:23.563000 CVE-2023-29485,0,0,e981967ddc8e88bae218a4003ad11e890ad90d138e470e83005d89eedb2ad20e,2023-12-29T02:21:17.843000 CVE-2023-29486,0,0,2aad169454ea0260c268ffaf8a2260f82a7f3a7ba45b490325fc2c6b417d3b4c,2023-12-29T02:20:40.423000 @@ -223581,7 +223581,7 @@ CVE-2023-31292,0,0,86c63ed7624c906da83829af8d7a16228d71bd92409fad1a6a6bb31729607 CVE-2023-31293,0,0,fb03f86e94761a4567fbb45e6abda7083866a528eeb5fd9232086fca52394640,2024-01-08T12:56:43.097000 CVE-2023-31294,0,0,3a98781feca9af45ef3c7033ad29efa315dc6f584c66b4329c5bca248738c49a,2024-01-08T12:56:24.393000 CVE-2023-31295,0,0,8409ca4dcab9b01cdbb0011e41ef2e627b617fadc8f067760713ee5befa4a7d7,2024-01-08T12:53:25.457000 -CVE-2023-31296,0,1,a01c5229e16581bd34739638cccf3d6824ffe5e3888f096137c2441aa7ecf8ec,2024-08-27T19:35:05.190000 +CVE-2023-31296,0,0,a01c5229e16581bd34739638cccf3d6824ffe5e3888f096137c2441aa7ecf8ec,2024-08-27T19:35:05.190000 CVE-2023-31297,0,0,d999366b150c2c85d67ecfb07318a397f6754dfda25fe0917988ff5960ee90bc,2024-01-03T20:35:00.150000 CVE-2023-31298,0,0,98e2f765c606afaf7e975d22536dc677256ea5fcd13e87530db9419a4b2450d7,2024-01-04T21:54:55.263000 CVE-2023-31299,0,0,bd6a70b4441b17a7411808fc1dd6650cdd363cac83a2c4e940fee4a1f58bd633,2024-01-08T12:56:17 @@ -224203,11 +224203,11 @@ CVE-2023-32242,0,0,dd1fe6cfd50c11e17c72cfd41fe32d83e61c2417a7c0bdb70fb6d65301738 CVE-2023-32243,0,0,3a173b5d6e0164261df25f6a48cdffba095f74b5bd10245dc41ee4333587a0d4,2023-05-23T20:17:25.427000 CVE-2023-32244,0,0,7e383b8f3193d26154fc4c6578ca4a205228b4e139350ceaf0b63e9557a8b945,2024-05-17T18:36:05.263000 CVE-2023-32245,0,0,b006dcad499643997f59b967ed8620eb8689245fc3a80c90f10d9e156aee4962,2023-11-30T04:57:29.943000 -CVE-2023-32247,0,1,bebf865d48be49831da89b5efbe95ba5c65ba7bb9fcdf392add30522fbfffc8b,2024-08-27T19:37:30.927000 +CVE-2023-32247,0,0,bebf865d48be49831da89b5efbe95ba5c65ba7bb9fcdf392add30522fbfffc8b,2024-08-27T19:37:30.927000 CVE-2023-32248,0,0,a5d678c7b7103547aa2939c989f1036addae6cfeaed1fc01872c0756f6eccb2d,2023-12-04T14:54:50.907000 CVE-2023-3225,0,0,900a6da755c932fc51f406ca2354a5ccef9c3b9baa8b65bd7ef2e31abe56ece2,2023-11-07T04:18:15.240000 CVE-2023-32250,0,0,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000 -CVE-2023-32252,0,1,fce0fcee1da7bf1bf465336b4b640ffd2fad098fe31d0c47eccb5e80bfff7cb1,2024-08-27T19:36:38.493000 +CVE-2023-32252,0,0,fce0fcee1da7bf1bf465336b4b640ffd2fad098fe31d0c47eccb5e80bfff7cb1,2024-08-27T19:36:38.493000 CVE-2023-32254,0,0,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000 CVE-2023-32257,0,0,e74ac3005b85dd9bb4e730408991fe6943d75b26a83bc250461d82f29002e0b0,2024-08-22T20:30:50.603000 CVE-2023-32258,0,0,3765cc941b240ae55ac325df051cd68b23e7f4aeaf6466a32872913e20fc6f23,2024-08-22T20:30:28.627000 @@ -227460,7 +227460,7 @@ CVE-2023-36640,0,0,e20cc3aa95df4590c21babf1ea93621e3ecc1f2cbdfd6f4d2eb22bcd2e861 CVE-2023-36641,0,0,065ff0dd7cc8be6a70d90c7e06da150ed8b811a91b8d049fa33f5d755afa6446,2023-11-20T19:59:59.920000 CVE-2023-36642,0,0,28af65fcbafcf444e491880f1a78d89af4d834345108ae6cbf598bac2d1e35b8,2023-11-07T04:16:39.923000 CVE-2023-36643,0,0,58c9475ea0b9b85ea5625584c110cd8d6c77d83d24ff3fa17132192b33f5a00c,2024-08-01T13:44:07.637000 -CVE-2023-36644,0,1,7ab5fd888eb994e94d6cd5b7767b4382456306673d9e939c163a38020d21aef6,2024-08-27T18:35:01.707000 +CVE-2023-36644,0,0,7ab5fd888eb994e94d6cd5b7767b4382456306673d9e939c163a38020d21aef6,2024-08-27T18:35:01.707000 CVE-2023-36645,0,0,44848f2322dbe9e6efe5ab05a859b18a170a015140d660f0d42532943322bda9,2024-08-01T13:44:08.367000 CVE-2023-36646,0,0,98d9abc88bba069e5019b90b6fba014418ed8e1ff04a391fe00b4e79ce9346e5,2023-12-13T20:38:27.083000 CVE-2023-36647,0,0,b9321e695ac9d6b9e445464d228900e551e18e03ed55bca5a684c98f8a367a1e,2023-12-14T00:03:46.357000 @@ -228898,7 +228898,7 @@ CVE-2023-38423,0,0,537c6173a761a5c26cf898ac74adeb688240b3c358b089884840d2ac7b169 CVE-2023-38424,0,0,99fd4ff2cd45804a279009f8e79f45c2460852535d8a9d8c3b2de5ec9e04f78f,2023-08-03T13:57:36.100000 CVE-2023-38425,0,0,be85cd1ba5ce4b3dab7a781196e893038fb93c2e7aabf5cf3e9b4428db2d2348,2023-08-03T13:52:43.773000 CVE-2023-38426,0,0,8be487c14d40f4026f898666c19e3292110c6d2186b99164ce31fa560af60242,2023-12-22T17:04:16.507000 -CVE-2023-38427,0,1,f05b1b68284c205ab455c4a149a75bc8fc293184ccf2be2285c37de8eae7eb94,2024-08-27T18:54:08.123000 +CVE-2023-38427,0,0,f05b1b68284c205ab455c4a149a75bc8fc293184ccf2be2285c37de8eae7eb94,2024-08-27T18:54:08.123000 CVE-2023-38428,0,0,f4a809af0e056508b7dfda0d80316548cac1608ce4a052dac3c5396d76d366ce,2023-12-15T15:47:05.687000 CVE-2023-38429,0,0,806bfaee2c26630261e30d4b617ecf5e71aca09cbfffc25cc02a6c4e45bafa10,2023-12-22T21:34:39.870000 CVE-2023-3843,0,0,f3768772f60b965aa9498137bd66ecdccef50ca14144b9e479bd7aa1ea659164,2024-05-17T02:27:52.767000 @@ -229500,7 +229500,7 @@ CVE-2023-39193,0,0,3ad8b95389e83b92a344cb4402538f60b8731f4ce39ac2e8734cb37a8afd1 CVE-2023-39194,0,0,2030f9410aac6066f150fa3941eec569327600cbe4908600bc63b6e2de0988f7,2024-05-22T17:16:03.547000 CVE-2023-39195,0,0,391d56b617eb30a24d100709ce65f9da7276204fdeba761b986d8fea653b34df,2023-11-07T04:17:28.610000 CVE-2023-39196,0,0,c004f9c9ec6fb26eb6a4cbc4eacbe3f5b53b46ced05c82462b2bf03bf67c136b,2024-02-16T20:57:44.050000 -CVE-2023-39197,0,1,a94d42f3cc501b7c2e93f89d09d428cfe0e8ab7b9ab73a2a8f307e4bf4490647,2024-08-27T19:31:28.257000 +CVE-2023-39197,0,0,a94d42f3cc501b7c2e93f89d09d428cfe0e8ab7b9ab73a2a8f307e4bf4490647,2024-08-27T19:31:28.257000 CVE-2023-39198,0,0,6e49ea8695e035176ed13316cdca5bece7b6218f5f706c07f3cbdc1db5d81235,2024-06-25T21:15:51.053000 CVE-2023-39199,0,0,7a0e64c415a7bc2b493992501b443a7db3b77e8a22d4bad19abd42cd68cf8bbc,2023-11-21T00:57:16.017000 CVE-2023-3920,0,0,1f9f72a3bd9c37be24e0dea36a1658cf630b3ff4aab5704130fc3282b0cd5e1f,2023-10-03T15:30:56.607000 @@ -230198,7 +230198,7 @@ CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000 CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000 CVE-2023-40105,0,0,aad385399771bf8ef1682cd01ea151bd6776f60f896cc985fd26fd6d806bf2b4,2024-02-16T13:37:55.033000 -CVE-2023-40106,0,1,0475b08be04d4153a33f08c726f5ef91351480d0fc8d62866c8273b0b5a46d11,2024-08-27T19:35:06.100000 +CVE-2023-40106,0,0,0475b08be04d4153a33f08c726f5ef91351480d0fc8d62866c8273b0b5a46d11,2024-08-27T19:35:06.100000 CVE-2023-40107,0,0,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000 CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000 CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000 @@ -231316,7 +231316,7 @@ CVE-2023-4150,0,0,9e17d01d6dfd1bbad4581e9bdc99c95cb8eb97d9ecbd407283e813b7b9285d CVE-2023-41503,0,0,21a3f966ba8ab913409d2ff2fb633345f410b80e162d1526608421e53802bf8f,2024-08-02T19:35:22.577000 CVE-2023-41504,0,0,848cc4699c1e8eb18242fd890d1d1b583b0b775a2ec9c39e2320016a91149dcd,2024-08-05T14:35:01.417000 CVE-2023-41505,0,0,44cd3289634ca7cfd83a651030e9a773c9400d14c9f6e397b5380ee841c3c7ce,2024-03-14T12:52:21.763000 -CVE-2023-41506,0,0,1cabc6069000837042653b74d9ab88265e9160641affa3c4dbd8c86be110853f,2024-02-27T14:20:06.637000 +CVE-2023-41506,0,1,d854ac7b20badfa924f73cdc9c8d229d9b3405b1560ab063fe84fca34598864e,2024-08-27T20:35:01.473000 CVE-2023-41507,0,0,42d7d587d5d24994ad22c5fee4b7a0d6974f9356ec83148dba96a9f7c6064ec6,2023-09-08T16:51:07.547000 CVE-2023-41508,0,0,9c51a520e4e0cd0b92dd417c82bafa4b094dbd24138cf8d018d6424f00a3ea0c,2023-09-11T18:53:12.833000 CVE-2023-4151,0,0,10811f8ea6688c88ad0f8cbd3cc9075f14bb7753af2fdd947ab408fa989d5c08,2023-11-07T04:22:11.493000 @@ -232389,7 +232389,7 @@ CVE-2023-42932,0,0,3cb102cf7e68e1277cecc63dc81679dfe99e4df141fff5c4b35346c92fa6c CVE-2023-42933,0,0,3b8c17c5c0ba5ced910707473d3012843c9017196686d732cba2ad4beed35ed0,2024-01-12T14:42:31.583000 CVE-2023-42934,0,0,a9110a5629842c61131134d6090bcf7298d6377dd5054caff3ef2d2a408ccef5,2024-01-16T23:52:48.783000 CVE-2023-42935,0,0,59f1893c4921fd426d37a2853de577c0f93471971948ece90123be426c829c77,2024-01-29T18:38:29.587000 -CVE-2023-42936,0,1,c18fe081f1c567d172866792cd7e269db74a129e365dc1e3a0f755df59e92d66,2024-08-27T19:35:06.893000 +CVE-2023-42936,0,0,c18fe081f1c567d172866792cd7e269db74a129e365dc1e3a0f755df59e92d66,2024-08-27T19:35:06.893000 CVE-2023-42937,0,0,2548bd23d42243683fdde68d9d74c6694ce8fbfe2bf0789c6beda4910f3fe439,2024-01-29T18:33:19.387000 CVE-2023-42938,0,0,d25e9dc245eebb79595e4f006d6b9857b227133a3f844fb3d6037315be9ae599,2024-08-26T15:35:02.077000 CVE-2023-42939,0,0,0ce71ea134fae56f84234486eae9cf0279fa4b51651ae0082aafa52d86a864ad,2024-02-22T19:07:27.197000 @@ -232408,7 +232408,7 @@ CVE-2023-42950,0,0,f1d5850b892570a96c5f59ef6bdf8fbbd22dba2618afa507113cc84e9d5cf CVE-2023-42951,0,0,5599d72d1055314191c8db46df9d7c3c52edb7a93dbd3fb4d584b453f42b45e7,2024-02-22T19:07:27.197000 CVE-2023-42952,0,0,ac8164a1e95a71f3635337c8d1e1e316d92bbb5ce2c711d62963ba080fa32811,2024-02-22T19:07:27.197000 CVE-2023-42953,0,0,10e4b94939ee0a7c816d850e4e7befeb67bf5108acf30f852eb067399e688a52,2024-02-22T19:07:27.197000 -CVE-2023-42954,0,0,065c350829c9b241771d1bca2f08dbf3f9951aa86fb8dbf545b8b0f102b1a850,2024-03-22T12:45:36.130000 +CVE-2023-42954,0,1,f45971a666787f6e4609a5b8ff1e50e22211581a6c5afdc32f83d4251ddb5301,2024-08-27T20:35:05.607000 CVE-2023-42955,0,0,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000 CVE-2023-42956,0,0,66b0dda941d2a4925cbdb9e601d4277739f51c5e0165d598d707e4a6d9b3fb9b,2024-06-12T10:15:27.210000 CVE-2023-42957,0,0,1d1281f11458464a9b94a2c311f95c84f00a2fed2f3f449f4f43ace8002bcf4e,2024-08-12T15:39:42.970000 @@ -232647,7 +232647,7 @@ CVE-2023-43470,0,0,17d35487c84783e73551dd1e340a28fdad09c072567b02a75a72d522739fd CVE-2023-43472,0,0,a3008b309ff857d10385bb0be4ee0eb4e9b0900adc392c74326123abc8303cf0,2023-12-11T15:32:59.420000 CVE-2023-43477,0,0,0c74ac00cc1ee8f6c145de162b98bc7d8776c1dc19ab5c8a19701bfb74cb49ca,2023-09-22T18:37:02.227000 CVE-2023-43478,0,0,c43004e7643e046e5e2c9d48aa06e90357a6d95e192814361f05a486c7b542a0,2023-09-22T18:36:45.253000 -CVE-2023-43481,0,1,faa16b4f46dcdc0114be0dc9597ba626c5e87f23f98df512a29c2b5826b54935,2024-08-27T19:35:07.137000 +CVE-2023-43481,0,0,faa16b4f46dcdc0114be0dc9597ba626c5e87f23f98df512a29c2b5826b54935,2024-08-27T19:35:07.137000 CVE-2023-43482,0,0,8fdc0252f8a99d357c7a9ff8cfbddf8addb596669b2c0bcea99d45decc176060,2024-02-09T02:11:03.607000 CVE-2023-43484,0,0,b8e1fcf13fb67bd37267e8c1ecc07c5eb977d2a46ec3271926523495750a7a82,2023-09-27T20:25:34.200000 CVE-2023-43485,0,0,9779c35ae12c96226abd89db56b2640ef955e735e375f87b41d64c824815020a,2023-10-17T20:31:53.560000 @@ -234248,7 +234248,7 @@ CVE-2023-45867,0,0,5db5da4730a3eda998a4fd6ce2a21c0f3484bbd84571954836990317e57f8 CVE-2023-45868,0,0,df1b586624033c287b172839b213cbc8ec979ba18d71fde3b01da0f77fe96b10,2024-02-22T19:06:44.663000 CVE-2023-45869,0,0,ae0033b8875e66831bd0fa49aa37f059d0cc638339d10a85f589d8c5031628cb,2023-11-14T17:40:53.637000 CVE-2023-4587,0,0,2d9161b0ba4b4b9f51444521be9ee96176e07c56f44d6bd3c1d677910159fe30,2024-08-02T08:15:22.973000 -CVE-2023-45871,0,1,cf2c19d8d9a1ab8bca7df10be3896fb36b75b63207dd8eecbb49b88c6aec0739,2024-08-27T19:35:21.703000 +CVE-2023-45871,0,0,cf2c19d8d9a1ab8bca7df10be3896fb36b75b63207dd8eecbb49b88c6aec0739,2024-08-27T19:35:21.703000 CVE-2023-45873,0,0,a568e54c26b58817453d7ca833079f4de460e9bdaf499179488e9f031ae443eb,2024-02-29T13:49:47.277000 CVE-2023-45874,0,0,15b94d1156a65969baf5a063838eca4cde85c5739f0df1171f246a13f786bc4d,2024-02-29T13:49:47.277000 CVE-2023-45875,0,0,3efc1082c0b736fd7c57bf3abd024d406442080e5966fe27818bbd3983788771,2023-11-16T17:35:03.380000 @@ -234988,7 +234988,7 @@ CVE-2023-4683,0,0,40cea1dc03eef3e027bc32dd2ae941f65bd936f05a85036cfc49b15f406884 CVE-2023-46835,0,0,25bbc68dc75b3ccf60a7afebb412eded7c69fc7a3dcead527835c06dc08953f7,2024-01-11T15:56:04.093000 CVE-2023-46836,0,0,f5ce4ff90551bdc127de2610cb54770c0ee6eeab88d256f3d330df3bb8f0a1ae,2024-01-11T17:09:02.020000 CVE-2023-46837,0,0,235eb49f4a5cfd2303e4d9fe86113f4253281fb598c82093310061fdb70ca753,2024-02-15T03:15:34.683000 -CVE-2023-46838,0,1,e55342ec982796174c93d42f4d3441b48151cf088d830e6cc56db632a8572edf,2024-08-27T19:25:43.650000 +CVE-2023-46838,0,0,e55342ec982796174c93d42f4d3441b48151cf088d830e6cc56db632a8572edf,2024-08-27T19:25:43.650000 CVE-2023-46839,0,0,1a808652e9a7343069785a6af2d94cd968a541325faba3e9406c32c3e461ae80,2024-03-20T13:00:16.367000 CVE-2023-46840,0,0,414f448d32223fd7dafc164b5d31b23d9d751ec13d652ba81f3f62f368b8515f,2024-03-20T13:00:16.367000 CVE-2023-46841,0,0,69de2292f7b0165df885056be3cdde071d60eea027dc1314d310f07d8d34f1e0,2024-03-23T03:15:09.740000 @@ -235188,7 +235188,7 @@ CVE-2023-47129,0,0,2feb59592ce5ce619f0dbe39356022044137b62ac7fdf7341576491df67d3 CVE-2023-4713,0,0,7ce8e1a4cd21a7ccb4dfe59ad2f944b72261e3a9e1df4d06a392d3df31c0e74f,2024-06-04T19:17:54.937000 CVE-2023-47130,0,0,99626e1381150c1e09884dff49fd6c2f723ae167bcc9874cd57b5ba796b23a94,2023-11-20T20:30:13.503000 CVE-2023-47131,0,0,1f17bcf165c617ab98fe27cd04d2840b3530e5c7f34a2f6195d222315c628fe3,2024-08-19T17:35:06.470000 -CVE-2023-47132,0,0,0c99cc4e240db5f5dba4ea355163f57409599dd4f4974c0e64e1705697ecfca3,2024-02-15T17:07:31.827000 +CVE-2023-47132,0,1,22b04133394aba0611c16459db9562b2470a75c51e301523cdef08bb1020505d,2024-08-27T21:35:02.060000 CVE-2023-4714,0,0,88791e8df305497262c231049cee74da124b9dd8910a01ba3e741344ccddea8e,2024-05-17T02:31:44.550000 CVE-2023-47140,0,0,27ac9d4e4f9c1df9620d5c2f8730221eb8cdfd60197a593e16c9afa644305be0,2024-01-11T16:58:30.733000 CVE-2023-47141,0,0,ec41362211d80a8593662ce89c33cab67b4bbfc76d91426d6bca35fdc27513b3,2024-03-07T17:15:10.847000 @@ -235558,7 +235558,7 @@ CVE-2023-47673,0,0,d218e9ff40d1dabc1a11b798abb209aa18bd456a2ffbe0a79e8c3b1c157e2 CVE-2023-47674,0,0,d037f2c801f376e087cd11902ffecdce96b13b0c80dff5d6bbcc72eae0f877ac,2023-12-05T19:11:17.703000 CVE-2023-47675,0,0,2513c3c466d7a0735b46553db3e36b315fc2a468ae47310d44402be9b043abfd,2023-11-22T00:05:28.373000 CVE-2023-47677,0,0,0d47d24a0783fa97e3136ebd993535ab6463f78fdc896415168e62bcf64f882b,2024-07-11T16:01:17.057000 -CVE-2023-47678,0,1,f461145a54c4a5650ccf2b274b91a0186af1e9e02224971f71c400d924f099d3,2024-08-27T19:35:07.937000 +CVE-2023-47678,0,0,f461145a54c4a5650ccf2b274b91a0186af1e9e02224971f71c400d924f099d3,2024-08-27T19:35:07.937000 CVE-2023-47679,0,0,41ef2fdf64f784da3cb851d39f0fd3ca184e4b821a91b7732600662d29bd38a1,2024-05-17T18:36:05.263000 CVE-2023-4768,0,0,19aa57856f835335eecb8da166f4e46a330664ee22f9fc6d9887432e7a04c23d,2023-11-13T18:28:18.260000 CVE-2023-47680,0,0,874c2a1a0d92f7a091aaadbe25da5af4be50dc769067615192e66f0eaffd0951,2023-11-17T14:50:40.710000 @@ -236706,7 +236706,7 @@ CVE-2023-49228,0,0,d5b9c8d3e4a5b9a6aebd50c02454ff2ea2937ca928a075b6d2cf9ec37d3ad CVE-2023-49229,0,0,274f5e76e0abf25dd952bfa2abc364ec937485698e496e95193eb5367d2ae070,2024-01-04T21:44:26.423000 CVE-2023-4923,0,0,ce7fc500dde57469ac63f0d59e3b430b03bd8f45530b68eebb245625ccf8cf01,2023-11-07T04:23:10.377000 CVE-2023-49230,0,0,4ac429fff5dad6e7c2619e17899b81d72294b4ca67a40312f774f6a762a4a586,2024-01-04T17:17:22.257000 -CVE-2023-49231,0,1,c62fd1865f2eec72e7e6740f19af9d0cb475298622080bf6c81c19f47c897674,2024-08-27T19:35:08.170000 +CVE-2023-49231,0,0,c62fd1865f2eec72e7e6740f19af9d0cb475298622080bf6c81c19f47c897674,2024-08-27T19:35:08.170000 CVE-2023-49232,0,0,9ca3b1a982e1c7a2ec1772835ea21cbd9593765c02546da72550a094ad870e5e,2024-08-01T13:45:09.797000 CVE-2023-49234,0,0,42b8e485b1c2a4cac6ef6d6ad94acb217368faece94ca890be93bbb463698a19,2024-04-05T17:15:07.690000 CVE-2023-49235,0,0,251e067594908fcdc9ea0af907df30c24f21af889b96692ba9e2877adfcb0e54,2024-01-12T19:51:24.593000 @@ -237797,9 +237797,9 @@ CVE-2023-50963,0,0,c351b4118bb06998b72052bc9f424778991465868b25e60991b8e71556cfe CVE-2023-50964,0,0,09de2824e3f3005514ea7ef8210c8fda17bd6187a04281bd3c5e86c8d77b2d31,2024-07-31T18:55:59.713000 CVE-2023-50965,0,0,2ab8f843f06fa75772d31032acc0a4143eb8a49505fca8090a45527fdf0f0f43,2023-12-20T20:02:23.497000 CVE-2023-50966,0,0,1e86e9a7f47ea53bbaf222a14c87093ef24a16976612e34bae26c6cc35c32573,2024-08-02T15:35:15.213000 -CVE-2023-50967,0,0,c36860011164f2d7fbf8bd4ec5229dfb89aeca57d5033b3c98ab0a5982defbbc,2024-04-19T23:15:09.330000 +CVE-2023-50967,0,1,0ae78f82234d618c48269e50744e0f444843b45351c1f5329c32898237cf79a1,2024-08-27T21:35:03.017000 CVE-2023-50968,0,0,37cad7521362a5a07018fbe68ff8e371eaf404e85d4d33b473503fad06fb72be,2024-01-04T03:01:53.323000 -CVE-2023-50969,0,0,5d46845b0efbce75042d260c5a641d36bacedb056a05d06a6fa23e744ec33607,2024-03-29T12:45:02.937000 +CVE-2023-50969,0,1,14ee5db0e37f76b7ed3082f24dc2547fc802665b5bea3107b98a3535ddeb060b,2024-08-27T20:35:06.427000 CVE-2023-5097,0,0,b0925c49979a55cf126a28aeea8c023ff3b1b72d1dca02982eb1a837f436d5cc,2024-01-23T19:29:08.583000 CVE-2023-50974,0,0,3f0c670691555886eaeefa13f97e5cf940150341369ea53fa3919e83ed6ed647,2024-01-12T20:25:04.120000 CVE-2023-50975,0,0,7ff5b10dfcd8dc32b771988355cb388b8036430fa22b0bd942483142e5ae2403,2024-02-22T19:07:27.197000 @@ -237830,7 +237830,7 @@ CVE-2023-51011,0,0,8499ff04d8a804b9293e8e451c8181ff2e1753bf3ead1ad48a0b5eab3902e CVE-2023-51012,0,0,0d04c446f81f1b10f76f9be9488f2220a67c008b373b72a6a7bfdfe77969da10,2023-12-27T21:10:27.917000 CVE-2023-51013,0,0,d540acde61c6a0816d8214343da7f21d898e1e5738ec7065a1b498e4d05a72ee,2023-12-27T21:10:22.830000 CVE-2023-51014,0,0,0c3905cb9e26bd964565507f7f6008e9afdb90a2facb561fe3f4cc9855dee6e9,2023-12-27T21:10:13.203000 -CVE-2023-51015,0,0,8c57b3af63754b4ad35bb6bf27d03304660556541794455b9e388ee4dc1ae35d,2023-12-27T21:10:05.557000 +CVE-2023-51015,0,1,f04ba1d51d5facd8714d1334c83e1227011c11a53fd9c2ea6d1729104e8be057,2024-08-27T20:35:06.640000 CVE-2023-51016,0,0,61ceaa15cef820a3a123ce1b88ddb80bec8a57b30d17ad67cf0ca5774934779d,2023-12-27T21:07:25.007000 CVE-2023-51017,0,0,91f71748c8584726ac785f883d240e345da011e02d754cbd5729f6b76e8a6dd4,2023-12-27T21:09:57.983000 CVE-2023-51018,0,0,481fdaaba1bddcdb45397487f463debf20be4b72a1d5c2f1219eaa1a952a1e92,2023-12-27T21:09:49.843000 @@ -237842,7 +237842,7 @@ CVE-2023-51022,0,0,62ac5f7a3652397f9416cf18b3fc32001e92227d8e056b5ca565197d5eda7 CVE-2023-51023,0,0,97fd10b657e979f02ff01872561b3bc89bb54d4285929f3d237eefc50fa4a9f3,2023-12-27T21:11:11.397000 CVE-2023-51024,0,0,cfc1b278a9c197b16b490384a9d547ff37dc7e7e969aa0669548d53b216bd4f4,2023-12-27T21:11:05.060000 CVE-2023-51025,0,0,7dea97a39ec59f9fd1c6506e0caa96651485808512d0d022aab7435a104ba91d,2023-12-27T21:10:57.747000 -CVE-2023-51026,0,0,7e5d98cb2fd4254b0c89ec0b3bc6e9d2103708aac83dce23206d7411866097b2,2023-12-27T21:10:48.950000 +CVE-2023-51026,0,1,469c6bc86a9803d2bc97b4672eddc902338da8d54e3575585bd28fac2770080c,2024-08-27T21:35:04.070000 CVE-2023-51027,0,0,36d78e7e4fb6f6d3a1dd064e6461d5fda34eb3e45e61356f69a1805313d44aed,2023-12-27T21:10:41.763000 CVE-2023-51028,0,0,c45a34077d471b7125aa2cbc11bce0da1d1f6f51e351f1883a73eedec46c187e,2023-12-29T19:25:10.280000 CVE-2023-5103,0,0,5e4f07e081253419bb4b7a9d4baaf1a63704b509adf9e66bd8e6c6646d64400f,2023-10-11T18:33:45.007000 @@ -237856,7 +237856,7 @@ CVE-2023-51048,0,0,5560e3783d9082369523f182f161f5eb26f9aad5bab2d146f92658a2fb0bf CVE-2023-51049,0,0,8dc5d051d2f3cd5df2f9c92c1c1e261c9c88d3014ad02c5e51b5378ecaf8da8b,2023-12-27T21:39:12.257000 CVE-2023-5105,0,0,d388b66ac355d1115628ad1de3597e68e21811177eb6cd3320deb6c58ef2db81,2023-12-07T20:31:41.503000 CVE-2023-51050,0,0,ece9118b5f50fec020bff263f92f25947c7e093a2fd80383122218e48734d694,2023-12-27T21:39:22.713000 -CVE-2023-51051,0,1,27afa7dfe3f1160823d72cc873f74b1376fa7f35f4997f69dfcd6a84736866b8,2024-08-27T19:35:09.037000 +CVE-2023-51051,0,0,27afa7dfe3f1160823d72cc873f74b1376fa7f35f4997f69dfcd6a84736866b8,2024-08-27T19:35:09.037000 CVE-2023-51052,0,0,33add013c95d358cbb500a56cdae79fd65f49f3493ceff5a405792886b3fd13c,2023-12-29T03:47:49.743000 CVE-2023-51059,0,0,451467dbcfb211fa5b13377610fe49b5891ab40fdc8f73a47cfa382fabfb5c36,2024-01-22T20:43:30.897000 CVE-2023-5106,0,0,6df74482d700d157269bea0570e0ab6107619db69d31b65be9091ccfa5a787d3,2023-10-04T12:25:09.517000 @@ -238376,7 +238376,7 @@ CVE-2023-51781,0,0,be5054a4d6b1496efeb300d0972eaa9aed760c8f3595ab6d8f076735cf23d CVE-2023-51782,0,0,226d3cdca2a1281d03aacf683fa229f2432a76022577875d6f89499a1a72964d,2024-01-18T19:31:37.630000 CVE-2023-51784,0,0,7d601840dd52665386e56042b61153e0dd9d156e79737ee0b7e9f683c831f447,2024-01-09T19:19:59.413000 CVE-2023-51785,0,0,af6e089d4b220f7ed1c33a8e658fcc887cbb36e7a814321622f657ea15e4ed43,2024-01-09T20:18:47.197000 -CVE-2023-51786,0,0,4fdc458116d4201237bfbb5319db2b5146e0a5b0d8d2248d8ea493764516b98a,2024-05-01T18:15:11.990000 +CVE-2023-51786,0,1,ff2ae0afd5896bfcccd08328ace3cce896bcb8fbd8728c747c3e38d3deae4327,2024-08-27T21:35:04.790000 CVE-2023-51787,0,0,32045d14c29a8e094b6fc542eae69fe0fa1d19c1ca4a4442151912591cfe915f,2024-08-01T13:45:32.003000 CVE-2023-5179,0,0,ad8ed58fdb4084553e041d0d1d973d60d06712443de8134346a8a8ead34c4da1,2023-11-14T21:29:41.243000 CVE-2023-51790,0,0,edec2966f862ac428116e4ceaa6692f22a64b8089d15af6bb6c63e0fe09db359,2024-01-18T19:47:57.360000 @@ -238403,7 +238403,7 @@ CVE-2023-51812,0,0,120a768b771acbdbd4019fafe4ebf29261cfea75f6ed1dddf1d261acbd21c CVE-2023-51813,0,0,03a8407f76670dad8ee2f735bc03f059a1f48e563cfaabefcea4d8c0a87c4b78,2024-02-05T18:39:54.630000 CVE-2023-5182,0,0,36783ba17dd3ddcfa5aa268dccb5a3d40636c21121d2899e424b957a713f6407,2023-10-11T18:05:32.093000 CVE-2023-51820,0,0,7aa0f7d98725dd77268f0caeb4fb8d7e759133db0c7956115ba3b94b4e25c668,2024-02-10T04:11:00.587000 -CVE-2023-51828,0,1,90063f5e09b01f503f1f6e58b8400efb2ad9738539cfe67915469ad778201a68,2024-08-27T19:35:09.897000 +CVE-2023-51828,0,0,90063f5e09b01f503f1f6e58b8400efb2ad9738539cfe67915469ad778201a68,2024-08-27T19:35:09.897000 CVE-2023-5183,0,0,b93a57cbfd23c7656908cf8ce0c47fe83e4871febf63c360b65228bdb8fcae2a,2023-10-02T19:22:03.777000 CVE-2023-51833,0,0,b10ac15f68016bd5d4bd8d474cb15f2be07ff92fa1dfb1c5cbe6b8926dbb6e85,2024-01-31T23:32:20.930000 CVE-2023-51835,0,0,95cc4db7c615cdb1c602639e2e37c3a762bd3c301b530acb72f57667401f78e7,2024-02-29T13:49:47.277000 @@ -238590,7 +238590,7 @@ CVE-2023-52153,0,0,8610f30de3b3ae26b18922885a0ae2aaa344e98001b8664f3e5b159222943 CVE-2023-52154,0,0,3c09d8bbc34bc21301a7ba257cb3ebe4acad4608bcdd31c9c14e3f17024b636a,2024-02-22T19:07:27.197000 CVE-2023-52155,0,0,66b2036b8aa4b2b0821aeadedccb952fd85f88f5197038ead7aa814bc9f3095a,2024-08-14T17:35:02.300000 CVE-2023-52159,0,0,bec77c293fd7ebf7e62680f3fc4955e6930fe18607be4ec5691592c67d41ceeb,2024-03-25T14:15:09.267000 -CVE-2023-52160,0,0,9d18b6e096bfb7b1ad78f37fbf85a6f0fd64016c16674e928f1d5dc071d7ae9e,2024-03-10T04:15:06.897000 +CVE-2023-52160,0,1,c093db7e7e15611138ccc3551019d7df1c0aa646781730ca0b99d5dd89206d76,2024-08-27T20:35:07.373000 CVE-2023-52161,0,0,c30ce7d950aae472355b8f56dc36e9bfe1406f4858ad5ec5bf293b3284ba1dbd,2024-03-23T03:15:10.210000 CVE-2023-52162,0,0,1bd9338733b6c2d388fd5a0badb736e81147c7da89aba74926195068a6aea86e,2024-07-03T01:43:27.207000 CVE-2023-52168,0,0,2060585b65f263d6d67dbd4e8280988fb72cd05eaf965a48557428598a2a0937,2024-07-12T16:11:20.130000 @@ -240297,7 +240297,7 @@ CVE-2023-6352,0,0,0d88b3591851e0b6fd9ec6baeeff1a35e9a6309d8954b935ebedc1b41f0f73 CVE-2023-6353,0,0,410080c76130e9beb7a2d40b2e86eb2e686850b81a11f9ea52b472b62040e73b,2023-12-06T18:18:09.320000 CVE-2023-6354,0,0,89b5389e23cd7e1b7d84ff66e83b00f749f7e12e17844840efcd02e46ca335d9,2023-12-06T18:18:01.950000 CVE-2023-6355,0,0,1f161a865de45e80e322e101a29fd35a2e726fca94b84f76f600180f53074604,2024-01-02T15:26:45.317000 -CVE-2023-6356,0,1,462ca07057038b51e0aa4c1e2ad2a7d91052530a0398c7216231503421e3beaf,2024-08-27T19:22:33.193000 +CVE-2023-6356,0,0,462ca07057038b51e0aa4c1e2ad2a7d91052530a0398c7216231503421e3beaf,2024-08-27T19:22:33.193000 CVE-2023-6357,0,0,922aa33d69dfb57ab51adf02ab0b79ba8972c33eecc3f54e7b4cba6ee2b4cf0a,2023-12-11T20:49:14.117000 CVE-2023-6359,0,0,dc4b31625771af30b850afd13facd80e96ad5b76727dda84977b54cd8dc4afd1,2023-11-30T20:36:00.537000 CVE-2023-6360,0,0,7ebf7a0996aa604ca0e37b1bb629610295b5e95328fe4cc64d0814601832e864,2023-12-06T00:38:20.297000 @@ -240451,7 +240451,7 @@ CVE-2023-6532,0,0,44972a9aaa8b97e5656a7157ac74bde56edc9712f5f8e7cc323b7f605c6b8b CVE-2023-6533,0,0,dfcad6aa28cf8fca2713f13f08a05a0d6546cbbb4bbeb8091e2849afb08a4ad1,2024-02-22T19:07:27.197000 CVE-2023-6534,0,0,5f0dfdcb9f929ff0b7520043a1c55ae53709253c1bc046f2dcce650d8a570305,2024-01-12T14:15:49 CVE-2023-6535,0,0,b33e06863627e58b6fa2d11122d0ae013c360cdb31017f127054663d22393f69,2024-07-08T18:15:04.610000 -CVE-2023-6536,0,1,fec904ebb8306d2f4c67e541b887590dece41bd4da6150b93f3d4559950858d1,2024-08-27T19:23:14.437000 +CVE-2023-6536,0,0,fec904ebb8306d2f4c67e541b887590dece41bd4da6150b93f3d4559950858d1,2024-08-27T19:23:14.437000 CVE-2023-6538,0,0,a9a54a8cf009f791dad92e4e281448c50d11a960aafad6f0f8ffb8cca053b0dd,2023-12-14T17:02:15.203000 CVE-2023-6540,0,0,8f87cfa2457d6bb0fb414fb770f451bb1d9c3c6672bf7d8a5df9f0f0dba7ce15,2024-01-10T20:23:28.493000 CVE-2023-6542,0,0,11c576806c1bbe301e44b77a2a78345f7d19542e9b00fa7b9afaff8511c7ebf4,2023-12-18T20:00:10.587000 @@ -240723,7 +240723,7 @@ CVE-2023-6862,0,0,73b0526dc80d57c50f8e0b6b71ea0c2548aab009b808eaa18ddf8d4e43c306 CVE-2023-6863,0,0,0b4633b0b0706837817be4547a71bb63916cf0829982289a349e8b14ca57f3cc,2024-02-02T02:35:16.677000 CVE-2023-6864,0,0,8067667905d2636381c7043a66857b7b8963934078ba15bdd8e0ea0ab598458c,2024-02-02T02:43:04.313000 CVE-2023-6865,0,0,b9c37e4d0ba7ec873822e966e08af99b2b77ababb4bc90dee769ee885b36f3e3,2024-02-02T02:35:21.153000 -CVE-2023-6866,0,1,026f45b2ea006fe58e8046ec854bf61af71db436a55550677e807557477170ce,2024-08-27T19:35:11.017000 +CVE-2023-6866,0,0,026f45b2ea006fe58e8046ec854bf61af71db436a55550677e807557477170ce,2024-08-27T19:35:11.017000 CVE-2023-6867,0,0,e3e533f686cb2fd910d1e7dc3c9fd7b13937ad3edd80102ad523cb4cf11cb2a2,2024-02-02T02:35:33.273000 CVE-2023-6868,0,0,338cad8c668583cd610935a543e25a5ac1c5568066e99fa943a852eb585b07c9,2024-02-02T02:28:41.527000 CVE-2023-6869,0,0,c23894de21c0ee58cff6be5d86c0cf3b818bb8805eaf7648088ca6fce5e12cbe,2024-02-02T02:29:05.143000 @@ -241033,7 +241033,7 @@ CVE-2023-7199,0,0,7fcbe259d20201c10ad578efc1c05c377a6a8fc49b3acd43a344638021f70e CVE-2023-7200,0,0,05aef04622bd9082cf94e1c4c461689ce9157dda8206e289add72948eb0d9e44,2024-02-05T17:53:25.507000 CVE-2023-7201,0,0,55461a5ee7b02c8b550e9636b969f06ebb8006d885484f898da4572f1c52dce5,2024-08-09T20:35:01.913000 CVE-2023-7202,0,0,3d7767ba1a68ceff52d69147847b98681cda6e14d4cb2b7afe6dd9b3cda304be,2024-02-27T14:20:06.637000 -CVE-2023-7203,0,0,a8f474e181b2344b8d51336d5c183f38405241a1ddb2420ccd6860459426466e,2024-02-27T14:20:06.637000 +CVE-2023-7203,0,1,f953e0b969e121bff5ec9cb6a352ca135596c739c3e01b5320c711781a426aa8,2024-08-27T21:35:05.583000 CVE-2023-7204,0,0,5e33689724491896a48ff27dfb51ce9e745c1e8c4309beca2df0a07e035999e4,2024-02-05T16:45:16.630000 CVE-2023-7206,0,0,a7d099ed69969472f4a2925ddb9a9fdd0dea4bb988ce62fa7bc967ea8205a18f,2024-01-23T20:59:09.030000 CVE-2023-7207,0,0,5e369d6d2c974195ba2439b35d054ee1e64e9f8c56941ddc45c67eeb2ade1aba,2024-02-29T13:49:29.390000 @@ -241124,7 +241124,7 @@ CVE-2024-0041,0,0,f01015c1847295eb8ef5594ac607bfd052422fd5f2a025c578fd946cd87d40 CVE-2024-0042,0,0,34dd3c01d1963f1fea072b87cd9587b8d1a38074bff497ca57638675955e85e5,2024-07-08T14:16:55.973000 CVE-2024-0043,0,0,f3099d06b40cffee02572b8511d5ab7fd4ed425254fa8e65e2f8173e0b0fad0e,2024-07-03T01:44:34.530000 CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c477c,2024-07-03T01:44:34.730000 -CVE-2024-0045,0,1,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000 +CVE-2024-0045,0,0,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000 CVE-2024-0046,0,0,652dd2830858c9f5da14ce2fb1063779ed8d3adc9358318f9bd8799e5a854450,2024-08-05T20:35:02.317000 CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000 CVE-2024-0048,0,0,30be6e3e50a23d26d89c4e1eb4fa3a008e8939a0b64350645365e22b39561aec,2024-03-12T12:40:13.500000 @@ -241271,7 +241271,7 @@ CVE-2024-0254,0,0,de302d5d0ac8333076bd57fcf27799860f8cd9a96dba5b5199660ac1c1c9aa CVE-2024-0255,0,0,afbd5a5a3eb07143ea6a540bb91423dcbd767857bf8de1817834725449712d8e,2024-02-07T23:31:10.567000 CVE-2024-0256,0,0,b6e196abc3ef115e245cef14caea6a454bbd5c0b69e9db2f674093da7a713844,2024-02-14T19:17:28.387000 CVE-2024-0257,0,0,258560867c3af1d170317d16f1c8425f6150f32ff89af20f60461ed912252e8a,2024-04-18T13:04:28.900000 -CVE-2024-0258,0,1,551a6ac7facbbca52d2de02756963fdecfce7587c74d0cb2ed34ee67b54e682f,2024-08-27T18:35:03.520000 +CVE-2024-0258,0,0,551a6ac7facbbca52d2de02756963fdecfce7587c74d0cb2ed34ee67b54e682f,2024-08-27T18:35:03.520000 CVE-2024-0259,0,0,d7f7cd8d41ff0a11823d2692a68cbbacf9b166214b16e2d0bdbff3371b417bb7,2024-03-28T16:07:30.893000 CVE-2024-0260,0,0,e1b3063fcd2c6d587cf09d60a45fc6e58a9abb0e8cb5ee779a27cc08a4f45cd8,2024-05-17T02:34:26.090000 CVE-2024-0261,0,0,b930dccca83fd43f2f5c9c9f3d5ed2e051b85cae130cf567cd9c1a232d3d169b,2024-05-17T02:34:26.227000 @@ -242278,7 +242278,7 @@ CVE-2024-1329,0,0,2cd50cabd5bf81a4f9539c2a3a992a874338213f75ad414ccf75d557c03754 CVE-2024-1330,0,0,0875f448ca8ca2cb13f0b11aa8869613059f2ee4aef3a7abb81ead9c5c3d291a,2024-06-28T13:30:35.033000 CVE-2024-1331,0,0,6c977f20f6f7bde4755773555c00e763bf8e9a163fc61da4ae97f1dd32b908a9,2024-03-18T19:40:00.173000 CVE-2024-1332,0,0,b1d0012a9e40c173cc8f28116508227ff7724ad8f4f969c3dc5f4b0e2f08d038,2024-05-24T13:03:05.093000 -CVE-2024-1333,0,0,1e3290ae94ee741809ce16d0893530241a753f0f499ac4b7ba0b7c176ec9e744,2024-03-18T19:40:00.173000 +CVE-2024-1333,0,1,bd53e9cdde226b8c165843c67dcea5ab4ff36ead472bf29231b1c2f3f1abcb85,2024-08-27T21:35:07.153000 CVE-2024-1334,0,0,fe4c6be53440216c757c2bf51b270a3930f5c7dd35674ef18ead1fe70ed3fa7c,2024-02-29T13:49:29.390000 CVE-2024-1335,0,0,af4094637dce6933c4e8c1a0249e6f9215915a6cfe1e3de8ccdd5083b12e5b3e,2024-02-29T13:49:29.390000 CVE-2024-1336,0,0,cdace28f43b2cbdb92ea812044244ff83c38d381c309acf48b370ec5324ff543,2024-02-29T13:49:29.390000 @@ -242476,7 +242476,7 @@ CVE-2024-1537,0,0,0fbbb428e5d6117794e506ac85f652d85cda102f4ab0cd6387f39041bf7253 CVE-2024-1538,0,0,9fc7289e31e07bb56b9eb9128e9d1b6ba097152ab59ee8378f006443d204bcca,2024-03-21T12:58:51.093000 CVE-2024-1540,0,0,8f40fefee3c1d81db1cb09d26a976b077353ff3be5e21ad7faf7c16fdb309e83,2024-04-16T12:15:09.617000 CVE-2024-1541,0,0,b86c8271de1114c26151c28b4a73ced0b46884833e2a03ab8cf945b436dc1143,2024-03-13T18:15:58.530000 -CVE-2024-1544,1,1,72c4561a2f6f9312b7f0081c7f9795f87578b8288b82adf21b60ce4ab66bb119,2024-08-27T19:15:16.547000 +CVE-2024-1544,0,0,72c4561a2f6f9312b7f0081c7f9795f87578b8288b82adf21b60ce4ab66bb119,2024-08-27T19:15:16.547000 CVE-2024-1546,0,0,25cf53baa34bb0b4805c5fe628b82b62aabfaaa6638a62497af9e0de14b093ff,2024-03-04T09:15:37.650000 CVE-2024-1547,0,0,8590deab7ee2956de6a0ef76618a6a96ff52727cdbc8e57258f00f60bb5d5bd4,2024-03-04T09:15:37.740000 CVE-2024-1548,0,0,6eee3f01728ed0fd4a2424a0afe7c369619c5f5c30c8c9a39afa9061aca1df3f,2024-03-04T09:15:37.787000 @@ -242837,7 +242837,7 @@ CVE-2024-1935,0,0,ca5903a177c0640c0e970926382a56ffbeaa4621c2c3291cf867a2ac2d3da5 CVE-2024-1936,0,0,3c4877f8a7a72f4b22538c5fabddaf31798256327c12415bddcc418bc5a6e33c,2024-08-08T21:35:03.480000 CVE-2024-1937,0,0,7a30bc166390d821e1f1e23579a9b82c6e7a58933428574c00dfd39409fe3c39,2024-07-16T13:43:58.773000 CVE-2024-1938,0,0,c00952c8fb5bee70009fa8cb4edae0ee23e0cf49f38d1396820ee571c21d4610,2024-03-07T23:15:07.177000 -CVE-2024-1939,0,0,bb8e8d14c3c98da37e63f3c0963deaed3de9feadfccc15528efb01aca2c53754,2024-03-07T23:15:07.250000 +CVE-2024-1939,0,1,7635ee63b7a711f60a96b5ac9be806a92dc586d1be5007d27a4ea5f2f8739d3c,2024-08-27T21:35:07.627000 CVE-2024-1940,0,0,4f9f4862eb1e6b7652f757b60ccb034b4f77619e6171d9f3805603ac6e0c779f,2024-06-06T13:59:09.023000 CVE-2024-1941,0,0,a76203f312446d946fd2aa0249e4548432f84767e6f8c287b9e182a489b4a8f0,2024-03-01T14:04:26.010000 CVE-2024-1942,0,0,2321ca7eee0154c2cb82152d060c3547789c5982914ff5938ca1cbcde4ae742a,2024-02-29T13:49:29.390000 @@ -242911,7 +242911,7 @@ CVE-2024-20013,0,0,0cc8f90efee1330b92ba88615f3ec683f3b9eb3a4d874bd0cfbac2fba3fe0 CVE-2024-20015,0,0,d1d8bdd6d1fa1f4d1678fcb9177a4ae4da0af52770fa46e26129dd1c299d4bcb,2024-07-03T01:45:45.330000 CVE-2024-20016,0,0,23d42679a125731e1842dc4827fc98ffaa2afa5f0ebd1d4093677bb31bac3891,2024-07-03T01:45:46.207000 CVE-2024-20017,0,0,e4411bd7eb12b9d246eef83a80b95ec8b97573cc1c5495e6919bbf1f3e5f53da,2024-08-26T21:35:05.050000 -CVE-2024-20018,0,0,fdee8f35aa7caf1b76ebb5153dda589ed5f3a39d7e0627457cfb496a915da983,2024-03-04T13:58:23.447000 +CVE-2024-20018,0,1,726df3dd864299e07f583c1e2b849252cfb17de57b97096fe56062a3e8e057c7,2024-08-27T21:35:08.523000 CVE-2024-20019,0,0,9ac59b07fd070968055b3fc5eec95b892ffe4596c92f97cb9ed025632cc29b53,2024-08-01T13:46:17.030000 CVE-2024-2002,0,0,9bb787dd73ad4270fec473ae00d969f2b5c55795bbfeec9dd3a74d6c7578cada,2024-04-19T23:15:10.720000 CVE-2024-20020,0,0,1af2be5239e7889690a24490c95fb1d9708b12f77c9dc96edd896786cba1d93c,2024-03-04T13:58:23.447000 @@ -244827,7 +244827,7 @@ CVE-2024-22853,0,0,bc89e715c02ccddcdd7224ca8b312fb06ea03063bc4da2eba5ae6389033cf CVE-2024-22854,0,0,fe4766229122c652e0af3232fbea71e93fb7b09fb4336c021b2a5471e8b1a0a8,2024-08-16T18:35:04.633000 CVE-2024-22855,0,0,978cea221cbe34e7be3e94946577d6e11833682bc78df01e6099f3765bab7431,2024-07-22T20:12:59.693000 CVE-2024-22856,0,0,6a3f29bbeb760b1b5f19c8ae7d193c6384c770b41fcb22b793b9dc616df88d1a,2024-07-03T01:47:29.290000 -CVE-2024-22857,0,0,480d6ec154598b2115e1c0fff46a01b03a1975a4bbbd9d81d163798d069f2161,2024-04-19T01:15:06.297000 +CVE-2024-22857,0,1,90837a66d9e6be33e61afe64f3e09fe9073b2ba728f4bd27a877f40b8e8bec96,2024-08-27T20:35:09.263000 CVE-2024-22859,0,0,c789fd1319ae29200cfda38411ba15b951620161f2106b97557558350eee1281,2024-08-01T23:15:38.057000 CVE-2024-2286,0,0,fc3de38345e7250de1847678a3c75b899b882491dd016a846094783a88f19f09,2024-03-13T18:15:58.530000 CVE-2024-22860,0,0,12aba2ab78136c3dffb8c67820fb9fd6a9e7cb57e51a620aabd742c3169a2344,2024-02-02T23:38:02.733000 @@ -244868,7 +244868,7 @@ CVE-2024-22927,0,0,1e0f4fff1c087ec66ddb031ba972b653e6994a440487deb552c935f836b3e CVE-2024-2293,0,0,1f43c62daad8cea9745311b2a88bee3b6d51c898b8ab0f8dd55c247625cdf587,2024-03-13T18:15:58.530000 CVE-2024-22936,0,0,686bc27db4679c4d5207398a2aba21d31deab1df5003cc1bfb0b19af7610a9ab,2024-08-26T19:35:04.853000 CVE-2024-22938,0,0,7f7aaef8db8b163f161aa38efb4fcb3a06c8eddd8dbdbf018595b1fb835fd3c0,2024-02-03T00:30:37.107000 -CVE-2024-22939,0,1,fa40a9ad0d9a07998c1b2beaf955f4059b2e71890e0f0e0db2834b6f4d832a94,2024-08-27T19:35:11.597000 +CVE-2024-22939,0,0,fa40a9ad0d9a07998c1b2beaf955f4059b2e71890e0f0e0db2834b6f4d832a94,2024-08-27T19:35:11.597000 CVE-2024-2294,0,0,45cbe5a242b4e6f15f66657918344b9947fa17359306b2613a42546dfde984fb,2024-03-17T22:38:29.433000 CVE-2024-22942,0,0,bed7fb7d476384db5d6cc701e65fd7410d4a74c3a1d5ece54cd874d3be676a5c,2024-01-18T15:15:47.273000 CVE-2024-22949,0,0,0fb23c63ba894e54cc7da946312dd68f1cf3862114d31edc13f496c98d5c8724,2024-08-26T18:35:05.060000 @@ -244893,7 +244893,7 @@ CVE-2024-23034,0,0,185fba04e018fd75cc7280693d16b7c2325d5bee9a6234634e4cb51cdb482 CVE-2024-2304,0,0,7a6fa6835ce03e19777d1515566eb3e4d4f3efe50fd671602fb09a16a89be9e6,2024-03-20T13:00:16.367000 CVE-2024-23049,0,0,b73f0a157e0038910e0455bdc0b6c0241d08960512fdc6ea3e0ab6971c263c58,2024-02-12T17:17:31.967000 CVE-2024-2305,0,0,97f875550e0e4c8e5873acc279a06d7f789ce5ec934af95e7540ce7873288840,2024-04-10T13:23:38.787000 -CVE-2024-23052,0,0,4097f4960be96f653b43d2f836d5dca3d8c4ec346312f61d0886ddb03062f95e,2024-02-29T13:49:29.390000 +CVE-2024-23052,0,1,6e63544b9543a8be6c4c9d7ca85d761282c9d7499422234fa61e57b1028c2c38,2024-08-27T20:35:10.667000 CVE-2024-23054,0,0,7a4436b0ce2b8f811851624479923281ac594f0e57d9c7febac6e9ac0a1c183e,2024-07-03T01:47:31.317000 CVE-2024-23055,0,0,39a1da2046599a541095e649cd1467da192eafbb8c83bda6ccc7f637566b20d9,2024-02-02T17:05:51.857000 CVE-2024-23057,0,0,2218d64a30d73db0e74233de4e6dc330e27ab4fd0ad1c511327e73cfb1c9a5a3,2024-01-18T15:16:24.097000 @@ -245091,7 +245091,7 @@ CVE-2024-23281,0,0,ebcc57daef885f64cd010edceca3c55445d6724dba570bb6546aefcf9b9ee CVE-2024-23282,0,0,c62334a5e57c1243f61646f2eedad046b36ab2f26cdcb61d7623edf7cfea6e41,2024-06-27T14:49:57.547000 CVE-2024-23283,0,0,1f095cdd8b34f411aaa62314ba1c3f2a94f230aab686eb84d27f0d98461ba616,2024-03-13T23:15:47.470000 CVE-2024-23284,0,0,65ec6190d01341e583d233a656fc9dacb2a5d33dd6ef8512150ae4498bbdfe93,2024-05-07T06:15:08.473000 -CVE-2024-23285,0,0,4ebe01a43c630cc77720d9ba9f95f3bc6ab0247303b278a8661f0306226ef86d,2024-03-13T21:15:58.280000 +CVE-2024-23285,0,1,5a0d4d7d553005e90735503704fdc16408a5286a022afa1dff47851a5d56c396,2024-08-27T21:35:09.383000 CVE-2024-23286,0,0,f8f0ff0a8076d1acdcd931a303004a0abe139b7ebcc3b6a020d77caf3a452f67,2024-08-01T13:47:15.157000 CVE-2024-23287,0,0,112483d9936a74ffcff3d96013576a1bfbb7b8c01b845a9cbe424d560297f227,2024-03-13T22:15:11.120000 CVE-2024-23288,0,0,26b1136d0d4444408c9f51d02208acadeac0b309c2fd8cd24b38e5f71e3d14bf,2024-03-13T22:15:11.173000 @@ -245430,7 +245430,7 @@ CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c01a4,2024-08-01T23:15:47.180000 CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000 CVE-2024-23726,0,0,49bfb3e940abfa1d8c182442ad4bd7c2d671bcc24ce62cd25d7197deab52125c,2024-01-29T15:25:36.090000 -CVE-2024-23727,0,0,f69939e0ef14dd6612a53b973d502454f89e1f35e963c0b541f012fdf69dd089,2024-03-29T12:45:02.937000 +CVE-2024-23727,0,1,592bbfc6743ffdc567de726020ae92e431981a0ee03b44a5f9f75f8f4a11ab64,2024-08-27T20:35:12.230000 CVE-2024-23729,0,0,b362985433849942fa57ffb7c60805e017ed14757dbdcdaedfa5548bdf2c9bac,2024-08-20T21:35:01.253000 CVE-2024-23730,0,0,4088c5b420c8561e609e86e9e6639362f96648106817a43f2c436ecb5e3da5bc,2024-01-29T15:22:56.753000 CVE-2024-23731,0,0,9e444542e77d768ae255d5361c86689c30d0d3ff31dd7c8827b69cb99e58f1a3,2024-01-26T21:11:25.430000 @@ -245670,7 +245670,7 @@ CVE-2024-24034,0,0,2a4d3db6cf3b4e5048c500ebce4bb202246f9fdd0a665422910e0d80f673d CVE-2024-24035,0,0,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98037,2024-08-15T21:35:04.070000 CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000 CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000 -CVE-2024-24042,0,0,6dc779be2a8b1425083e370c5845f2cde7c5662e2542d528419ae61ff3ec779e,2024-03-19T13:26:46 +CVE-2024-24042,0,1,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f8187d,2024-08-27T21:35:10.387000 CVE-2024-24043,0,0,e1968910fbe3303046e08aad0f620638588dfecc0e402ebdf747bad91bf95f6f,2024-03-19T13:26:46 CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000 CVE-2024-24050,0,0,d8a497c77556b4efbe72dd469fd71e81b74bd8a1e54cb63f7dab3892d7471943,2024-03-21T12:58:51.093000 @@ -245765,8 +245765,8 @@ CVE-2024-2427,0,0,b0757ab75f0400edae9d950cbdec282681ae2c529e223ad943f03f224d16bb CVE-2024-24272,0,0,4b14a40c86d30bd4b4b5c3619fa514717e09115a8266eca11e7a200787f14434,2024-03-22T12:45:36.130000 CVE-2024-24275,0,0,bf48a834dac897664e81f3748e0f4d5c238116fb25905911687313cd54945ebb,2024-03-06T15:18:08.093000 CVE-2024-24276,0,0,5140333f0f3ce7a82f9d915e370db57d18b1db0fa2de019f6fd8e7318dc67fe0,2024-03-06T15:18:08.093000 -CVE-2024-24278,0,0,d7869ab6c919ec986039391f19367c9df30528566a3ce8a652c5c0ef74c710f2,2024-03-06T15:18:08.093000 -CVE-2024-24279,0,1,b22eaf070f797d5199ab4939d0b1561987350af33b4eba21e4910bbae462641a,2024-08-27T18:35:04.047000 +CVE-2024-24278,0,1,14023ded6ebd46997e823f79bcda294b012ff332364bf6b30ca9ff4ad7b1ffac,2024-08-27T21:35:11.103000 +CVE-2024-24279,0,0,b22eaf070f797d5199ab4939d0b1561987350af33b4eba21e4910bbae462641a,2024-08-27T18:35:04.047000 CVE-2024-2428,0,0,f184833127d40a3257c1a8462b863bcb6fd84f065fdcd9226171beea0b538ed9,2024-04-10T13:23:38.787000 CVE-2024-2429,0,0,bb9579e5fb707a5112fccfd7e64c52901e3e44384ceafa5a0281658740d435e7,2024-08-09T20:35:03.443000 CVE-2024-24291,0,0,f9a99cce2d5669fe488c53da57cec1a603932ca409a68a957e4a3be597d5560e,2024-02-13T20:13:26.593000 @@ -245774,7 +245774,7 @@ CVE-2024-24293,0,0,c875e8188ccf3b7557555abd825e181af9a9ca32c0aff4644dac65d414c40 CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000 CVE-2024-2430,0,0,c79cca8eeb2327c37f864866fd920048670109f57492fac8de77c9e62b23498e,2024-08-01T13:49:46.040000 CVE-2024-24300,0,0,388744db6c38cccadb0f3dab4d8ce8dfab7613b9109ff67770c2e72952f5ecca,2024-08-16T19:35:04.613000 -CVE-2024-24301,0,1,256e1ac7c5e57b966441832bc0186e8eec5e7968102bcacccc4a55d7062ca9ac,2024-08-27T19:35:12.480000 +CVE-2024-24301,0,0,256e1ac7c5e57b966441832bc0186e8eec5e7968102bcacccc4a55d7062ca9ac,2024-08-27T19:35:12.480000 CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000 CVE-2024-24303,0,0,cd85a5d3f2b2d1dbd56e108e3a3fef9929c977d30264ca372079e7b09a9a8077,2024-08-23T08:35:02.017000 CVE-2024-24304,0,0,da2049d6e037296a577319f7d1190adf56def2498ce12560f8feb099b85c1170,2024-02-14T19:54:48.247000 @@ -245971,7 +245971,7 @@ CVE-2024-24720,0,0,116148208b713005301f5cf40f7ed4d29a4a646b11c4e3748d94824457651 CVE-2024-24721,0,0,cc501af2f363293d6bbcb033e643fca22423d4b5f2a3dc57ffee4b6412c8c2b9,2024-08-12T18:35:31.143000 CVE-2024-24722,0,0,5c00076d5903b9adf702f9584a80b15289fd6952952bdabe5514eebef63f696b,2024-02-20T19:50:53.960000 CVE-2024-24724,0,0,987b03154d8c04503d355cf1ee5e3a5f82060d437b582c3cf8e7d7248a9afa9d,2024-08-16T16:35:03.010000 -CVE-2024-24725,0,1,abcdbf333e953117e91fbd719efd3f28f2197c31afd05d1b1f71cb089103575c,2024-08-27T18:35:04.830000 +CVE-2024-24725,0,0,abcdbf333e953117e91fbd719efd3f28f2197c31afd05d1b1f71cb089103575c,2024-08-27T18:35:04.830000 CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000 CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000 CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000 @@ -246261,7 +246261,7 @@ CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2 CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000 CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000 -CVE-2024-25081,0,1,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000 +CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000 CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000 CVE-2024-25083,0,0,9d2f407cabf3a12bbd22cd36b42859a90ce2fc840877d4b234c6f6f10f6ee54c,2024-02-16T21:39:50.223000 CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 @@ -246389,7 +246389,7 @@ CVE-2024-25247,0,0,ab2310eaee56de1de164bfca1384c871cff2ff3f63e8fd76d282fe213ac9b CVE-2024-25248,0,0,85a95ddef72624693badd910c5990ea343aa2186c64389d2338c92abc89ed483,2024-02-27T14:20:06.637000 CVE-2024-25249,0,0,c8f53501756495a734a74ff7add6ed7b337966c8ca29065859babe4290aeef04,2024-02-22T19:07:27.197000 CVE-2024-2525,0,0,0cd1ed7faad83b5a9e935ff66736a2f3ef52e3e5ca65ec7de6d2b90849c09724,2024-06-11T18:15:13.263000 -CVE-2024-25250,0,0,090be68f47c80835d24ec3c2cbb5b30c9c5655c9e4ba514f2cf945a0eb748609,2024-03-14T12:52:16.723000 +CVE-2024-25250,0,1,30390a3108791fc3d353462d14426df849232b29aa14c37ad0af97fffe69a039,2024-08-27T20:35:13.350000 CVE-2024-25251,0,0,4d70de3df6118fbe7d3792c31913c0db5782c21a7d7e078c726229fd1ced9ad9,2024-08-16T18:35:06.257000 CVE-2024-2526,0,0,da44cbcd46359ce613873d7604fc44e9ca075cba9a523edc17aed5804a21af9d,2024-05-17T02:38:17.223000 CVE-2024-25260,0,0,6fa7a07676f89be99cdfd9160294fea45305c2bf656b7b3f6b3836cc1f08767b,2024-08-01T13:47:38.247000 @@ -246460,7 +246460,7 @@ CVE-2024-25392,0,0,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6 CVE-2024-25393,0,0,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000 CVE-2024-25394,0,0,be9935f7dc1f2a9ef5bc4751361c0c48070487f3d65e34adb53e8eab07ac227f,2024-07-03T01:48:48.800000 CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000 -CVE-2024-25398,0,0,d9ed4e2578e708fde238a2333f8c06b711d373daa3ef2c157ba58fb7d13ba18b,2024-02-28T14:07:00.563000 +CVE-2024-25398,0,1,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c7179a,2024-08-27T21:35:12.350000 CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000 CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000 CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000 @@ -246500,10 +246500,10 @@ CVE-2024-2546,0,0,08a8dee38ee812f84c4c40bdcc0668312236b55abd93840557efb145295c9c CVE-2024-25461,0,0,8db6a140bbc64b5af9f21a58ef0d9e6bf050fd6cc1f8f9c53b140972b95af9fe,2024-08-15T20:35:03.633000 CVE-2024-25466,0,0,2faf3b324b5dce58436df6bdaa090161fa7f0a0215834608518ab712a3442436,2024-08-19T20:35:06.837000 CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e72c,2024-02-20T19:50:53.960000 -CVE-2024-25469,0,1,557b8a68044694189954e70cb5b5e2ebf1ecf04b2586629d7bb1e69d0af34ee0,2024-08-27T19:35:14.107000 +CVE-2024-25469,0,0,557b8a68044694189954e70cb5b5e2ebf1ecf04b2586629d7bb1e69d0af34ee0,2024-08-27T19:35:14.107000 CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000 CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000 -CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000 +CVE-2024-25501,0,1,53c57009bf13ac9e81165c240313efc6336b1030bc10f61986ac8903ee95ed6c,2024-08-27T20:35:14.160000 CVE-2024-25502,0,0,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000 CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000 CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e463,2024-08-01T13:47:45.357000 @@ -246621,7 +246621,7 @@ CVE-2024-25644,0,0,3219e2e709e527015a48516ae6dfaf602d72b63a8b92f510428759964fa2e CVE-2024-25645,0,0,5e73536a8c6d34e4b421ffd125622fb4637ca2ae5f29dc9f1d9e4ca68f957637,2024-03-12T12:40:13.500000 CVE-2024-25646,0,0,f96a3838d7373a7e4c4d8dbfc1fa5fddee970ebb06619f04a6a27f836ef12886,2024-04-09T12:48:04.090000 CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedfb11,2024-04-30T17:52:35.057000 -CVE-2024-25649,0,1,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000 +CVE-2024-25649,0,0,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000 CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000 CVE-2024-25650,0,0,01debd251b64ab98dbfb6f9755755f4a861dcf15301c1f9d4cc42c00838c070f,2024-03-14T12:52:16.723000 CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f69d,2024-08-22T19:35:16.053000 @@ -246690,7 +246690,7 @@ CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e CVE-2024-25746,0,0,aff52edf515c4bb2be3d1c40746c76af6ee680ba5675ccdda5ccab353d740e3d,2024-02-23T02:42:54.547000 CVE-2024-25748,0,0,9695611fe06c6e9b93fbd1431628cb47d8b27d680e5e9e22412df114dd60e72e,2024-02-23T02:42:54.547000 CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000 -CVE-2024-25751,0,1,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000 +CVE-2024-25751,0,0,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000 CVE-2024-25753,0,0,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000 CVE-2024-25756,0,0,5722ed90ddd6ea44b0d78f4422f1171f91100e701c27eb307eef69402053a071,2024-08-01T13:47:52.407000 CVE-2024-2576,0,0,fdb4f97a9caf3f079cc26ac1dc9f3230cca21d1c295263c699c8006e571cd963,2024-06-21T19:15:30.217000 @@ -246724,7 +246724,7 @@ CVE-2024-25841,0,0,1e884690076a8543014dd1ef44f68620ac511f194d49881f814cb46199163 CVE-2024-25842,0,0,879059a526422c3229bcab4008d9de7b4b9aa3260c695660b9b79560bfbb710d,2024-08-21T16:35:03.457000 CVE-2024-25843,0,0,b7ce35c602cb66544422a9541b1ca352e3e23db5766bb19933b8ddd232d2536b,2024-02-28T14:06:45.783000 CVE-2024-25844,0,0,1efbddea52e96516cb009d14a44c252f988b870416e9c0cb454ea358f81c127b,2024-03-04T13:58:23.447000 -CVE-2024-25845,0,0,951e74ea3ea891e8023acd490009fca43f510ba7102419911edb4e33d96aa8f4,2024-03-08T14:02:57.420000 +CVE-2024-25845,0,1,f312beb2aa8aad65c6f2e2cd8b391abcdec4221175ade5509f4776c9d68bd6f9,2024-08-27T20:35:14.373000 CVE-2024-25846,0,0,1b01ded1319f85d0e1b31b4bad3147fa711a456779b7a8a2cc484b2fe23c37c9,2024-08-08T20:35:05.147000 CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde784,2024-08-01T13:47:53.253000 CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000 @@ -246733,7 +246733,7 @@ CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c CVE-2024-25850,0,0,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000 CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000 CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000 -CVE-2024-25854,0,1,44f4f18783a518014d6e03af20d6bc0b5fc3bde62ddf95f44bcd216cec489e6e,2024-08-27T19:35:16.580000 +CVE-2024-25854,0,0,44f4f18783a518014d6e03af20d6bc0b5fc3bde62ddf95f44bcd216cec489e6e,2024-08-27T19:35:16.580000 CVE-2024-25858,0,0,a5cba2d53e795893941edce58201624f227bda6d68ecbb5cef1d602282ede544,2024-08-19T21:35:05.770000 CVE-2024-25859,0,0,5d3416d33baad6c5419dcee926eb2da1abee7dd2d03a2d827cc53b262fcccd60,2024-02-29T13:49:47.277000 CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000 @@ -246741,11 +246741,11 @@ CVE-2024-25864,0,0,2a09b4ab74072b776577b1c00a1bf5c268c139c75079ed692d71dc30af731 CVE-2024-25865,0,0,9dd00ecb01423656380096aa5e060fbe6dfb829859154529d4f81246070dea21,2024-03-04T13:58:23.447000 CVE-2024-25866,0,0,9800d1d73cf4e02f2835e7808c820220d82c6c39d582e9178e2e2aa396a9c576,2024-02-29T13:49:47.277000 CVE-2024-25867,0,0,8e55f36e4f1b56edc96022f211fe880b4aa76b96735d12ae86aa863ef60ef510,2024-02-29T13:49:47.277000 -CVE-2024-25868,0,0,79e7e664441558838d5a1bb760dc0511d86ac2459634e03e0e20d259b84c2b90,2024-02-29T13:49:47.277000 +CVE-2024-25868,0,1,8468e8c7cd26d2e5838f8da558add0a0ea34e7d6538ad367885aebb852006e2e,2024-08-27T20:35:15.173000 CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb467,2024-08-01T13:47:55.047000 CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded5337,2024-03-18T19:40:00.173000 CVE-2024-25873,0,0,b0ef6e77600c842b742f164755ad8cfeb8283e0b096faea6d4ca3226ee47f51d,2024-08-26T19:35:23.777000 -CVE-2024-25874,0,1,88ae9cad6df17a6b755158813094243d8c75451396169285ca83aa1d99653257,2024-08-27T19:35:17.383000 +CVE-2024-25874,0,0,88ae9cad6df17a6b755158813094243d8c75451396169285ca83aa1d99653257,2024-08-27T19:35:17.383000 CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000 CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000 CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000 @@ -246849,7 +246849,7 @@ CVE-2024-25982,0,0,f8af1a29110ee968138adae4a4ee7910a7f55c91defb802acc09cd8063cc4 CVE-2024-25983,0,0,ec86262059173b450d70394c8fdc0a34b81c6488b2878e8e7196a03f2172abd1,2024-02-29T03:15:07.400000 CVE-2024-25984,0,0,64e548d2e443901531a9ec1085e1856812a9a54d9d7ebdd08a9f652f3a0624e0,2024-03-12T12:40:13.500000 CVE-2024-25985,0,0,08229a37145318c68750c211332095ba60f9ade88045aa0b42eccab31abdb3df,2024-08-26T16:35:04.610000 -CVE-2024-25986,0,0,c0fd87c623add3d58f4f281ccbdef7a052606faa35f4b725e1a1b168564f1b9e,2024-03-12T12:40:13.500000 +CVE-2024-25986,0,1,6735b718268e64111068f5ebc6772668a3bf5fe0026ae587609c465228284d51,2024-08-27T21:35:13.333000 CVE-2024-25987,0,0,7a68506c14769106fda0cbfc1db625699c9547a7f9a994c056fa1a40c1bf6a05,2024-08-05T18:35:08.657000 CVE-2024-25988,0,0,4d3755e0cb58d1efcbf1b6d7ecbada9d6035144f60554212c375d75d29d795a6,2024-08-27T15:35:07.483000 CVE-2024-25989,0,0,14738c46f94e94e6b7897446658f285f8e9a188c6fec45e970fce017c50eb02e,2024-03-12T12:40:13.500000 @@ -247179,7 +247179,7 @@ CVE-2024-26329,0,0,3b0eb6608df7a74fc8a9d5773ed651310cd73a96d8ef2afac673200b44939 CVE-2024-2633,0,0,5cbc6482108bfabb58a338263ca9ce41f75b102c0fb9b1f68c08206c04598c5e,2024-03-19T13:26:46 CVE-2024-26330,0,0,43c5693791b1d02b9d7798238f11c123e60d8efcdc6edf6504f348d47ce89d17,2024-06-14T20:15:10.707000 CVE-2024-26331,0,0,1ee618c6a83f1d80e2b7639e36ef676bbc9cac1ae9fe1beda2944758bd324a0a,2024-08-06T19:35:02.510000 -CVE-2024-26333,0,0,b1cea056339002e99d9bf9185df649d82056af2e367b04b31b3cefe428697523,2024-03-05T13:41:01.900000 +CVE-2024-26333,0,1,78a7903614469db5e139b4859192a086da7ef430332351736d0708cc1646b112,2024-08-27T20:35:16.533000 CVE-2024-26334,0,0,c4437261365c34b0c82620f49b29da2640bc282957b56466a05a422e7da76225,2024-08-01T13:48:08.113000 CVE-2024-26335,0,0,2875506bc0b27f814479c6546f230498e9059635d5fba5dacc2e8aca87549ae7,2024-03-05T13:41:01.900000 CVE-2024-26337,0,0,7467ba20b2aeab6e4e0eaef1a28ecf7afdd08548bd8662f66e13c78023ac14dc,2024-03-05T13:41:01.900000 @@ -247218,7 +247218,7 @@ CVE-2024-26468,0,0,def1bc4284fa411449589c5e4214627b54a1a33219fd215b1c6f274069ece CVE-2024-26469,0,0,202a3878dd7ca90a2deb83f9c6068be468c522265741b212613bae7399baf445,2024-03-04T13:58:23.447000 CVE-2024-2647,0,0,dc044af22784e4db6ad7522cd4841e4dbc9efce24abfd075978f936ae875c263,2024-05-17T02:38:23.120000 CVE-2024-26470,0,0,c7b5d7dc6fff2b462a4e7b75eff02406620bfb4a3f9caec2a7328aed1e8f840f,2024-02-29T13:49:29.390000 -CVE-2024-26471,0,0,5dbb9db863f2ecb85175151dd07b7abf24b2932cfb9a14c2dff9b6fbe33e6387,2024-02-29T13:49:29.390000 +CVE-2024-26471,0,1,638407be95241af8b802e909dd749dda860405db3eaaa59ad63e6686ac6163d0,2024-08-27T20:35:17.533000 CVE-2024-26472,0,0,3ea665ae7d8c4cb8ea3ef77beb55f90d75bb053da605750b4803b40c300fd840,2024-03-08T21:15:07.193000 CVE-2024-26473,0,0,fc9f75146122995e0277d9d0adf8775c5418cc84731af51473c2bfe5d4f1f791,2024-02-29T13:49:29.390000 CVE-2024-26475,0,0,20ad9200302e3e54b711e4fc6343b6cece119754af3510ad17450c27265394ef,2024-03-15T12:53:06.423000 @@ -247241,11 +247241,11 @@ CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6d CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd86,2024-05-14T16:13:02.773000 CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000 CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000 -CVE-2024-26521,0,0,7985e5a46b5dbb7cac5d9bc8fb1bd033c53432230144c1b88c935a11b26cd32a,2024-03-12T12:40:13.500000 +CVE-2024-26521,0,1,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000 CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c1ab,2024-03-13T12:33:51.697000 CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000 CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000 -CVE-2024-26540,0,1,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000 +CVE-2024-26540,0,0,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000 CVE-2024-26542,0,0,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec010e,2024-08-15T21:35:10.243000 CVE-2024-26548,0,0,a14221a020c4eadf543d91f52da71379b261a56fd8977996e8b1456e032b4731,2024-03-01T14:04:26.010000 CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d6e,2024-04-10T13:23:38.787000 @@ -247925,7 +247925,7 @@ CVE-2024-27201,0,0,f4057db407cc0b2cb15b83d5bfcc727fb8fffbe5df642064a2f39b01d31b3 CVE-2024-27202,0,0,dec3b871d77de488d2204727c8b45ba74ac889892271b3051ec433c7b5758780,2024-05-08T17:05:24.083000 CVE-2024-27204,0,0,21c5c3d644ab35ec9e83742f3138cff8265e6d21b8f7f41fe9d62eba43137806,2024-08-01T13:48:17.703000 CVE-2024-27205,0,0,ecf8d36db8174c05cf70fb705e25fbf6dd7547ea04c1bccb1a45d9ac9fe3d652,2024-08-26T16:35:05.400000 -CVE-2024-27206,0,0,3dbcbfbe90f7ccf1cbfa262db765dc01c5f5c5d064d48875899ccc34bacdeafb,2024-03-15T20:15:08.743000 +CVE-2024-27206,0,1,96a2916c78feb61b896792d193b4249c75164f4a5a97c212386717dd50f077ce,2024-08-27T21:35:15.267000 CVE-2024-27207,0,0,9c2ba1f8859e635c52bb4f64d4b0a04f4cc6d5d084308215e2bb1b9341c49fd3,2024-08-05T18:35:09.463000 CVE-2024-27208,0,0,b9c303c340845424369628aa61a96b5551f82ce7ac653714cab34929026920e5,2024-08-27T15:35:09.323000 CVE-2024-27209,0,0,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f24a3,2024-08-22T20:35:06.747000 @@ -247940,7 +247940,7 @@ CVE-2024-27218,0,0,b2b126ff7fe34ab697f8634bcd6e10d8f03d8a1ff2b55462d7717768f1583 CVE-2024-27219,0,0,6380ac10382315d4da0453b5e48de21d3e106d94e656f543da93609a89c868c9,2024-08-15T20:35:06.643000 CVE-2024-2722,0,0,3d547fbfae7104f0dbf6c0b76ddd02751536ed8c09a63381f891ff8e3f28de99,2024-03-22T15:34:43.663000 CVE-2024-27220,0,0,9e42cc406e1b16ddffbd424b62b76586911d68db1ef5ee823133d22916298517,2024-08-26T16:35:06.173000 -CVE-2024-27221,0,0,275da2c75e59fe51a6d2607d4b2206bfcadad2f1626d8a1a46fd3353d31e8ed1,2024-03-15T20:15:09.050000 +CVE-2024-27221,0,1,0b9e9b937a1b9e138bd27417c292991204813b235d6b5129744f85ce4729872d,2024-08-27T21:35:16.047000 CVE-2024-27222,0,0,628d34a7a6bc07d71cb2e1c85581ef034de82cd46a15b7c424080a08ed0a02c0,2024-08-05T18:35:10.287000 CVE-2024-27223,0,0,cf3a2ced12b4a3bf155534028aaccdd6d95cd0b4d2f10d3ca759d3a4dee62fdb,2024-03-12T12:40:13.500000 CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213aabe,2024-08-01T13:48:20.053000 @@ -247989,7 +247989,7 @@ CVE-2024-2728,0,0,894b3321a99e458969cde3c150a59b05eb4a60d79495148d5d2320daac930a CVE-2024-27280,0,0,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000 CVE-2024-27281,0,0,7f2b0f122766f676aed91ef9250b5865f45069fd8c6cab642c57fb3b624ebb3f,2024-08-20T14:35:05.757000 CVE-2024-27282,0,0,f669cfc684d64012ac673e23e33d53feb594d1f7a791cf168d4f1b5ba5e9d336,2024-05-14T16:13:02.773000 -CVE-2024-27283,0,1,447fecf972714152bd28f99db74ce906ef9cb660eeea6370cb0ec328ad746101,2024-08-27T19:35:18.260000 +CVE-2024-27283,0,0,447fecf972714152bd28f99db74ce906ef9cb660eeea6370cb0ec328ad746101,2024-08-27T19:35:18.260000 CVE-2024-27284,0,0,241491a708be706e7f2c13ff6e90e676355e3e9263bb0e5d018a757f3dac5346,2024-02-29T13:49:29.390000 CVE-2024-27285,0,0,0fe4482c13c2e3db37265fee5caab7ccfcdd141d862d09da03f598c92197dec9,2024-03-21T03:15:48.103000 CVE-2024-27286,0,0,9a158c3c4e73ffe42dc0048111eb063701f88df28c22761e894309b2074d3442,2024-03-21T12:58:51.093000 @@ -248191,7 +248191,7 @@ CVE-2024-2754,0,0,b524638ab8c26ee5de4a612af59349eaa47dac80099d3c62a685c43527d635 CVE-2024-27558,0,0,cdc5c9bbabb0962055f32c44c3cf1724a18fd3deb45d5a1d5f5e1c6893a2d72c,2024-08-01T13:48:30.653000 CVE-2024-27559,0,0,e51cb2ad7f7a927a7b9eacf57e9dc02b64201a90b8501b228aa2354a3e2c9bb6,2024-08-01T13:48:31.443000 CVE-2024-2756,0,0,75b6f6197ae09c8882d105c3231ed4371ca476e77e86b0b7a32537424ab828b1,2024-06-10T18:15:30.570000 -CVE-2024-27561,0,0,3ca7922e506f2e58b3ab77ea2274792019f8619a9ef563f326589a5993420327,2024-03-05T18:50:18.333000 +CVE-2024-27561,0,1,6ce2be4677fe6586b03ad8409440e4dc66ce475741185162319744e03b89865e,2024-08-27T20:35:18.613000 CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c14854c,2024-03-05T18:50:18.333000 CVE-2024-27564,0,0,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000 CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000 @@ -248256,7 +248256,7 @@ CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfd CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7df4,2024-08-01T13:48:43.923000 CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000 CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000 -CVE-2024-27703,0,1,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000 +CVE-2024-27703,0,0,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000 CVE-2024-27705,0,0,538b62798ffb3deeb490d879f6c2b0551b7d4dbd846704c9743ab7991d01d3a0,2024-04-04T12:48:41.700000 CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000 CVE-2024-27707,0,0,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000 @@ -248269,8 +248269,8 @@ CVE-2024-27713,0,0,64018e29ddc87ebe0d2c41750aa91592739ce29d689cc79bbf60462239f51 CVE-2024-27715,0,0,b53060ac5f161ba9f8c11867640af89e771d5c1bd0a1ca5106a6746844ca160a,2024-07-08T15:49:22.437000 CVE-2024-27716,0,0,b641573cb295179e8a45c3c6f4e5e6326128a1395653bab45519462f6e6492de,2024-07-08T15:49:22.437000 CVE-2024-27717,0,0,24b56efd365305b6bc14b31a5e0ebd3ded5b43adf71ab9f369b01e76538e669f,2024-07-08T15:49:22.437000 -CVE-2024-27718,0,0,348ef178d7c72ea2bf9561abf13cadc3c1ef45743840695e6b53f9dba8489836,2024-03-05T13:41:01.900000 -CVE-2024-27719,0,1,fe8b836b0fe7e61cc41cd2c649b06140ddc642945672fc471d8dbd746e0bc2f0,2024-08-27T19:35:19.763000 +CVE-2024-27718,0,1,beb42594b734cb0048140d2e82ce6fc0ea6e9f180fe4b67058b308a104f4ffe9,2024-08-27T20:35:19.607000 +CVE-2024-27719,0,0,fe8b836b0fe7e61cc41cd2c649b06140ddc642945672fc471d8dbd746e0bc2f0,2024-08-27T19:35:19.763000 CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c74d,2024-05-20T13:00:34.807000 CVE-2024-27728,0,0,60809830dda72755597fa9fd74cfe701dd5e424bcaf4e985376fe34c8dec441f,2024-08-20T14:35:06.747000 CVE-2024-27729,0,0,ebfc21812e929fc7a4596a0d8e7f868174feb579c24c8114e70bb1b1da144d44,2024-08-19T13:00:23.117000 @@ -248287,7 +248287,7 @@ CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039 CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000 CVE-2024-27752,0,0,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000 CVE-2024-27756,0,0,b54fd87749d37213a5160438750b0b47b1fd109b2bd115842befad1cac3815d4,2024-08-27T14:35:04.107000 -CVE-2024-27757,0,0,cd3b5b6b7fe57179d531119e33f0f74486d4fc8f97f5ac96ca27aa14ec09cd7e,2024-03-18T12:38:25.490000 +CVE-2024-27757,0,1,4b00d5ee174a65616063c08fb38cdcef002d44712d6b45125b042ebe27605660,2024-08-27T21:35:16.843000 CVE-2024-27758,0,0,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7b50,2024-08-01T13:48:45.070000 CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000 CVE-2024-27764,0,0,dcb5f4d1c0bf36ea54d48a35b1fb25d36699fcee8f1dae6b9d2e2eb62b497b1c,2024-03-06T15:18:08.093000 @@ -248522,7 +248522,7 @@ CVE-2024-28009,0,0,1295b369b7f912c584d858c112ab5fd3802ee95266a1bc2b9b3f4b74dc4cd CVE-2024-2801,0,0,2d5a22e62bac6729bf195a0f5a42785f93ed95340bd92529d8be5dbcf9a36707,2024-04-12T12:43:46.210000 CVE-2024-28010,0,0,99860cf8bf9189a8fb49a5935a3491edc3fdb8468d4665570b920e86cd7975a4,2024-07-03T01:51:25.390000 CVE-2024-28011,0,0,ec1006c5935e8d760de76333efd38b99840c283f2953c11510f37a88df55ed13,2024-08-01T16:35:06.820000 -CVE-2024-28012,0,0,fff5a3c5a6489f7f857ce0cb277226928d06e1627967b638ca6a50c2c34a1311,2024-04-02T06:15:15.263000 +CVE-2024-28012,0,1,e012ae22dc59b165868e3646725beb1e1dfe0ef8160b700e32fb967af671545e,2024-08-27T20:35:21.220000 CVE-2024-28013,0,0,d34d9ab6738c9b6fbbe9252c1e4b38b1c7a0cbc80114ae3f60d1ead782bdf97b,2024-04-02T06:15:15.350000 CVE-2024-28014,0,0,16fb600a35cd34a3bc2910bc5d71fb1c433afeb8bbc697318d98ea82c7efb5cf,2024-08-23T19:35:10.900000 CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000 @@ -248636,7 +248636,7 @@ CVE-2024-28155,0,0,fa46fa5813eab2c19fded2a5fcc6d7f577297946cab2c3c8805ebeab5ffeb CVE-2024-28156,0,0,6694cead9cf2c9c343477c2df62ac2a419f27aa12d022b6fef723dd2d72bf187,2024-05-01T18:15:16.973000 CVE-2024-28157,0,0,e8195ee7f7e668974cf7d8246dbfcc0b5132119f0f5390c3a7b5d268b5722878,2024-08-01T13:49:00.507000 CVE-2024-28158,0,0,e11a9678e4f2f0242962248a4f5f96e3f4098382c9b4895b78df62a6d496f942,2024-05-01T18:15:17.063000 -CVE-2024-28159,0,0,85a55ca304f7a61ac8256cd661ed01dcaa3843e7753771d38808f029852bd63d,2024-05-01T18:15:17.100000 +CVE-2024-28159,0,1,4a9f4f91b8aea86a42bde029558a44ab2b24f6212168e8c6c34372a6626e7248,2024-08-27T20:35:21.767000 CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16ff,2024-05-17T02:38:32.100000 CVE-2024-28160,0,0,241bfdb3674a34e6849fc0ad74b8b7e2c84a649745fec71e6a1d767d5a523265,2024-05-01T18:15:17.143000 CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000 @@ -248733,7 +248733,7 @@ CVE-2024-2828,0,0,8900d844f8cfc7f7690e29cda848c134f6d2f92cdafcde758804b06ac18f0c CVE-2024-28283,0,0,8c964af2debb02be4bf42774a10a108d98f03db965bff337f64552cf0b90de18,2024-08-06T16:35:08.440000 CVE-2024-28285,0,0,b6090c2daf8acd83058bc5c38daa9c85b2dd7e03912cb9ab7c02f296ed5f619c,2024-05-14T16:13:02.773000 CVE-2024-28286,0,0,4f67e5d2b8d61419daa7b3eeda1ea695486dcdadf2fd66eaccee73d47ef998e4,2024-08-05T19:35:04.997000 -CVE-2024-28287,0,0,a03ed8e7226853da71a23e5d5fa49a49b41307581cd8848e54e22e0bb77457fd,2024-04-02T18:12:16.283000 +CVE-2024-28287,0,1,c72517617c937d8706d1cec057e532900c4a5dfe1c22dbd1a9afc7a4eff4dadc,2024-08-27T20:35:23.683000 CVE-2024-28288,0,0,f98f2f651d1f736446516dbdbf0d5790dba9ff7967167e34d1d283eb510a3a34,2024-04-01T01:12:59.077000 CVE-2024-2829,0,0,a34e30cdbcaace33af6819d27727866fac8140ba32c20702ce2f1d25edf955a7,2024-04-25T13:18:02.660000 CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f67cb,2024-07-03T01:51:34.303000 @@ -248761,7 +248761,7 @@ CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5 CVE-2024-28344,0,0,07e206e8ae7b1052e93419db971a4a320fe24d9f630cd6feb731f0be928f9073,2024-07-03T01:51:39.137000 CVE-2024-28345,0,0,cbc92eac79dc638752aecc227342bc11a12121c68c4f31449456d516f3ae7ce1,2024-04-10T19:49:51.183000 CVE-2024-2835,0,0,91e1bef30b109ae6896eca4566686f034d0870ed7f02116f35133cb576984e90,2024-05-20T15:17:54.513000 -CVE-2024-28353,0,0,fae653dc50d6e4243ac1a6c40d672c87c70bfc523c9ca45abc034139a8601c18,2024-03-15T12:53:06.423000 +CVE-2024-28353,0,1,022e19aa22146b4caedb0bfd28c7b90fae45345393fe0786df56079912fd09d5,2024-08-27T20:35:25.153000 CVE-2024-28354,0,0,5e46c10ef69862e6eea2ffb6c541bfef197eb3c3e813ae396435434c81bde20a,2024-08-02T21:35:21.047000 CVE-2024-2836,0,0,36495018f88c8d364876859f0fc3fe350f22bae03ce0e1ddfd2fb6841831abfb,2024-07-03T01:53:35.640000 CVE-2024-2837,0,0,ae302668592d4c18e6ec888a73f75aebb0caf04e9adb103971cba34e16c5520b,2024-07-03T01:53:35.850000 @@ -248774,8 +248774,8 @@ CVE-2024-28389,0,0,42acf6cbaebdc461cce2af35b74679c9d1c81ce9114564911b85ebeaf88a2 CVE-2024-2839,0,0,ee45053b5ac83eae18c1a71d98f9817e7025bc9d7e049918f01e284843f64c90,2024-04-02T12:50:42.233000 CVE-2024-28390,0,0,668a15f7dcbbeb37a1e1d9d05ceb4da1149f17d4318e69ac0b18c5f0285d949e,2024-08-22T21:35:03.607000 CVE-2024-28391,0,0,1612464a5045a9dcbfbed51b4145357f41a0970daedd21315ce2194196825398,2024-08-01T13:49:04.167000 -CVE-2024-28392,0,0,5824697cb412e64caabb20f46b93c113a811b02735a0ef2ece011572dc931f0d,2024-03-20T17:18:26.603000 -CVE-2024-28393,0,0,04c598367976d9977c43beb15b030d893b4ef27f3405bd598ddf167ac93764fc,2024-03-25T16:43:06.137000 +CVE-2024-28392,0,1,06cb10a631fd05972f01d306a65738665b321fedeaef5f914b0141bbfeedaa86,2024-08-27T21:35:17.627000 +CVE-2024-28393,0,1,98451f8d9822a6b89492c2246ee689f6a0cd0063a443e3e1e266aaee6d314fd8,2024-08-27T20:35:26.183000 CVE-2024-28394,0,0,deda5a51a503650846c49022c68c524e604146c1517d74b07ab34d848f21e6e1,2024-08-05T17:35:09.203000 CVE-2024-28395,0,0,75690be4a0e06f64f466f922ea142c5dcb8737bca683828d65c2ab40844c2948,2024-08-01T13:49:05.027000 CVE-2024-28396,0,0,e2e5ec394ca570d1a0e7ca873049e09f9ea87c9a858dde784a7ae9cd510f7e8a,2024-03-20T17:18:26.603000 @@ -248791,7 +248791,7 @@ CVE-2024-28417,0,0,f78ede20fcde24d3d7d8bc3dab1ce82d14b3041f2644162129c2ad754c19b CVE-2024-28418,0,0,2a4e7f72113758cf676cf86e709d4c2254271c4bc05c9c8adb6c432f26d0d67c,2024-08-16T16:35:08.140000 CVE-2024-2842,0,0,fb8969f6b6806427a8ba5bfc6ea26b5b1997081ed131de3b61a4fe60370dfde0,2024-03-29T12:45:02.937000 CVE-2024-28421,0,0,1239831c00e8490a8b37a2f0168365916badc596709bff57ac81168b6c37e716,2024-08-05T19:35:05.787000 -CVE-2024-28423,0,0,58a1ef7d35f092e50b1e07fd4013c2973ded6a4e76c11332d68829fd34d7c92f,2024-03-14T20:11:36.180000 +CVE-2024-28423,0,1,9a33511b9acbc6734e64ddad8a17e1aa7ff6051c61a450c834ba534daac8b66b,2024-08-27T21:35:18.580000 CVE-2024-28424,0,0,e4b4381dc8c2db5b39b021eb19f4307a86761881fd7dd9c90c2430220aa415a4,2024-08-01T13:49:06.680000 CVE-2024-28425,0,0,a141e56038f4e753e81d857ec1e84aae2f8aa855ba4e2973635a5dc63a3d9ae9,2024-03-14T20:11:36.180000 CVE-2024-28429,0,0,e30158ef8ee57214c9d29af90d61efbeba28f478616c77ff2129f50c9203273a,2024-08-02T21:35:21.830000 @@ -248905,7 +248905,7 @@ CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5 CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 CVE-2024-2870,0,0,c7537b0655353d8eeb90f5c17425f30e927a579834f6ada2ebebb0410684ac2c,2024-08-01T13:49:56.253000 CVE-2024-2871,0,0,a7a747cc7e44787061231b304b7fa297ab3e10c5c0c5d67f97a2b8176c2eaee9,2024-04-10T13:23:38.787000 -CVE-2024-28713,0,0,683c52f8275705ee96e560652bde14603ddf66171fa872586de4b1b327a40ee2,2024-03-28T20:53:20.813000 +CVE-2024-28713,0,1,60631bbe8556f08b6ffb1706b8163672bc95d30ca176d374b79cb9df294abe1f,2024-08-27T20:35:27.150000 CVE-2024-28714,0,0,18b853be5dc2833c618e4ddbd9bb373d963fc65628b928a515e70d080b0e0346,2024-08-01T13:49:13.347000 CVE-2024-28715,0,0,af77246106a78842a7b294f3e28f52ff784cab47ce869925f80951f17109d52a,2024-03-20T13:00:16.367000 CVE-2024-28716,0,0,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000 @@ -249127,7 +249127,7 @@ CVE-2024-29004,0,0,9ef5b203a98e2d1eebce75b708b2ffc086e9812d18fc5bf73722cd72675a4 CVE-2024-29006,0,0,03ea486bf400d900d0dbda2f2d6e252ead6c17c2d66dc02317ddc11f9fe45793,2024-04-04T12:48:41.700000 CVE-2024-29007,0,0,1bc8f2d51e9e796e6f61421a3cdbc0330cf4aa65f2dfdce8f79200260310a9ff,2024-04-04T12:48:41.700000 CVE-2024-29008,0,0,f986dcdc0241847657d0ebc766a1fd1013cfc1a4d184eb105091595d879be8c3,2024-04-04T12:48:41.700000 -CVE-2024-29009,0,0,6dcd01bf0d59bf460d4cd9884b30a56bb3cb07161c6547e79b2b88789b6150da,2024-08-02T01:15:54.740000 +CVE-2024-29009,0,1,c999c21ebc8ce72023b158b0839d7fb43384cfe622c24110433dc886fa8798b2,2024-08-27T21:35:19.367000 CVE-2024-2901,0,0,e2df063e5347fadf4cf214e5695112bea43ff5509c25d82b3b42077531327e19,2024-05-17T02:38:36.427000 CVE-2024-29010,0,0,a9ff9c65174c33f2e792fcb56ee4004994b28661d6208ebb1e88e717582f6f0d,2024-05-01T19:50:25.633000 CVE-2024-29011,0,0,eb92887d9a2ecd248daea80b2641ebf2c57344e5f41ce9050910fcddaf740a0c,2024-05-01T19:50:25.633000 @@ -249354,11 +249354,11 @@ CVE-2024-29243,0,0,03ec9bb493566015f908bfaebf75ec5d5aedfc39bbc77e2ee770fb19383b2 CVE-2024-29244,0,0,c908da2e34e19d3bf4dc14658c376ac3db45990ef773baf7dc70268f442bf6ab,2024-03-21T15:24:35.093000 CVE-2024-2925,0,0,504f348571b0724954329b33d6f2a7f319fa5d707d1f954272102f96b1330b70,2024-04-02T12:50:42.233000 CVE-2024-2926,0,0,6100f4386bbfe5450836eb65f9370c21adbc96474bbe6cfb9f696f055cca979a,2024-07-05T17:14:10.767000 -CVE-2024-29269,0,1,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000 +CVE-2024-29269,0,0,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000 CVE-2024-2927,0,0,f3bb3c9a30a99b51229870b4966b198934ad11007ef0d3791756757dba92d38b,2024-05-17T02:38:37.557000 CVE-2024-29271,0,0,b4d3906e78736be6eca15d6469d3358952e211c417b217d384055581eda6bf29,2024-03-22T12:45:36.130000 CVE-2024-29272,0,0,b270e02cad18e4df92dae6e1cbf164c1906a980efefcc9e36d9450cec32eecab,2024-08-01T19:36:05.820000 -CVE-2024-29273,0,0,4c07339fa5d18aa28a649c4ec236dc58314e6c0e5cafb23e7bb0325d1434eeb2,2024-03-22T12:45:36.130000 +CVE-2024-29273,0,1,c5afb013b946ae2c73d92fcbdb0c49112c4146cc606c2998618843bfb65fffd8,2024-08-27T21:35:20.250000 CVE-2024-29275,0,0,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000 CVE-2024-29276,0,0,3fe0ff3115a6de0b961257e7bc711a82773397cfe1f1f315880654f9d5c4ac13,2024-08-20T15:35:05.580000 CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734adfd,2024-08-01T13:49:28.357000 @@ -249402,7 +249402,7 @@ CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e0 CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000 CVE-2024-29402,0,0,b3b67ac2f5a71f897648f0dbc8697340f6879726be4aa06cba11c0478007588d,2024-04-17T12:48:07.510000 CVE-2024-2941,0,0,1d46f1daca1d9b41abf5b871e57cb1a154c8989de86923637267a01c87a2e537,2024-06-26T19:15:13.107000 -CVE-2024-29413,0,0,493f53d4b43110a7ef6c57bebf5ca6e237d29210366d7552d76297fd422d6175,2024-04-04T12:48:41.700000 +CVE-2024-29413,0,1,e53aa5e14ae181dd984ec17641b62210a6aaf3e99011fe016e5561f245d20a2f,2024-08-27T20:35:28.013000 CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000 CVE-2024-29417,0,0,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 @@ -249448,7 +249448,7 @@ CVE-2024-29499,0,0,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9 CVE-2024-2950,0,0,596af42449f28aff5b2c79c90b770bb4c97ffb9bc969aaf5cc4ba262b42d972f,2024-04-08T18:49:25.863000 CVE-2024-29500,0,0,2b9af0d3cdf9b55a92126bde2520cf6cbecb1bd416352c1f95dc67e322137065,2024-07-08T14:18:05.667000 CVE-2024-29502,0,0,430553d99f150e3a768b506d8c7614a836291ddb0863f4cad999ccc23bd2277f,2024-04-11T12:47:44.137000 -CVE-2024-29504,0,0,a2b43cdb3ab95704c4bdeac2436aa8d981e304c6b441150c0a9b6f22063d7890,2024-04-11T12:47:44.137000 +CVE-2024-29504,0,1,c8d4771bc57f6638d44adfb94d6bcdcf83c3f9df966567debd1ab6eedf3e1b31,2024-08-27T20:35:28.797000 CVE-2024-29506,0,0,c9a02eb460df4f11fbc78026855fba67bf2371f1d9fd03f640425d6e01ade41d,2024-08-02T20:06:16.967000 CVE-2024-29507,0,0,e3739316b26d2c3b5d54a382ce803d308c0d38eaebe2a9099cd38065884f38e3,2024-07-05T12:55:51.367000 CVE-2024-29508,0,0,d9f02f88857c7ee25a0a60ec8f52d84a64b8fe034ccb745fb67dcf769cbbd248,2024-08-02T20:09:21.813000 @@ -249472,7 +249472,7 @@ CVE-2024-2961,0,0,ba64cd4241d15888be6cf9d01156608d47fe1966db4c3566a7554d9512772f CVE-2024-2962,0,0,70639fb2ff14ea321a660aad1527d4dafa66ceaf617d2db01badc90928927f12,2024-03-27T12:29:30.307000 CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7c0,2024-03-29T12:45:02.937000 CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000 -CVE-2024-29640,0,1,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000 +CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000 CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000 CVE-2024-2965,0,0,695a2f4a5898798fb311965c87e04355b559271ed2851691e85a6cb305dd485e,2024-06-25T11:15:49.873000 CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000 @@ -249480,7 +249480,7 @@ CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d CVE-2024-2966,0,0,400ebec10c52dfe133448a888edcb5c95faf833eae277c5e987b3dc9ba62c6f2,2024-04-11T12:47:44.137000 CVE-2024-29660,0,0,92c6a0243a2c1471ce3712ba9ce2ea71347605bcd635b1e9cc6bc9d49c7bb0d5,2024-07-03T01:52:29.550000 CVE-2024-29661,0,0,88ef154f0ac81ededf103463c2b4906b746fd4986090980f76c4c2bc2515ed30,2024-08-01T13:49:32.940000 -CVE-2024-29666,0,1,f5df78ffef64555b69793081fcf39d87c7422114afd34dcf4903064db05a537c,2024-08-27T18:35:08.177000 +CVE-2024-29666,0,0,f5df78ffef64555b69793081fcf39d87c7422114afd34dcf4903064db05a537c,2024-08-27T18:35:08.177000 CVE-2024-29667,0,0,4118e10082e95e28b5db3ce405eaacc62f74bef151ef94158b87df6d64494dc8,2024-08-01T13:49:33.747000 CVE-2024-2967,0,0,c152c043e13b4423e324e9742145ebebea680255fd320b84aa6fd1c484253799,2024-05-02T18:00:37.360000 CVE-2024-29672,0,0,21274e0a8172ae852f68ce065f3465878b739d5891b6aa07cb248440814e94cf,2024-08-16T15:35:04.670000 @@ -249708,7 +249708,7 @@ CVE-2024-29937,0,0,cb939420c8aa9def2c7d8c3ddc741ff1105375d352c7fe1c0b407f39d0286 CVE-2024-2994,0,0,aaaf2c75d5a02f7deaf00b12c93e19a053ed46c0dbf5e453ed92362aa436eaf9,2024-05-17T02:38:41.503000 CVE-2024-29941,0,0,5268fd2170dfcdffdb652336d23b2a74b8e628a596ea4475ef9d929015e3feda,2024-08-01T13:49:37.723000 CVE-2024-29943,0,0,77fce75b3b79190c7987459c64d58a0451f9c8cb7178727b76412299d4b63e02,2024-08-12T17:35:03.860000 -CVE-2024-29944,0,1,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139be6,2024-08-27T18:35:09.073000 +CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139be6,2024-08-27T18:35:09.073000 CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000 CVE-2024-29946,0,0,140bcfc073bda94d7ef4639048c1485e5634c470063153e21df7be99b584ee7c,2024-08-12T20:35:03.383000 CVE-2024-29947,0,0,5ce72939d2768b5ffd8ef75fa59eeac4277e1fd0f98f69cde2fd39c4873b7e51,2024-04-02T12:50:42.233000 @@ -250312,7 +250312,7 @@ CVE-2024-30583,0,0,83e4e63e6b9ab686c570457f3785d5d14cb1cae9d1e0a6f75af68ee13c536 CVE-2024-30584,0,0,f701e5fd70d7bcd699c1a3224ca536a57369241ce9d81d5610208a9f0a05164c,2024-08-01T13:50:12.260000 CVE-2024-30585,0,0,96551bc458d5db42f46061bae1e9919916a14761a04e80e4824fb8b8309c1b5b,2024-08-01T13:50:13.033000 CVE-2024-30586,0,0,10a50ed2910ce5649dd5e15226d9a03b6b8066ac59e4bb581fb289073e5052d2,2024-08-16T19:35:07.763000 -CVE-2024-30587,0,0,26212ffc265137b5577f89aa78a083bc0658db67b4db407e10f98531cc831f9b,2024-03-28T16:07:30.893000 +CVE-2024-30587,0,1,009e27d4a132dabfa90541741c9d305d5e3da5b0fd2f24ea7cbdd6010df4ad30,2024-08-27T20:35:30.073000 CVE-2024-30588,0,0,08e16a935f9fee8841f929d18032525bac7add60ccde5932cbd5663b4480d43c,2024-08-01T15:35:10.357000 CVE-2024-30589,0,0,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000 CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000 @@ -250322,17 +250322,17 @@ CVE-2024-30592,0,0,507c49506de5111d6c96010bf6286cc127ab92c8bc8bbb896558bfe34d434 CVE-2024-30593,0,0,408d3bb4f55aa72702260e4a6dec5da795a667370808b6fd57e94ac266b7ab6e,2024-08-01T13:50:15.377000 CVE-2024-30594,0,0,031ab14998cc22e319a2672b5d267e5c02bd96f6f8b3034c7bd0cc097da3d0fc,2024-08-16T19:35:08.517000 CVE-2024-30595,0,0,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000 -CVE-2024-30596,0,0,b99268a271e891ed91b1faac1e391fbc00311a41d4ebf80d4427b85cb8e33608,2024-03-28T16:07:30.893000 +CVE-2024-30596,0,1,3e2307388e29cecf1eee26f29964858677d06f5c8613113eca2047417d85c54f,2024-08-27T21:35:21.827000 CVE-2024-30597,0,0,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2f1a,2024-08-01T13:50:16.157000 CVE-2024-30598,0,0,5522799fef0d78c0e4f9a84a19e85c4ae628d4ef9d72cf9af60f6cc653518431,2024-03-28T16:07:30.893000 CVE-2024-30599,0,0,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000 CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000 -CVE-2024-30600,0,1,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000 +CVE-2024-30600,0,0,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000 CVE-2024-30601,0,0,9dfac2db560029d7902d4500ce4b1bb8d72ada7002cb3387b6f0aab6501b5284,2024-08-01T13:50:17.780000 CVE-2024-30602,0,0,9c40cbab2c38aaca828b52186223e1df82fdb31d9cb7460440b4892a59e5cdd5,2024-08-01T13:50:18.560000 CVE-2024-30603,0,0,4ed6cfbc1c794faff20a9402a19c1b8e2e0778b0d249fb5742f8d1e4a4dc2f88,2024-08-19T20:35:13.213000 -CVE-2024-30604,0,0,060b968f0ffc4c388f441f2bffef7d326f7c284352f55ad52e5dcef963cc081c,2024-03-28T16:07:30.893000 -CVE-2024-30606,0,1,84836a047fa8bf7ec677c3313bb5423bd8318fbcc4aa2e83821f2d0bd157e4e1,2024-08-27T19:35:21.630000 +CVE-2024-30604,0,1,1b35eb8c2341ecf5d71a3ed8bf183f6edc38ca8bee97893b3ea7e3324122217e,2024-08-27T20:35:30.857000 +CVE-2024-30606,0,0,84836a047fa8bf7ec677c3313bb5423bd8318fbcc4aa2e83821f2d0bd157e4e1,2024-08-27T19:35:21.630000 CVE-2024-30607,0,0,3081b4056d2297b344e88d45dd81bdc04741e21824330f0904116519e8c0505f,2024-08-01T13:50:19.340000 CVE-2024-3061,0,0,4efd703c3bf27329551bb8c57b6ec5103d42ea334ef6d9361feb4d292b06b081,2024-03-29T12:45:02.937000 CVE-2024-30612,0,0,e42904b723a61ee315384c0049851285bcc87d076f88def1dfe4ab911cc568cf,2024-08-01T15:35:11.227000 @@ -250344,12 +250344,12 @@ CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000 CVE-2024-30624,0,0,9f0b6bbb0cdd2fc5e8275cfdf473e348e809449e2b22ebe6778b91e551369404,2024-03-29T13:28:22.880000 CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000 -CVE-2024-30626,0,1,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000 +CVE-2024-30626,0,0,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000 CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000 CVE-2024-30628,0,0,dd5c2dbd465b741a9303d4905928e279a9f9c188a8cfae6b104c76db64b76117,2024-08-01T13:50:22.470000 CVE-2024-30629,0,0,dde9c072e6180c2884c3b2073d41ca0bf7b0e2064c1395f3d25c8643c5bf5d2e,2024-08-19T20:35:14.703000 CVE-2024-3063,0,0,e4ccb06d5ff3e906359417688d6094345cf7b0c3520fac98072d600493716bc5,2024-05-30T13:15:41.297000 -CVE-2024-30630,0,1,9d4360141420d1184dad68eab5ca48c1910203b69531baab8f0a1633f37f80cf,2024-08-27T19:35:25.577000 +CVE-2024-30630,0,0,9d4360141420d1184dad68eab5ca48c1910203b69531baab8f0a1633f37f80cf,2024-08-27T19:35:25.577000 CVE-2024-30631,0,0,41f838085add8cf1dec118fb7468de6b4fc9bce111467eb8baa174f9e9137432,2024-08-01T15:35:12.897000 CVE-2024-30632,0,0,3f8589dc8873f1f40fc2805a6241d9d5b4cb8cf8b5c1194f5bfaa117d3af4731,2024-08-15T20:35:11.387000 CVE-2024-30633,0,0,0e20fbff7533df843343aa1ca8784af549e42237ddf63007c09299ebacdd216c,2024-08-01T13:50:23.153000 @@ -250473,7 +250473,7 @@ CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b CVE-2024-30872,0,0,f4c68436231336d4dfed85be3bb02cc34ef76405f018ff6a0b0b786c7062708e,2024-04-01T15:53:18.060000 CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 CVE-2024-30879,0,0,1301a0d53d8ce6102d32b653bb55ca8eae261084329d07814fddadd6bf631c71,2024-04-11T12:47:44.137000 -CVE-2024-3088,0,1,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a7c,2024-08-27T18:35:09.493000 +CVE-2024-3088,0,0,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a7c,2024-08-27T18:35:09.493000 CVE-2024-30880,0,0,96833c6da8b722f149fb59bda052ae3acf51b2dbf7db685f3dd13fb70ea6d96a,2024-08-01T13:50:31.417000 CVE-2024-30883,0,0,797b2441b715707191740c9fa7df6d1b293fbe4a72a5d05afa9b676f71d49814,2024-04-11T12:47:44.137000 CVE-2024-30884,0,0,453cca54472a26a8ca3d84c4d89a94e0d61ec7afc409128696362f32ae3d409b,2024-08-01T13:50:32.180000 @@ -250548,7 +250548,7 @@ CVE-2024-31025,0,0,f6815681c00034cb26fb1b993f08da7051c7712a081b04f3f2c6c1b167cd8 CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000 CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000 -CVE-2024-31033,0,1,4d406f18763dd0b76dcad0c910670ccd39d0be934836d2f67e309de926070782,2024-08-27T18:35:09.280000 +CVE-2024-31033,0,0,4d406f18763dd0b76dcad0c910670ccd39d0be934836d2f67e309de926070782,2024-08-27T18:35:09.280000 CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000 CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000 CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 @@ -250934,7 +250934,7 @@ CVE-2024-31492,0,0,b06ceb7c9f7436cf71baa2d42bf8bc10377af2691ce98c83805eb2ca0bae0 CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79af54,2024-06-03T14:46:24.250000 CVE-2024-31495,0,0,cc64a104bd02c0ad2ecb59ee5b7d31fe176ceb300f836393c6f4ac68db9adc74,2024-06-13T18:36:45.417000 CVE-2024-31497,0,0,8d8d7f6d342d19eead9a597122971bd1c38180baf81620a11231640a58ff9af9,2024-06-20T19:15:49.960000 -CVE-2024-31498,0,1,64e912cb7273640f524a86a4c4b92bedddd325f11af3ca69081c43f6ca10cd7a,2024-08-27T19:35:26.363000 +CVE-2024-31498,0,0,64e912cb7273640f524a86a4c4b92bedddd325f11af3ca69081c43f6ca10cd7a,2024-08-27T19:35:26.363000 CVE-2024-3150,0,0,69195bb0268f0d9c44b64d544ae820662fe7bc6d09e60627c417b378085c3c15,2024-06-07T14:56:05.647000 CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 CVE-2024-31503,0,0,63f26c08bc84d4a6878a828315f5d6a190e4224cc41f797a0adf367284c5896d,2024-08-19T21:35:06.150000 @@ -252447,7 +252447,7 @@ CVE-2024-33850,0,0,95f27d9d9e057348262bcab0b02347c6a14020e669eb08e0851a75b104d83 CVE-2024-33851,0,0,6fe0c9fc7bc19efc32ba623306eecc7b17efe8e6591ad62c2645cb513a9705c0,2024-04-29T12:42:03.667000 CVE-2024-33852,0,0,ccbe8ab353184f6ff5d9f1985583554c312e7d6273333afce0e233edb0d1ac6b,2024-08-23T18:46:51.787000 CVE-2024-33853,0,0,8fa4a4bf0625fd70f0d4111152fde73f8085e5386ec6967bd894de377cf99558,2024-08-23T18:46:51.787000 -CVE-2024-33854,0,0,0ff744190b6ffe46b6660d445b899056099d2547d8fbda438478fc61d46d9dd0,2024-08-23T18:46:51.787000 +CVE-2024-33854,0,1,e971789f9ae144ac14fcf2f73161fa0d84a31aed93c8200ce470051cc6c47989,2024-08-27T20:35:31.627000 CVE-2024-33856,0,0,e1bc615af0caf524dcab77cf6cf6563129862468d325102417ce19fd73712644,2024-07-03T01:58:59.643000 CVE-2024-33857,0,0,b9573703f999cbfa64c65ad4975e76915087495646b59661c3236ffafa92c9ce,2024-07-03T01:59:00.423000 CVE-2024-33858,0,0,b8a7f820dff1964081294a7545b9b29623794842450790b9d58fdec268c8e9d7,2024-05-07T20:07:58.737000 @@ -254025,7 +254025,7 @@ CVE-2024-36055,0,0,9a65ac3e65fa237426eeec0a5393b74ddf0f405783f600502382f8e03d635 CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000 -CVE-2024-36068,1,1,ff69b14eb3faffb5ef1fff6430c37e2dc6ce15280c21edfd6026d88004d8d5d7,2024-08-27T19:35:27.183000 +CVE-2024-36068,0,0,ff69b14eb3faffb5ef1fff6430c37e2dc6ce15280c21edfd6026d88004d8d5d7,2024-08-27T19:35:27.183000 CVE-2024-3607,0,0,bb41f416bf193e789c6c3a3e947ee7231c896c3b9ba6bc5f3e43284359c7ea80,2024-05-02T18:00:37.360000 CVE-2024-36070,0,0,beb228b364090611e3dd2a48abbf51047e75d9810a4335130915a1f3e879cf31,2024-05-20T13:00:04.957000 CVE-2024-36071,0,0,1cf2d6d0e0350fe3ce54f2fd88bd10faece00caba8178bec17a18cc8abef5c43,2024-07-03T02:02:44.693000 @@ -254364,7 +254364,7 @@ CVE-2024-3653,0,0,ebd69680b1122e6ac45d38522017549d10dde629dd149529cb0348d7b42202 CVE-2024-36531,0,0,a4158d6a8860f8c9c37cc090a05d54c5f8fca61c7fff205691822d02cbdf6215,2024-08-01T13:52:59.007000 CVE-2024-36532,0,0,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000 CVE-2024-36533,0,0,6d6a58ccbd9862b12d84a535bbe7b9936ca5202878de14518d14e5cbc520ef59,2024-08-01T13:52:59.810000 -CVE-2024-36534,0,0,4cf4e73bff5af3456448d2ddc43e34a4c1854f7181f8604174b54828d17a56aa,2024-07-25T12:36:39.947000 +CVE-2024-36534,0,1,d75a71444835fe7693e4b40e8ff5389e6e9dda2f9534f477c83ff8221198c559,2024-08-27T20:35:32.427000 CVE-2024-36535,0,0,e206f42fd7fd3ad062268d9ff79d9c1d6468065164542cd5cd3ce85c7b0f654f,2024-08-01T13:53:00.610000 CVE-2024-36536,0,0,18bc7dac250d2e682a6850976fb889f2457977f5567d869e205c26c591cea55b,2024-08-01T13:53:01.390000 CVE-2024-36537,0,0,5f930f9ed55795838127e0e3777c1d69912524f2615f541a92461ae3dca81aff,2024-08-01T13:53:02.180000 @@ -255644,18 +255644,18 @@ CVE-2024-38541,0,0,023c6a7426f76d21c921b964034a52048d8ae62a75126b3da24f432830a3e CVE-2024-38542,0,0,236a852b17e8e7df2d96d10cd55624c3d6e510828a8ba906df9761c44c8d7f98,2024-06-20T12:44:01.637000 CVE-2024-38543,0,0,cc494d9a26305e476b44305baa9260954effdb94d7f944121c7aae2dd1510d55,2024-06-20T12:44:01.637000 CVE-2024-38544,0,0,fa4907d5f56376ee8fa96880d6cd54bc49791710a31336b529a729183a380f75,2024-06-20T12:44:01.637000 -CVE-2024-38545,0,0,b3eec4307a165a8e761ecbec896bee931fa02f92bed5dff09e89d7d519f80998,2024-06-20T12:44:01.637000 -CVE-2024-38546,0,0,ac44fe90c8e3358cc4a9edd2c0abe9ebbeb5af9be9bf1c1fa151fdbe27da349b,2024-06-20T12:44:01.637000 -CVE-2024-38547,0,1,0fd46903a324a4303feb1a86ea138cad132aadfdd07434ca776aa7fc69875c87,2024-08-27T19:56:36.727000 +CVE-2024-38545,0,1,20196ed3b06272038cd0bb32c5290f3178eebcbab2ddcaf7d59bcf94a21fcc8f,2024-08-27T20:03:02.983000 +CVE-2024-38546,0,1,eea58266196a873fad4b4b919d579fb6ca82bf25773f04562985e9491c7b0b55,2024-08-27T20:03:18.263000 +CVE-2024-38547,0,0,0fd46903a324a4303feb1a86ea138cad132aadfdd07434ca776aa7fc69875c87,2024-08-27T19:56:36.727000 CVE-2024-38548,0,0,171e39d7367d49de534de52c4917669fe9bfa7833fe5361405e0ecddb170ac33,2024-07-03T02:05:11.107000 -CVE-2024-38549,0,1,23759d651c75e71c7abf259e3346236d359121811ca890a80b4abdbeb6d53463,2024-08-27T19:57:48.560000 +CVE-2024-38549,0,0,23759d651c75e71c7abf259e3346236d359121811ca890a80b4abdbeb6d53463,2024-08-27T19:57:48.560000 CVE-2024-3855,0,0,7262bd57b27d1b3d3103ab661d1f7d85ee277817264f21911d91b4fa573922bc,2024-04-17T12:48:31.863000 CVE-2024-38550,0,0,3c81943b88da9d32a80e343d7d38e1cd6aa5f0c47582231155d312a40312171b,2024-07-03T02:05:11.837000 -CVE-2024-38551,0,1,0b4ae073cfbbe4b0131d149b2e79376d2a7c6c6f05a8b9f2866abb58f3a22942,2024-08-27T19:54:39.717000 -CVE-2024-38552,0,1,ecea6b3e5ffeb2a780fed1733ff56fe00eda9e1e0386e144355e86643e1cc270,2024-08-27T19:55:05.303000 -CVE-2024-38553,0,1,67acdd267e0537620d380889325d7755252cd88358a33906663ec52f56671176,2024-08-27T19:45:18.157000 -CVE-2024-38554,0,1,8b790c80ab51582e404589c54e66cd0bcb7aa34e72f7503df265277ebece0f02,2024-08-27T19:55:32.897000 -CVE-2024-38555,0,1,6b60bf420e9f83f409dbed38dc6879c7f03311b722325ce41530009471afd11b,2024-08-27T19:54:04.720000 +CVE-2024-38551,0,0,0b4ae073cfbbe4b0131d149b2e79376d2a7c6c6f05a8b9f2866abb58f3a22942,2024-08-27T19:54:39.717000 +CVE-2024-38552,0,0,ecea6b3e5ffeb2a780fed1733ff56fe00eda9e1e0386e144355e86643e1cc270,2024-08-27T19:55:05.303000 +CVE-2024-38553,0,0,67acdd267e0537620d380889325d7755252cd88358a33906663ec52f56671176,2024-08-27T19:45:18.157000 +CVE-2024-38554,0,0,8b790c80ab51582e404589c54e66cd0bcb7aa34e72f7503df265277ebece0f02,2024-08-27T19:55:32.897000 +CVE-2024-38555,0,0,6b60bf420e9f83f409dbed38dc6879c7f03311b722325ce41530009471afd11b,2024-08-27T19:54:04.720000 CVE-2024-38556,0,0,51d124c836cc9e461c4d28a4538ed6a61c4cce78aafbbdb075464f88af8ced39,2024-06-20T12:44:01.637000 CVE-2024-38557,0,0,7cc96d52170d8ead986f63370ea66ce6fd7a730e01b3c6aa7cc946e65d6dd557,2024-06-20T12:44:01.637000 CVE-2024-38558,0,0,1aa2549c42096077d056cbab0d2e9ea0b310080aca3669912ae89eed3d6cbd3a,2024-07-15T07:15:09.387000 @@ -255695,14 +255695,14 @@ CVE-2024-38588,0,0,455a9b8a90760206a5fde630f5374c7117d3ca5dfaa729021f7df349dd474 CVE-2024-38589,0,0,054b7c93b18a32102a19731b8b9f7b53136e29764718c76bb09302eaee6404d9,2024-07-15T07:15:11.207000 CVE-2024-3859,0,0,f6a57f468f9800b8da982d83af2ac389f3f4d8b059886951b49765f213c508e4,2024-07-03T02:06:47.757000 CVE-2024-38590,0,0,5e1bf1fdf89348f141f9135cc15b76d863d47b4003bf5b9faeb1fa796664bf8e,2024-06-20T12:44:01.637000 -CVE-2024-38591,0,1,9995c38906c89d4c26c4d73a9253c7dc172d1edb03657ec8d80bc3d1b50a2d04,2024-08-27T18:36:09.777000 +CVE-2024-38591,0,0,9995c38906c89d4c26c4d73a9253c7dc172d1edb03657ec8d80bc3d1b50a2d04,2024-08-27T18:36:09.777000 CVE-2024-38592,0,0,37134037ea24ea3ecf9f937f4db71a7eaa477c8ce6aa02c104d4a8d758f347b0,2024-06-20T12:44:01.637000 CVE-2024-38593,0,0,5810f9929219cd255d4f41416ce4d085acded54a81aae5569c879799f8b25fb1,2024-06-20T12:44:01.637000 CVE-2024-38594,0,0,7a5c19721e073a10649a5c50f88ac09eb2d8eab9e548a37238540908ab1b0b9e,2024-06-20T12:44:01.637000 CVE-2024-38595,0,0,832124134b5143ac4403d9ade527324b6e9e4e54c882604e73080b5bf34116c4,2024-06-20T12:44:01.637000 CVE-2024-38596,0,0,46720e55bcd9267a5978001cdabf468fbd47d88589f87bfbfc0df091a72949cf,2024-07-15T07:15:11.600000 -CVE-2024-38597,0,1,6c358d88ab1cc72ff393aedcd5fe423ee770c5a3f17802265a5743ec277c9cf5,2024-08-27T18:36:47.313000 -CVE-2024-38598,0,1,6997b64945387348ad35d76369c09957b25bff8d2b24a06e77e40994bcbb476f,2024-08-27T18:36:57.630000 +CVE-2024-38597,0,0,6c358d88ab1cc72ff393aedcd5fe423ee770c5a3f17802265a5743ec277c9cf5,2024-08-27T18:36:47.313000 +CVE-2024-38598,0,0,6997b64945387348ad35d76369c09957b25bff8d2b24a06e77e40994bcbb476f,2024-08-27T18:36:57.630000 CVE-2024-38599,0,0,30a1fe4d2933b9305ccf42078c4cfea08aec9e247b6d735fe9b948c6c8a96f53,2024-07-15T07:15:11.810000 CVE-2024-3860,0,0,560f4bd3a6276dda10e535bade050cb4c38cd8e659ec70a4b99295b2c4085430,2024-04-17T12:48:31.863000 CVE-2024-38600,0,0,6f01059b0d86b91709f99375fdc625d4b6e89a50ed018f8c1ceded934a4f84b9,2024-08-27T16:02:47.373000 @@ -256033,7 +256033,7 @@ CVE-2024-3924,0,0,235edb1f62c7ed0711c125c27cb00d729af2f8ac46c7bf2f24b9a6a03738d7 CVE-2024-39241,0,0,accd1dd78fc247d99be43a8336696ac9932dfbe631d68c61bc60cbf3393ddd1d,2024-08-19T21:06:05.693000 CVE-2024-39242,0,0,0ce9eb7ec62fb5bee8b64b27a5019be0610d6047fe2caece098d1a76626bc65e,2024-08-19T21:06:24.177000 CVE-2024-39243,0,0,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2d8b,2024-07-03T02:05:45.213000 -CVE-2024-39248,0,1,bd438370022685a4151ebf84eacd73dcdc5ba59d6ceb4a7e44b285f898cf5c39,2024-08-27T18:32:45.907000 +CVE-2024-39248,0,0,bd438370022685a4151ebf84eacd73dcdc5ba59d6ceb4a7e44b285f898cf5c39,2024-08-27T18:32:45.907000 CVE-2024-39249,0,0,55419fdc735f4b5d3c5b1e858306972036cffb58a6300e012da45bf6f04a8bc8,2024-08-26T15:35:13.893000 CVE-2024-3925,0,0,7eee90dddbc89d587d2add5ec583b68109d8e96ea070cac853f0344fab97474f,2024-06-13T18:36:09.010000 CVE-2024-39250,0,0,57928bd3b6fed5e7ca24bfa49026f1317017d625b7d77802180f56e1fd67fb2c,2024-08-01T13:55:47.607000 @@ -256153,7 +256153,7 @@ CVE-2024-39423,0,0,8c72be80e3c85b684216aef96277fce75a9c2e2c566be73887f1212d11fae CVE-2024-39424,0,0,243efb9cc10bea0f29adc08971658a5e72c18bfec9a9b14b5a01df0b19c33e3f,2024-08-15T17:25:25.787000 CVE-2024-39425,0,0,28e230ffc44c74bd5fea86e570ad4260fab01f825edd986d1d5f1805b2b51466,2024-08-15T17:17:59.783000 CVE-2024-39426,0,0,89e7428ead4414b9bdd760e275ee0d1f9df6042684f24e93cedce5e08d48724b,2024-08-15T17:17:38.680000 -CVE-2024-39427,0,1,557b55aed059a4b12cd7a567852cbd2b043bbb11d7f8b3c5a5f1bc408c118aa4,2024-08-27T18:32:28.710000 +CVE-2024-39427,0,0,557b55aed059a4b12cd7a567852cbd2b043bbb11d7f8b3c5a5f1bc408c118aa4,2024-08-27T18:32:28.710000 CVE-2024-39428,0,0,5d03789c96f23918b1ab1ea6fa6e056174329d182d27e72cc9dae9827964f2fe,2024-08-27T17:39:29.090000 CVE-2024-39429,0,0,e5307c82d36950beba8c9942e931fdf6e3ccb2f9d59fae72d11a48dd470f78ba,2024-08-27T17:44:02.903000 CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000 @@ -256587,7 +256587,7 @@ CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c746 CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000 CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000 CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000 -CVE-2024-40395,0,1,2b3d55ea035ce2287aba45bb5c2769693f25b512e41e3ae4fa90ba0cd02e10b8,2024-08-27T18:33:14.247000 +CVE-2024-40395,0,0,2b3d55ea035ce2287aba45bb5c2769693f25b512e41e3ae4fa90ba0cd02e10b8,2024-08-27T18:33:14.247000 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 CVE-2024-40402,0,0,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000 @@ -257228,7 +257228,7 @@ CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000 CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 -CVE-2024-41622,0,1,231621349909b4fe02afa7565e30fabb6d0f669719678c04b94764b05c01b9de,2024-08-27T18:35:10.613000 +CVE-2024-41622,0,0,231621349909b4fe02afa7565e30fabb6d0f669719678c04b94764b05c01b9de,2024-08-27T18:35:10.613000 CVE-2024-41623,0,0,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000 CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000 CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000 @@ -257979,7 +257979,7 @@ CVE-2024-42785,0,0,faaf9fd316035d86ef21ff32670290bdf53a72bbb288c23ab5afe649962d0 CVE-2024-42786,0,0,269c0db08da42ce37cbfedc070e044e520f6032104a5d57d0da7da98e8f4fbc4,2024-08-26T14:58:17.537000 CVE-2024-42787,0,0,88d5b9fb8d148270d8805b4da2d63d994d92e9c93bf6bfa364fcfc0bc1637e96,2024-08-26T16:35:12.107000 CVE-2024-42788,0,0,a944343d984183d9671961186501cfd758ccb98c0318801f8b80c875f7b8eb97,2024-08-26T19:35:29.970000 -CVE-2024-42789,0,0,3342a623d33bfec42f1caba176ebbc78dcfc478b384f925ba9cf2d9c4e593bd5,2024-08-26T15:15:23.727000 +CVE-2024-42789,0,1,ef16d9e3057430609782f812ca6eaebee9c0fab467795e1c42a75384a8ce22ea,2024-08-27T20:35:34.673000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000 CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000 @@ -257996,7 +257996,7 @@ CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9e CVE-2024-42845,0,0,41f949a7278b40e93c96bce086a04dddafae3cccde3fe1baa3e17a4aa01d20bb,2024-08-26T12:47:20.187000 CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000 CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000 -CVE-2024-42851,1,1,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28 +CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28 CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9775,2024-08-23T19:35:15.240000 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 @@ -258294,7 +258294,7 @@ CVE-2024-43409,0,0,a42b7406eee825ee22fc12b5886825141398e49597504678e6e46efb8ce72 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 CVE-2024-43410,0,0,34c0de7d3aba2e2bf754c89b4a746899ed92baa2a863da3cba07091015a18558,2024-08-21T17:25:08.560000 CVE-2024-43411,0,0,17fae2b6c19a1c99d860c5f9c414f25b1a9d716a3875184bd3648e5d7c5063c5,2024-08-21T17:25:08.560000 -CVE-2024-43414,1,1,480c6b9e5d15f4492b80d223686b068600d65271b741c851d7e1d6b64a6b2b74,2024-08-27T18:33:14.247000 +CVE-2024-43414,0,0,480c6b9e5d15f4492b80d223686b068600d65271b741c851d7e1d6b64a6b2b74,2024-08-27T18:33:14.247000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 CVE-2024-43442,0,0,c91de21d85c5b198b68df6887497332dfae4e79fd9537263283e30abff2abab5,2024-08-26T16:35:12.860000 @@ -258339,10 +258339,10 @@ CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2f CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000 CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000 CVE-2024-43782,0,0,640aa820b0ca467d38719c873a53febd1944feccce46dcf0202ccc162637d808,2024-08-23T16:18:28.547000 -CVE-2024-43783,1,1,68cfe59aff11ea0ac165b5589cd2ccc9f899d9b23a7fe8b7accfeb70a176ce47,2024-08-27T18:33:14.247000 +CVE-2024-43783,0,0,68cfe59aff11ea0ac165b5589cd2ccc9f899d9b23a7fe8b7accfeb70a176ce47,2024-08-27T18:33:14.247000 CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000 CVE-2024-43787,0,0,2409e45336c28eaec7950310efc31a1dfcd5144f7967b659eb1779c444e8beaf,2024-08-23T16:18:28.547000 -CVE-2024-43788,0,1,6ba7a069df1deadaf8a9df8f1dfeeeb285101da52fcf4af6ac8d627260dab172,2024-08-27T18:33:14.247000 +CVE-2024-43788,0,0,6ba7a069df1deadaf8a9df8f1dfeeeb285101da52fcf4af6ac8d627260dab172,2024-08-27T18:33:14.247000 CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000 CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000 CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8e37,2024-08-23T16:18:28.547000 @@ -258507,9 +258507,9 @@ CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000 -CVE-2024-44340,0,1,5530dc35edef952e8711559e514fbfa321059e19ea9cf4113733712ccfcddacd,2024-08-27T18:35:11.777000 -CVE-2024-44341,0,1,4394a7ab623822c8d7ae8a40120209f3c34ef26ebd88a169d40d7905474e555f,2024-08-27T18:35:12.540000 -CVE-2024-44342,0,1,d2c4a0923b5d002fea6dcefb46d4dbdd0a4fe3471bd6be04a38a6c07b2608317,2024-08-27T18:35:13.327000 +CVE-2024-44340,0,0,5530dc35edef952e8711559e514fbfa321059e19ea9cf4113733712ccfcddacd,2024-08-27T18:35:11.777000 +CVE-2024-44341,0,0,4394a7ab623822c8d7ae8a40120209f3c34ef26ebd88a169d40d7905474e555f,2024-08-27T18:35:12.540000 +CVE-2024-44342,0,0,d2c4a0923b5d002fea6dcefb46d4dbdd0a4fe3471bd6be04a38a6c07b2608317,2024-08-27T18:35:13.327000 CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000 CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000 @@ -258608,8 +258608,10 @@ CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b220535343 CVE-2024-4502,0,0,f1f89a01c722d6ef2e85e855b85895e43fc279ff3a13e0257efd22aaa2b4c544,2024-06-04T19:20:39.747000 CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000 CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000 -CVE-2024-45037,1,1,dc3abcd06f6ee675ef0a41b95ee2573ea870bc5ec84bd2ec59385a0aaaed8788,2024-08-27T19:15:17.583000 +CVE-2024-45037,0,0,dc3abcd06f6ee675ef0a41b95ee2573ea870bc5ec84bd2ec59385a0aaaed8788,2024-08-27T19:15:17.583000 +CVE-2024-45038,1,1,f39cb91eef4bcaf71b0eb0f31f12a4674c9c20538a66ae3f81da1e677545ba93,2024-08-27T21:15:07.380000 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 +CVE-2024-45049,1,1,2be7fdc3f238e6f54b520ba876892e7b549fb5d302a940ca1a84d47d1fed9c93,2024-08-27T21:15:07.603000 CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000 CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 @@ -258657,7 +258659,7 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d CVE-2024-45256,0,0,4a4b83adefef92d16e6e4183f85729c0b386c1024d8d0fd2baaf64a1cf5545c2,2024-08-26T13:35:02.937000 CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000 CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000 -CVE-2024-45264,0,1,bd0d2a78e6450ea9b4acfe4451f605c0cc149ce794d1dfe127d00787aadcafbc,2024-08-27T18:33:14.247000 +CVE-2024-45264,0,0,bd0d2a78e6450ea9b4acfe4451f605c0cc149ce794d1dfe127d00787aadcafbc,2024-08-27T18:33:14.247000 CVE-2024-45265,0,0,32b1057978cea9d5f5845b9f4e3926bb7432d8755213d6bbe9f6e3c948032919,2024-08-27T14:35:12.220000 CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000 CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000 @@ -259331,7 +259333,7 @@ CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7 CVE-2024-5285,0,0,f5fe057b3eff57d7472395b5cf3577db89e74c15c7e806cbb99af18bbf9a648f,2024-08-01T13:59:44.103000 CVE-2024-5286,0,0,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee697298672,2024-08-01T13:59:44.950000 CVE-2024-5287,0,0,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000 -CVE-2024-5288,1,1,5de79d67173393cc3de65b536f846b2e40744ad08ee3650bed840ff02b1b527f,2024-08-27T19:15:17.797000 +CVE-2024-5288,0,0,5de79d67173393cc3de65b536f846b2e40744ad08ee3650bed840ff02b1b527f,2024-08-27T19:15:17.797000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 CVE-2024-5290,0,0,adacdfd631af0a2d0e8f586387cac872823eb4764e0466b1013d4b9bdcf14abe,2024-08-07T15:17:46.717000 CVE-2024-5291,0,0,a73212295ca40d57df3fe276c935be7cf4995dc49a26ea7361780508749e211f,2024-05-24T01:15:30.977000 @@ -259769,7 +259771,7 @@ CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773 CVE-2024-5811,0,0,da48fd72e5de418e87b54290fe68d41aecce53c1cabdd1300feebd9e1c56b865,2024-08-01T14:00:00.527000 CVE-2024-5812,0,0,05caee51ca8afdeadb9e9ce4e5c443d53c88017db3fdf90c8036b6c5139928b3,2024-06-13T18:36:45.417000 CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232d2,2024-06-13T18:36:45.417000 -CVE-2024-5814,1,1,94074d9744717f927102d900b5554c4a2220a1cf6153da54641180a39c9e6bc9,2024-08-27T19:15:17.980000 +CVE-2024-5814,0,1,50935ad47c2cda5da17310c47d0b5ed09d7fc5e3f0b855487cd14ffe04185dfd,2024-08-27T20:35:37.640000 CVE-2024-5815,0,0,9c0e5d25f32c2dbefca23815fc2b16e88ce81dd54b9a22e21c721a2b2a9cb1cc,2024-07-17T13:34:20.520000 CVE-2024-5816,0,0,3d67952ce4a1b2b1ece947260f0beee9de9f9da521a3f15a0343c5e1d47b81ea,2024-07-17T13:34:20.520000 CVE-2024-5817,0,0,e05abd62bd06ccb376baea6b1d5f924e4e6fb0941dae50b59d4aa5f4c769fe7a,2024-07-17T13:34:20.520000 @@ -259904,7 +259906,7 @@ CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b CVE-2024-5988,0,0,6a93e103554a4b2cea7532bb149420b2c5e22d63c1fab23818b5950d94f50a5e,2024-06-25T18:50:42.040000 CVE-2024-5989,0,0,5b8da9d53fdfd0fd3971e8489f4ae4ce0e952b56f28f99337bb24ad669904afb,2024-06-25T18:50:42.040000 CVE-2024-5990,0,0,815ffdec6ed9055e0c29635260b790d8ae8601700cacf3380cde4c3f20ff7240,2024-06-25T18:50:42.040000 -CVE-2024-5991,1,1,5f21d4fac46762b4d89f6869fc7d9b7fdb82ba7ff968eb711f41a5033f557fc7,2024-08-27T19:15:18.080000 +CVE-2024-5991,0,0,5f21d4fac46762b4d89f6869fc7d9b7fdb82ba7ff968eb711f41a5033f557fc7,2024-08-27T19:15:18.080000 CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000 CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000 CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000 @@ -261087,7 +261089,7 @@ CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000 CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 -CVE-2024-7720,1,1,fa989408cdbda8a784c073a3419b0a9bde2bfe617872825f0e9574c0403c663e,2024-08-27T18:33:14.247000 +CVE-2024-7720,0,0,fa989408cdbda8a784c073a3419b0a9bde2bfe617872825f0e9574c0403c663e,2024-08-27T18:33:14.247000 CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000 CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000 CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000 @@ -261241,7 +261243,7 @@ CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68 CVE-2024-8011,0,0,b9eccdb873cdee0aa4aaf727a8d55e87a8f1a6dcd35fe88e6cae24de39ee4994,2024-08-26T12:47:20.187000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 -CVE-2024-8033,0,1,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 +CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 CVE-2024-8041,0,0,530afb8d20f30d401c1d7f8908c798a45edf30b2f924035dda7c4300ee7ef6f4,2024-08-23T16:18:28.547000 @@ -261311,10 +261313,16 @@ CVE-2024-8181,0,0,30918501aab4364009bd3804956f0f10b449aad4949fccf3aacccef25d5db4 CVE-2024-8182,0,0,d21b4ee027b5d7ffbba2e6af93024450552ec0bbbe1dfa5ea2b2ec2db0e50d89,2024-08-27T15:52:01.317000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000 -CVE-2024-8199,0,1,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000 -CVE-2024-8200,0,1,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000 +CVE-2024-8199,0,0,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000 +CVE-2024-8200,0,0,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000 CVE-2024-8207,0,0,498323e8227fa40c3fd29b85835950264192b60730f689cfc748d515dfd6f7ad,2024-08-27T13:01:37.913000 -CVE-2024-8208,1,1,c0546cf56f335de149e039eaf41ddcfe92498da6cf6c84b8fa1c52ddaf26fb1f,2024-08-27T18:33:14.247000 -CVE-2024-8209,1,1,55f7ec189eb87638165e40939313326ea0521e4ed80e56afdb88c580a7b1c999,2024-08-27T18:33:14.247000 -CVE-2024-8210,1,1,d8858e0da615a99ba4a7987d4afe11db96b004b714d3b7c008b8096e30056f73,2024-08-27T19:15:18.250000 -CVE-2024-8211,1,1,dd10850c7586b7f2b5b17b7368d910a3fefc07e7abe62303615c718ed57e06ca,2024-08-27T19:15:18.553000 +CVE-2024-8208,0,0,c0546cf56f335de149e039eaf41ddcfe92498da6cf6c84b8fa1c52ddaf26fb1f,2024-08-27T18:33:14.247000 +CVE-2024-8209,0,0,55f7ec189eb87638165e40939313326ea0521e4ed80e56afdb88c580a7b1c999,2024-08-27T18:33:14.247000 +CVE-2024-8210,0,0,d8858e0da615a99ba4a7987d4afe11db96b004b714d3b7c008b8096e30056f73,2024-08-27T19:15:18.250000 +CVE-2024-8211,0,0,dd10850c7586b7f2b5b17b7368d910a3fefc07e7abe62303615c718ed57e06ca,2024-08-27T19:15:18.553000 +CVE-2024-8212,1,1,9359cac8d24cacbaaff53aac7a6931dd1290b1cb06c307e44d6477943b885018,2024-08-27T20:15:09.110000 +CVE-2024-8213,1,1,554ef8a07c21000a3c28fa3137dc451e497a37772f5285c24f9db0444ba594f4,2024-08-27T20:15:09.423000 +CVE-2024-8214,1,1,4dcb7a15d1cc670379c05fdff2368f173d7ee90b98293405187577c84be9eab8,2024-08-27T20:15:09.703000 +CVE-2024-8216,1,1,ea0a96f241a82a6bacd9dc0a45665c2b7cf613b02d047fabb667e4dac6f4047d,2024-08-27T21:15:07.830000 +CVE-2024-8217,1,1,83dbfc4fd39640675ea565d305d5258f4dc6ee330612479a4471b08e5f24e751,2024-08-27T21:15:08.093000 +CVE-2024-8218,1,1,275286facfab355dcab0ffc6ade0f42bc2448af93fe871d1f2d5b5f4323a3a55,2024-08-27T21:15:08.350000