diff --git a/CVE-2022/CVE-2022-230xx/CVE-2022-23086.json b/CVE-2022/CVE-2022-230xx/CVE-2022-23086.json index 92907c34574..70c73eaa778 100644 --- a/CVE-2022/CVE-2022-230xx/CVE-2022-23086.json +++ b/CVE-2022/CVE-2022-230xx/CVE-2022-23086.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23086", "sourceIdentifier": "secteam@freebsd.org", "published": "2024-02-15T05:15:09.273", - "lastModified": "2024-04-19T07:15:08.670", + "lastModified": "2024-08-28T20:35:00.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los controladores para *_CFG_PAGE lectura/escritura ioctls en los controladores mpr, mps y mpt asignaron un b\u00fafer de un tama\u00f1o especificado por la persona que llama, pero copiaron en \u00e9l un encabezado de tama\u00f1o fijo. Otro contenido del mont\u00f3n se sobrescribir\u00eda si el tama\u00f1o especificado fuera demasiado peque\u00f1o. Los usuarios con acceso al nodo del dispositivo mpr, mps o mpt pueden sobrescribir los datos del mont\u00f3n, lo que podr\u00eda provocar una escalada de privilegios. Tenga en cuenta que solo el usuario ra\u00edz y los miembros del grupo de operadores pueden acceder al nodo del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:06.ioctl.asc", diff --git a/CVE-2022/CVE-2022-331xx/CVE-2022-33162.json b/CVE-2022/CVE-2022-331xx/CVE-2022-33162.json index e17b7c1a80c..1cc3fdba0ab 100644 --- a/CVE-2022/CVE-2022-331xx/CVE-2022-33162.json +++ b/CVE-2022/CVE-2022-331xx/CVE-2022-33162.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33162", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-16T19:15:06.213", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T21:50:06.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "65A1A95C-1687-4304-88C5-1BEB58BBC8DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_directory_integrator:10.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "76B2C187-CEC8-4991-94E2-058B6584A40A" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228570", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7161442", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-464xx/CVE-2022-46497.json b/CVE-2022/CVE-2022-464xx/CVE-2022-46497.json index a1998bcb079..e8380a0d1a3 100644 --- a/CVE-2022/CVE-2022-464xx/CVE-2022-46497.json +++ b/CVE-2022/CVE-2022-464xx/CVE-2022-46497.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46497", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T09:15:37.970", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-08-28T21:35:00.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Hospital Management System 1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro pat_number en his_doc_view_single_patien.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2022-46497/blob/main/CVE-33", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42873.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42873.json index b50b3347fde..50a89bcad2e 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42873.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42873.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42873", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:49.997", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-28T20:35:03.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1, macOS Ventura 13.6.1. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/HT213981", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47728.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47728.json index d6b1438c279..e55991a10a4 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47728.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47728.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47728", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-16T20:15:09.780", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T21:40:55.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.0.0", + "versionEndIncluding": "1.10.11.0", + "matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.12.0", + "versionEndExcluding": "1.10.23.0", + "matchCriteriaId": "4E1101FE-F579-4869-BFFD-6383D0F9C6A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272201", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.ibm.com/support/pages/node/7161427", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49543.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49543.json index e455f76cc0f..fca2ac26a4a 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49543.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49543.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49543", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.640", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-08-28T20:35:04.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en Book Store Management System v1 permite a los atacantes acceder a p\u00e1ginas no autorizadas y ejecutar funciones administrativas sin autenticarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49543", diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51835.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51835.json index 8c7ed2d003e..f396ceb29f9 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51835.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51835.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51835", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:42:05.830", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-28T20:35:05.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en TRENDnet TEW-822DRE v.1.03B02 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros ipv4_ping en /boafrm/formSystemCheck." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://warp-desk-89d.notion.site/TEW-822DRE-5289eb95796749c2878843519ab451d8", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1174.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1174.json index 82e451718a6..ec5b519b569 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1174.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1174.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1174", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-03-01T20:15:47.213", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-08-28T21:35:03.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Las versiones anteriores de HP ThinPro (anteriores a HP ThinPro 8.0 SP 8) podr\u00edan contener vulnerabilidades de seguridad. HP lanz\u00f3 HP ThinPro 8.0 SP 8, que incluye actualizaciones para mitigar posibles vulnerabilidades." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, "references": [ { "url": "https://support.hp.com/us-en/document/ish_10232639-10232671-16/hpsbhf03919", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23114.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23114.json index 7deb101649e..41f23f65e11 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23114.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23114.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23114", "sourceIdentifier": "security@apache.org", "published": "2024-02-20T15:15:10.333", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-28T20:35:06.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache Camel CassandraQL Component AggregationRepository que es vulnerable a una deserializaci\u00f3n insegura. Bajo condiciones espec\u00edficas, es posible deserializar la carga \u00fatil maliciosa. Este problema afecta a Apache Camel: desde 3.0.0 antes de 3.21.4, desde 3.22.0 antes de 3.22.1, desde 4.0.0 antes de 4.0.4, desde 4.1.0 antes de 4.4 .0. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.4.0, que soluciona el problema. Si los usuarios est\u00e1n en el flujo de versiones 4.0.x LTS, se les sugiere actualizar a 4.0.4. Si los usuarios est\u00e1n en 3.x, se les sugiere pasar a 3.21.4 o 3.22.1" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24310.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24310.json index 19a4662de5e..47e8bd9ba18 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24310.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24310", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-23T22:15:54.970", - "lastModified": "2024-02-26T13:42:22.567", + "lastModified": "2024-08-28T21:35:04.093", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"Generar c\u00f3digo de barras en factura/albar\u00e1n de entrega\" (ecgeneratebarcode) de Ether Creation <= 1.2.0 para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/en/preparation-shipping/24123-generate-barcode-on-invoice-delivery-slip.html", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25024.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25024.json index 0eea1dbc746..1d82c629637 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25024.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25024", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-15T03:15:04.353", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T21:53:10.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -39,14 +59,58 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.0.0", + "versionEndIncluding": "1.10.11.0", + "matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.12.0", + "versionEndExcluding": "1.10.24.0", + "matchCriteriaId": "BE4221C4-D274-4B1E-B8CF-21C6E51ABD48" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281430", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7165488", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json index 1f443724e10..7a730cb70f6 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25187", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T04:15:12.203", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-08-28T20:35:06.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Server Side Request Forgery (SSRF) en 71cms v1.0.0 permite a atacantes remotos no autenticados obtener informaci\u00f3n confidencial a trav\u00e9s de getweather.html." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25212.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25212.json index eeba1399908..a655b6ae329 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25212.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25212", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-14T15:15:09.063", - "lastModified": "2024-02-15T06:27:12.610", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T20:35:07.213", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25415.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25415.json index d3c18d2c2dd..ce37e764db2 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25415.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25415.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25415", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-16T02:15:51.443", - "lastModified": "2024-06-07T15:15:49.860", + "lastModified": "2024-08-28T20:35:08.127", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en /admin/define_language.php de CE Phoenix v1.0.8.20 permite a atacantes ejecutar c\u00f3digo PHP de su elecci\u00f3n inyectando un payload manipulado en el archivo english.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/capture0x/Phoenix", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25713.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25713.json index 50f95910343..9344f848ae4 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25713.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25713.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25713", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:16.333", - "lastModified": "2024-04-19T23:15:10.380", + "lastModified": "2024-08-28T21:35:04.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "yyjson hasta 0.8.0 tiene un doble free, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo en algunos casos, porque la funci\u00f3n pool_free carece de comprobaciones de bucle. (pool_free es parte del asignador de series de grupos, junto con pool_malloc y pool_realloc)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25893.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25893.json index b8c5a219f0b..2ee88d6b24e 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25893.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25893.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25893", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T18:15:51.580", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-28T21:35:05.727", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ChurchCRM 5.5.0 FRCertificates.php es vulnerable a la inyecci\u00f3n ciega de SQL (basada en el tiempo) a trav\u00e9s del par\u00e1metro GET CurrentFundraiser." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ChurchCRM/CRM/issues/6856", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26445.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26445.json index d4113538dfa..51cf0204c83 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26445.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26445.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26445", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T14:15:47.263", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-28T21:35:06.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /core/tools/delete_place.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/xiaolanjing0/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26455.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26455.json index 7c79abaefee..d6312e151e2 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26455.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26455.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26455", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T18:15:07.863", - "lastModified": "2024-02-26T22:10:40.463", + "lastModified": "2024-08-28T21:35:07.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "fluent-bit 2.2.2 contiene una vulnerabilidad Use-After-Free en /fluent-bit/plugins/custom_calyptia/calyptia.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://github.com/LuMingYinDetect/fluent-bit_defects/blob/main/fluent-bit_detect_1.md", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26491.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26491.json index d37e9dd4f06..cdcfc53a8e2 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26491.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26491.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26491", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T06:15:57.973", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-28T20:35:09.023", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el m\u00f3dulo adicional JD Flusity 'Galer\u00eda de medios con descripci\u00f3n' de flusity-CMS v2.33 permite a los atacantes ejecutar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto del nombre de la Galer\u00eda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/2111715623/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28215.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28215.json index 4d713f6752e..3c620aa721b 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28215.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28215.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28215", "sourceIdentifier": "cve@navercorp.com", "published": "2024-03-07T05:15:54.940", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-08-28T21:35:07.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "nGrinder anterior a 3.5.9 permite a un atacante crear o actualizar la configuraci\u00f3n de webhook debido a la falta de control de acceso, lo que podr\u00eda ser la causa de la divulgaci\u00f3n de informaci\u00f3n y Server-Side Request Forgery." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "cve@navercorp.com", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28396.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28396.json index 53ce1694783..d15d48999d4 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28396.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28396.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28396", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T14:15:08.650", - "lastModified": "2024-03-20T17:18:26.603", + "lastModified": "2024-08-28T21:35:08.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in MyPrestaModules ordersexport v.6.0.2 and before allows a remote attacker to execute arbitrary code via the download.php component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/en/data-import-export/17596-orders-csv-excel-export-pro.html", diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28434.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28434.json index a07233ffce1..033fe3d9bb2 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28434.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28434.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28434", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T14:15:09.720", - "lastModified": "2024-03-25T16:43:06.137", + "lastModified": "2024-08-28T21:35:08.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La plataforma CRM Twenty es vulnerable a cross site scripting almacenado mediante la carga de archivos en la versi\u00f3n 0.3.0. Un archivo svg manipulado puede desencadenar la ejecuci\u00f3n del c\u00f3digo javascript." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29435.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29435.json index f9830d32460..aa90289e0c5 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29435.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29435.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29435", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T20:15:20.710", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-08-28T20:35:10.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema descubierto en Alldata v0.4.6 permite a un atacante ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro ProcessId." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Raybye/ea3a46adc5ea51e659c42218f05153fa", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json index 8b00939762c..c519642d5f2 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29469", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T21:15:32.267", - "lastModified": "2024-03-21T12:58:51.093", + "lastModified": "2024-08-28T21:35:09.653", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en OneBlog v2.3.4 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Lista de categor\u00edas en el m\u00f3dulo Lab. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34195.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34195.json new file mode 100644 index 00000000000..5f85b7c966c --- /dev/null +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34195.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-34195", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-28T20:15:07.580", + "lastModified": "2024-08-28T20:35:10.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34906.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34906.json index 07eb4482124..e980505fa19 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34906.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34906.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34906", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T20:15:13.460", - "lastModified": "2024-05-23T20:42:22.080", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T21:35:11.000", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35344.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35344.json index 5020c2b6d3f..5823e51c56a 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35344.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35344.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35344", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.650", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-28T20:35:11.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Ciertos productos Anpviz contienen una clave criptogr\u00e1fica codificada almacenada en el firmware del dispositivo. Esto afecta a IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, Firmware YM800N_N2, YMF50B, YM800SV2, YM500L8 y YM200E10 v3.2.2.2 y versiones anteriores y posiblemente m\u00e1s proveedores/modelos de c\u00e1mara IP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], "references": [ { "url": "https://willgu.es/pages/anpviz-ip-camera-vuln.html", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json index cf111e8d479..4b3f895356d 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37325", "sourceIdentifier": "secure@microsoft.com", "published": "2024-06-11T17:16:04.477", - "lastModified": "2024-06-13T18:36:09.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T21:29:34.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +61,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_data_science_virtual_machine:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "24.05.24", + "matchCriteriaId": "5CB6563E-EAC9-41D9-A809-930BC0A40DF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37325", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42462.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42462.json index f5fdb227952..61955c1a3a0 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42462.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42462", "sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "published": "2024-08-16T14:15:13.253", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T20:46:39.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.10", + "matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.upkeeper.se/hc/en-us/articles/15432045399452-CVE-2024-42462-Bypass-multifactor-authentication", - "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f" + "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42463.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42463.json index 8664231c3ae..459ea7f08c9 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42463.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42463", "sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "published": "2024-08-16T14:15:13.650", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T20:38:25.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + }, { "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.10", + "matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.upkeeper.se/hc/en-us/articles/15432241822620-CVE-2024-42463-Leak-of-organizations-messages", - "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f" + "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42464.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42464.json index 0679809276a..d4c8171e17d 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42464.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42464", "sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "published": "2024-08-16T14:15:13.933", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T20:35:52.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + }, { "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.10", + "matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.upkeeper.se/hc/en-us/articles/15432275702044-CVE-2024-42464-Leak-of-user-Information", - "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f" + "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42465.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42465.json index 9b23954cd25..b09f9a411f6 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42465.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42465", "sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "published": "2024-08-16T14:15:14.133", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T20:32:31.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + }, { "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.1.10", + "matchCriteriaId": "89DE4E9D-0FC2-459B-95C7-93830E885A9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.upkeeper.se/hc/en-us/articles/15432332385564-CVE-2024-42465-Lack-of-resources-and-rate-limiting-two-factor-authentication", - "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f" + "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42466.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42466.json index 014dba27ce3..d28cb6ce712 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42466.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42466", "sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "published": "2024-08-16T14:15:14.343", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T20:48:14.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + }, { "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.10", + "matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.upkeeper.se/hc/en-us/articles/15432408367260-CVE-2024-42466-Lack-of-resources-and-rate-limiting-login", - "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f" + "source": "80f39f49-2521-4ee7-9e17-af5d55e8032f", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42793.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42793.json new file mode 100644 index 00000000000..1c4f536e0d7 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42793.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42793", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-28T20:15:07.707", + "lastModified": "2024-08-28T20:35:12.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Music Management System v1.0 via a crafted request to the /music/ajax.php?action=save_user page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/CSRF%20-%20Edit%20User.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42851.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42851.json index 2947888244f..198247c5ea6 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42851.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42851.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42851", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T18:15:14.993", - "lastModified": "2024-08-27T19:35:28.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T20:15:07.787", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en exiftags de c\u00f3digo abierto v.1.01 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n paresetag." } ], "metrics": { @@ -49,7 +53,7 @@ ], "references": [ { - "url": "https://github.com/T1anyang/fuzzing/blob/main/exiftags/crash.md", + "url": "https://github.com/T1anyang/fuzzing/tree/main/exiftags", "source": "cve@mitre.org" } ] diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42913.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42913.json index 7b0b15281cd..00d33a7c8a5 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42913.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42913.json @@ -2,19 +2,23 @@ "id": "CVE-2024-42913", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T18:15:07.283", - "lastModified": "2024-08-26T19:10:09.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T20:15:07.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "RuoYi CMS v4.7.9 was discovered to contain a SQL injection vulnerability via the job_id parameter at /sasfs1." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que RuoYi CMS v4.7.9 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro job_id en /sasfs1." } ], "metrics": {}, "references": [ { - "url": "https://github.com/yangzongzhuan/RuoYi", + "url": "https://github.com/kkll5875", "source": "cve@mitre.org" } ] diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43805.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43805.json new file mode 100644 index 00000000000..bb048450f31 --- /dev/null +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43805.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43805", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-28T20:15:07.963", + "lastModified": "2024-08-28T20:15:07.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. This vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab v3.6.8, v4.2.5 and Jupyter Notebook v7.2.2 have been patched to resolve this issue. Users are advised to upgrade. There is no workaround for the underlying DOM Clobbering susceptibility. However, select plugins can be disabled on deployments which cannot update in a timely fashion to minimise the risk. These are: 1. `@jupyterlab/mathjax-extension:plugin` - users will loose ability to preview mathematical equations. 2. `@jupyterlab/markdownviewer-extension:plugin` - users will loose ability to open Markdown previews. 3. `@jupyterlab/mathjax2-extension:plugin` (if installed with optional `jupyterlab-mathjax2` package) - an older version of the mathjax plugin for JupyterLab 4.x. To disable these extensions run: ```jupyter labextension disable @jupyterlab/markdownviewer-extension:plugin && jupyter labextension disable @jupyterlab/mathjax-extension:plugin && jupyter labextension disable @jupyterlab/mathjax2-extension:plugin ``` in bash." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-9q39-rmj3-p4r2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44760.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44760.json new file mode 100644 index 00000000000..34ff8bcc86c --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44760.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-44760", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-28T20:15:08.230", + "lastModified": "2024-08-28T21:35:14.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in the component /servlet/SnoopServlet of Shenzhou News Union Enterprise Management System v5.0 through v18.8 allows attackers to access sensitive information regarding the server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/SunmoEMS/SunmoEMS-info.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44761.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44761.json index 0aa8844279f..a47a4f12ee8 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44761.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44761.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44761", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-28T19:15:08.933", - "lastModified": "2024-08-28T19:15:08.933", + "lastModified": "2024-08-28T20:35:14.040", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in EQ Enterprise Management System before v2.0.0 allows attackers to execute a directory traversal via crafted requests." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/WarmBrew/web_vul/blob/main/EQ/EQEMS.md", diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45043.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45043.json new file mode 100644 index 00000000000..5c2db818fb7 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45043.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-45043", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-28T20:15:08.347", + "lastModified": "2024-08-28T20:15:08.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The OpenTelemetry Collector module AWS firehose receiver is for ingesting AWS Kinesis Data Firehose delivery stream messages and parsing the records received based on the configured record type. `awsfirehosereceiver` allows unauthenticated remote requests, even when configured to require a key. OpenTelemetry Collector can be configured to receive CloudWatch metrics via an AWS Firehose Stream. Firehose sets the header `X-Amz-Firehose-Access-Key` with an arbitrary configured string. The OpenTelemetry Collector awsfirehosereceiver can optionally be configured to require this key on incoming requests. However, when this is configured it **still accepts incoming requests with no key**. Only OpenTelemetry Collector users configured with the \u201calpha\u201d `awsfirehosereceiver` module are affected. This module was added in version v0.49.0 of the \u201cContrib\u201d distribution (or may be included in custom builds). There is a risk of unauthorized users writing metrics. Carefully crafted metrics could hide other malicious activity. There is no risk of exfiltrating data. It\u2019s likely these endpoints will be exposed to the public internet, as Firehose does not support private HTTP endpoints. A fix was introduced in PR #34847 and released with v0.108.0. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://docs.aws.amazon.com/firehose/latest/dev/controlling-access.html#using-iam-http", + "source": "security-advisories@github.com" + }, + { + "url": "https://docs.aws.amazon.com/firehose/latest/dev/httpdeliveryrequestresponse.html", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-telemetry/opentelemetry-collector#alpha", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/pull/34847", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/security/advisories/GHSA-prf6-xjxh-p698", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/receiver/awsfirehosereceiver", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-telemetry/opentelemetry-collector-releases/pull/74", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-telemetry/opentelemetry-collector-releases/releases/tag/v0.108.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-telemetry/opentelemetry-collector-releases/tree/main/distributions/otelcol-contrib", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45046.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45046.json new file mode 100644 index 00000000000..4d27e1f8841 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45046.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-45046", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-28T21:15:06.603", + "lastModified": "2024-08-28T21:15:06.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. In affected versions `\\PhpOffice\\PhpSpreadsheet\\Writer\\Html` doesn't sanitize spreadsheet styling information such as font names, allowing an attacker to inject arbitrary JavaScript on the page. As a result an attacker may used a crafted spreadsheet to fully takeover a session of a user viewing spreadsheet files as HTML. This issue has been addressed in release version 2.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/f7cf378faed2e11cf4825bf8bafea4922ae44667", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/pull/3957", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-wgmf-q9vr-vww6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45048.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45048.json new file mode 100644 index 00000000000..20826505edc --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45048.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45048", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-28T21:15:06.817", + "lastModified": "2024-08-28T21:15:06.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. Affected versions are subject to a bypassing of a filter which allows for an XXE-attack. This in turn allows attacker to obtain contents of local files, even if error reporting is muted. This vulnerability has been addressed in release version 2.2.1. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/bea2d4b30f24bcc8a7712e208d1359e603b45dda", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-ghg6-32f9-2jp7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45054.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45054.json new file mode 100644 index 00000000000..e2a29188362 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45054.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-45054", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-28T20:15:08.547", + "lastModified": "2024-08-28T20:15:08.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been patched in version 0.14.6. All users are advised to upgrade. Users unable to upgrade should update and limit the ClusterRole using security-role." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/hwameistor/hwameistor/commit/edf4cebed73cadd230bf97eab65c5311f2858450", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/hwameistor/hwameistor/issues/1457", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/hwameistor/hwameistor/issues/1460", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/hwameistor/hwameistor/security/advisories/GHSA-mgwr-h7mv-fh29", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45057.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45057.json new file mode 100644 index 00000000000..fc1a7045fcb --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45057.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45057", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-28T21:15:07.027", + "lastModified": "2024-08-28T21:15:07.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. The lack of sanitization of user-controlled parameters for generating HTML field values \u200b\u200bdynamically leads to XSS (Cross-Site Scripting) attacks. The dynamic generation of HTML fields in the ieducar/intranet/include/clsCampos.inc.php file does not perform the correct validation or sanitization, reflecting the user-controlled values \u200b\u200bto be shown in the page's HTML. This allows an attacker to inject a specific XSS payload into a parameter. Successful exploitation of this flaw allows an attacker to trick the victim into clicking a vulnerable URL, enabling JavaScript scripts to be executed in the browser. Due to the configuration of session cookies, with the HttpOnly and SameSite=Lax flags being defined, there is little an attacker can do to steal the session or force the victim to perform actions within the application. This issue hast been patched but a new release has not yet been made. Users are advised to contact the developer and to coordinate an update schedule." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/portabilis/i-educar/commit/f2d768534aabc09b2a1fc8a5cc5f9c93925cb273", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45058.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45058.json new file mode 100644 index 00000000000..d48b36f30dd --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45058.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45058", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-28T21:15:07.283", + "lastModified": "2024-08-28T21:15:07.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. An attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions). Any user is capable of becoming an administrator, which can lead to account theft, changing administrative tasks, etc. The failure occurs in the file located in ieducar/intranet/educar_usuario_cad.php on line 446 , which does not perform checks on the user's current permission level to make changes. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-53vj-fq8x-2mvg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45059.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45059.json new file mode 100644 index 00000000000..7a4dba4da34 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45059.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-45059", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-28T21:15:07.473", + "lastModified": "2024-08-28T21:15:07.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. In affected versions Creating a SQL query from a concatenation of a user-controlled GET parameter allows an attacker to manipulate the query. Successful exploitation of this flaw allows an attacker to have complete and unrestricted access to the database, with a web user with minimal permissions. This may involve obtaining user information, such as emails, password hashes, etc. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-2v4w-7xqr-hxmr", + "source": "security-advisories@github.com" + }, + { + "url": "https://portswigger.net/web-security/sql-injection", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7851.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7851.json index 426a00774d4..de3d3d492fd 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7851.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7851.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7851", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-16T02:15:18.720", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T21:10:07.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Yoga_add.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274756", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274756", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.391640", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7852.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7852.json index 8ff87feb8a2..7e822515ec8 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7852.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7852", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-16T02:15:18.960", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T21:07:30.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Yoga_xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274757", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274757", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.391663", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7853.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7853.json index 9f4dfd23075..e71227ca22c 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7853.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7853", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-16T02:15:19.217", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T21:03:35.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Yoga_sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274758", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274758", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.391666", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7867.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7867.json index 4b737379cbd..5df4da53b19 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7867.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7867", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-08-15T20:15:18.967", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T21:59:33.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,45 @@ "baseSeverity": "LOW" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + }, + { + "lang": "en", + "value": "CWE-369" + } + ] + }, { "source": "xpdf@xpdfreader.com", "type": "Secondary", @@ -77,10 +113,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.05", + "matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-7867.html", - "source": "xpdf@xpdfreader.com" + "source": "xpdf@xpdfreader.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index c08e5f93956..d7c28984dc6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-28T20:00:17.696095+00:00 +2024-08-28T22:00:17.522415+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-28T19:59:22.927000+00:00 +2024-08-28T21:59:33.973000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261393 +261404 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `11` -- [CVE-2024-41236](CVE-2024/CVE-2024-412xx/CVE-2024-41236.json) (`2024-08-28T18:15:09.497`) -- [CVE-2024-42905](CVE-2024/CVE-2024-429xx/CVE-2024-42905.json) (`2024-08-28T18:15:09.630`) -- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-28T19:15:08.933`) -- [CVE-2024-44913](CVE-2024/CVE-2024-449xx/CVE-2024-44913.json) (`2024-08-28T18:15:09.707`) -- [CVE-2024-44914](CVE-2024/CVE-2024-449xx/CVE-2024-44914.json) (`2024-08-28T18:15:09.780`) -- [CVE-2024-44915](CVE-2024/CVE-2024-449xx/CVE-2024-44915.json) (`2024-08-28T18:15:09.863`) +- [CVE-2024-34195](CVE-2024/CVE-2024-341xx/CVE-2024-34195.json) (`2024-08-28T20:15:07.580`) +- [CVE-2024-42793](CVE-2024/CVE-2024-427xx/CVE-2024-42793.json) (`2024-08-28T20:15:07.707`) +- [CVE-2024-43805](CVE-2024/CVE-2024-438xx/CVE-2024-43805.json) (`2024-08-28T20:15:07.963`) +- [CVE-2024-44760](CVE-2024/CVE-2024-447xx/CVE-2024-44760.json) (`2024-08-28T20:15:08.230`) +- [CVE-2024-45043](CVE-2024/CVE-2024-450xx/CVE-2024-45043.json) (`2024-08-28T20:15:08.347`) +- [CVE-2024-45046](CVE-2024/CVE-2024-450xx/CVE-2024-45046.json) (`2024-08-28T21:15:06.603`) +- [CVE-2024-45048](CVE-2024/CVE-2024-450xx/CVE-2024-45048.json) (`2024-08-28T21:15:06.817`) +- [CVE-2024-45054](CVE-2024/CVE-2024-450xx/CVE-2024-45054.json) (`2024-08-28T20:15:08.547`) +- [CVE-2024-45057](CVE-2024/CVE-2024-450xx/CVE-2024-45057.json) (`2024-08-28T21:15:07.027`) +- [CVE-2024-45058](CVE-2024/CVE-2024-450xx/CVE-2024-45058.json) (`2024-08-28T21:15:07.283`) +- [CVE-2024-45059](CVE-2024/CVE-2024-450xx/CVE-2024-45059.json) (`2024-08-28T21:15:07.473`) ### CVEs modified in the last Commit -Recently modified CVEs: `57` - -- [CVE-2024-30624](CVE-2024/CVE-2024-306xx/CVE-2024-30624.json) (`2024-08-28T18:35:15.953`) -- [CVE-2024-31819](CVE-2024/CVE-2024-318xx/CVE-2024-31819.json) (`2024-08-28T19:35:18.897`) -- [CVE-2024-39504](CVE-2024/CVE-2024-395xx/CVE-2024-39504.json) (`2024-08-28T19:58:45.653`) -- [CVE-2024-39506](CVE-2024/CVE-2024-395xx/CVE-2024-39506.json) (`2024-08-28T19:58:56.013`) -- [CVE-2024-39510](CVE-2024/CVE-2024-395xx/CVE-2024-39510.json) (`2024-08-28T19:59:12.947`) -- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-28T19:47:25.410`) -- [CVE-2024-40530](CVE-2024/CVE-2024-405xx/CVE-2024-40530.json) (`2024-08-28T19:15:08.717`) -- [CVE-2024-40531](CVE-2024/CVE-2024-405xx/CVE-2024-40531.json) (`2024-08-28T19:15:08.797`) -- [CVE-2024-40899](CVE-2024/CVE-2024-408xx/CVE-2024-40899.json) (`2024-08-28T19:59:22.927`) -- [CVE-2024-40932](CVE-2024/CVE-2024-409xx/CVE-2024-40932.json) (`2024-08-28T19:48:53.420`) -- [CVE-2024-40934](CVE-2024/CVE-2024-409xx/CVE-2024-40934.json) (`2024-08-28T19:49:04.307`) -- [CVE-2024-40954](CVE-2024/CVE-2024-409xx/CVE-2024-40954.json) (`2024-08-28T19:43:58.273`) -- [CVE-2024-40955](CVE-2024/CVE-2024-409xx/CVE-2024-40955.json) (`2024-08-28T19:45:37.080`) -- [CVE-2024-40956](CVE-2024/CVE-2024-409xx/CVE-2024-40956.json) (`2024-08-28T18:58:48.433`) -- [CVE-2024-40957](CVE-2024/CVE-2024-409xx/CVE-2024-40957.json) (`2024-08-28T18:58:59.793`) -- [CVE-2024-40958](CVE-2024/CVE-2024-409xx/CVE-2024-40958.json) (`2024-08-28T18:46:29.543`) -- [CVE-2024-40959](CVE-2024/CVE-2024-409xx/CVE-2024-40959.json) (`2024-08-28T18:46:52.453`) -- [CVE-2024-43472](CVE-2024/CVE-2024-434xx/CVE-2024-43472.json) (`2024-08-28T19:13:21.393`) -- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-28T19:15:09.110`) -- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-28T19:15:09.210`) -- [CVE-2024-45193](CVE-2024/CVE-2024-451xx/CVE-2024-45193.json) (`2024-08-28T19:15:09.297`) -- [CVE-2024-6361](CVE-2024/CVE-2024-63xx/CVE-2024-6361.json) (`2024-08-28T18:17:35.497`) -- [CVE-2024-7061](CVE-2024/CVE-2024-70xx/CVE-2024-7061.json) (`2024-08-28T18:25:38.217`) -- [CVE-2024-7578](CVE-2024/CVE-2024-75xx/CVE-2024-7578.json) (`2024-08-28T18:27:18.510`) -- [CVE-2024-7579](CVE-2024/CVE-2024-75xx/CVE-2024-7579.json) (`2024-08-28T18:26:46.117`) +Recently modified CVEs: `39` + +- [CVE-2024-25713](CVE-2024/CVE-2024-257xx/CVE-2024-25713.json) (`2024-08-28T21:35:04.973`) +- [CVE-2024-25893](CVE-2024/CVE-2024-258xx/CVE-2024-25893.json) (`2024-08-28T21:35:05.727`) +- [CVE-2024-26445](CVE-2024/CVE-2024-264xx/CVE-2024-26445.json) (`2024-08-28T21:35:06.473`) +- [CVE-2024-26455](CVE-2024/CVE-2024-264xx/CVE-2024-26455.json) (`2024-08-28T21:35:07.220`) +- [CVE-2024-26491](CVE-2024/CVE-2024-264xx/CVE-2024-26491.json) (`2024-08-28T20:35:09.023`) +- [CVE-2024-28215](CVE-2024/CVE-2024-282xx/CVE-2024-28215.json) (`2024-08-28T21:35:07.973`) +- [CVE-2024-28396](CVE-2024/CVE-2024-283xx/CVE-2024-28396.json) (`2024-08-28T21:35:08.140`) +- [CVE-2024-28434](CVE-2024/CVE-2024-284xx/CVE-2024-28434.json) (`2024-08-28T21:35:08.910`) +- [CVE-2024-29435](CVE-2024/CVE-2024-294xx/CVE-2024-29435.json) (`2024-08-28T20:35:10.057`) +- [CVE-2024-29469](CVE-2024/CVE-2024-294xx/CVE-2024-29469.json) (`2024-08-28T21:35:09.653`) +- [CVE-2024-34906](CVE-2024/CVE-2024-349xx/CVE-2024-34906.json) (`2024-08-28T21:35:11.000`) +- [CVE-2024-35344](CVE-2024/CVE-2024-353xx/CVE-2024-35344.json) (`2024-08-28T20:35:11.640`) +- [CVE-2024-37325](CVE-2024/CVE-2024-373xx/CVE-2024-37325.json) (`2024-08-28T21:29:34.533`) +- [CVE-2024-42462](CVE-2024/CVE-2024-424xx/CVE-2024-42462.json) (`2024-08-28T20:46:39.227`) +- [CVE-2024-42463](CVE-2024/CVE-2024-424xx/CVE-2024-42463.json) (`2024-08-28T20:38:25.227`) +- [CVE-2024-42464](CVE-2024/CVE-2024-424xx/CVE-2024-42464.json) (`2024-08-28T20:35:52.940`) +- [CVE-2024-42465](CVE-2024/CVE-2024-424xx/CVE-2024-42465.json) (`2024-08-28T20:32:31.737`) +- [CVE-2024-42466](CVE-2024/CVE-2024-424xx/CVE-2024-42466.json) (`2024-08-28T20:48:14.917`) +- [CVE-2024-42851](CVE-2024/CVE-2024-428xx/CVE-2024-42851.json) (`2024-08-28T20:15:07.787`) +- [CVE-2024-42913](CVE-2024/CVE-2024-429xx/CVE-2024-42913.json) (`2024-08-28T20:15:07.880`) +- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-28T20:35:14.040`) +- [CVE-2024-7851](CVE-2024/CVE-2024-78xx/CVE-2024-7851.json) (`2024-08-28T21:10:07.750`) +- [CVE-2024-7852](CVE-2024/CVE-2024-78xx/CVE-2024-7852.json) (`2024-08-28T21:07:30.690`) +- [CVE-2024-7853](CVE-2024/CVE-2024-78xx/CVE-2024-7853.json) (`2024-08-28T21:03:35.003`) +- [CVE-2024-7867](CVE-2024/CVE-2024-78xx/CVE-2024-7867.json) (`2024-08-28T21:59:33.973`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bd05027e926..80968034a8e 100644 --- a/_state.csv +++ b/_state.csv @@ -172434,7 +172434,7 @@ CVE-2021-27306,0,0,6abb731f828d50dc31f5f8837f00ca666d352d589a763274228d94676f30c CVE-2021-27308,0,0,e75f64a338a590d6b8449ea646ab6c14feb2426700cc002f9c97dbfbf9db1140,2022-05-23T22:32:02.527000 CVE-2021-27309,0,0,8f9d76be4305a6f70900f6114f260a4b3c8b50eb1326d17357d09b984d01979e,2021-03-24T18:49:25.550000 CVE-2021-27310,0,0,17a88a926ef1eb0c9fffe07d584ba0bf2cca7e1fb363224d505448be27be189d,2021-03-24T18:49:16.487000 -CVE-2021-27312,0,1,582b4519c2f7da9307132dd1ce33c17599b9214773e4d22a91abd408d1004b84,2024-08-28T19:35:00.870000 +CVE-2021-27312,0,0,582b4519c2f7da9307132dd1ce33c17599b9214773e4d22a91abd408d1004b84,2024-08-28T19:35:00.870000 CVE-2021-27314,0,0,ef81da613fa1d85737a5304fe0630c44874df715bb96267109aa2ed2ca143cf7,2021-03-05T20:45:06.427000 CVE-2021-27315,0,0,3677cea89d40f4da4399e75a818af2539c61b38b6962a639337d49aae8920b57,2021-03-24T15:53:20.323000 CVE-2021-27316,0,0,337c98afb6705298ed6fdf81f64738cc12146f58af35bb909361215bab6049a6,2021-03-24T15:54:58.873000 @@ -192298,7 +192298,7 @@ CVE-2022-23082,0,0,ed78bdf538bf7b60edbc93ab6504b678e167f80f5b68fc48b75db1e83d985 CVE-2022-23083,0,0,684a6dd88ae5ed867b99fc818b8fefbb26179e2cd128f1a245762ef7032c445b,2022-01-26T14:23:02.100000 CVE-2022-23084,0,0,eed95f3fcb710f55aeaa0b13782419b97e1ab24731bc10139becaf7cdc3a00c6,2024-04-19T07:15:08.510000 CVE-2022-23085,0,0,6c73d80fe53102f1d24a88a241ff940732efb10aff95a9e7b73dbc233257f85c,2024-08-01T13:42:36.137000 -CVE-2022-23086,0,0,1986afec393a76319bf2f11604293837b0b02358fda7fa1eee7a754322983738,2024-04-19T07:15:08.670000 +CVE-2022-23086,0,1,c169c43dc828a3b0f4274b523e5d0ee92a8d70ae315844f678d28d2b1843e91c,2024-08-28T20:35:00.763000 CVE-2022-23087,0,0,7c11c887965510f82185d4811a8db490ae631d7aafb2819d8ae31377af05c24f,2024-05-14T10:18:03.900000 CVE-2022-23088,0,0,41b982ff884b09c7af016b00e2197b8636d45745a8254c2bcb871053e56fd8c8,2024-08-01T13:42:36.930000 CVE-2022-23089,0,0,a18ed816bdf6550bacfc7602b0b6a6a3a9b978a024fd3339be9009323e78d936,2024-05-14T10:18:04.163000 @@ -200717,7 +200717,7 @@ CVE-2022-33159,0,0,09a6d779ef2e921e906741d69945a5716b4aa63c927464d64d0cc321c8c2b CVE-2022-3316,0,0,0e352ce0dc79277646c38d84f177d0d41bf6a8506e72acb1afb6e4cdb4e789e9,2023-08-08T14:22:24.967000 CVE-2022-33160,0,0,4524e302e986f2f11251ec9420ef9a332e5b897db2b323b489b3697e20151940,2023-10-10T19:33:22.613000 CVE-2022-33161,0,0,9b564272eda8422bcfdb9e610ed785f83a39fd4e9f350f5a12254c1413af8489,2023-10-18T20:32:01.117000 -CVE-2022-33162,0,0,ddc66ac41c43ce4a11c7c91a727316fec131c8c06fea536a9d66a05d08dbbd2d,2024-08-19T13:00:23.117000 +CVE-2022-33162,0,1,ee83992396dc1d90b25687e547b058d924eb9adc5b04664ce4d4fc20d72bc710,2024-08-28T21:50:06.957000 CVE-2022-33163,0,0,b61f3ea147baa21e6ebf2ff08a6d967daea38661c6a0960dc98920da3d5f205f,2023-06-21T01:21:30.867000 CVE-2022-33164,0,0,dbaf77514b572a2cfd8228382e6c957006b84e1d6ae63a3e84231dd2ca0b472b,2023-09-12T19:32:37.400000 CVE-2022-33165,0,0,e7688469b7d6da31601d151e4c0adf399b51978b7602bb1f42ecf3e3278543da,2023-10-18T20:34:14.447000 @@ -210719,7 +210719,7 @@ CVE-2022-46491,0,0,7cf787b0158a46d4d0a3a850683fc606cd27e2e320475f05bf2ddc7245cee CVE-2022-46492,0,0,0d81290360c5ada607484ec0ad93da74f5a2923c0d38acd52abc7a99f70f88df,2022-12-30T21:58:26.497000 CVE-2022-46493,0,0,8bc0a9915aba601c6842b74a3b025d212c7066b5f6bd6752f00c22069375ded3,2022-12-30T21:51:55.933000 CVE-2022-46496,0,0,c3befa1df0c30d834ae1c378018c388a17eda39b09699ab7fe1e9a9331d9cad5,2023-02-14T23:37:54.023000 -CVE-2022-46497,0,0,dcd1abb9de3dc65c257ba425d5a9b9928fa3724a60328a4a2de7f515de6199f3,2024-03-07T13:52:27.110000 +CVE-2022-46497,0,1,fdd15307fcbb61cc1ee8fe6578d9fff4954a47ac5f48f3971ddbb2807d571379,2024-08-28T21:35:00.797000 CVE-2022-46498,0,0,062148cc3061fa91c4a108e42bef3a9f125c3d1f2bb16b9b89663981c79acc97,2024-08-01T13:43:03.260000 CVE-2022-46499,0,0,d33b165617169a7122716363ce1c101954c885dac6453896a659fcba4e0adcf1,2024-08-14T19:35:07.510000 CVE-2022-4650,0,0,f3263e15cad35090681797f47376b7071744d021767c2be8dc922dbf6caa2f31,2023-11-07T03:58:28.357000 @@ -218046,7 +218046,7 @@ CVE-2023-2433,0,0,fcefb1d744e2436ca34c1e96068dcbd24fc8579f4fa267fa852ea1937f688b CVE-2023-24330,0,0,f05bada3541e493f7c0e952b860209e4955262c38b475c09bca0b6c5156aade2,2024-08-01T13:43:24.723000 CVE-2023-24331,0,0,050f04d9bf3b2540619b4f1f79736e1598d2474273dc0664c9e95b1007380a03,2024-02-22T19:07:27.197000 CVE-2023-24332,0,0,1c7be458c561d88b0c65bf8a70fcb4598344686f5f419e9a0237e871f28b3aa5,2024-08-14T15:35:01.550000 -CVE-2023-24333,0,1,7e9df531c069ed4755a06f2fb82b4efefe770605f70313b1d809bac7d59607a8,2024-08-28T18:35:00.873000 +CVE-2023-24333,0,0,7e9df531c069ed4755a06f2fb82b4efefe770605f70313b1d809bac7d59607a8,2024-08-28T18:35:00.873000 CVE-2023-24334,0,0,6e7ba58a919aa1ee8ff4fce321878db0fcd5ef0e2aebc034e541821e975781cb,2024-08-01T13:43:27.040000 CVE-2023-2434,0,0,a9f172aa8578fb49449bc37bd820ab24b165eed89a9643a4cca796b2ac20b5bf,2023-12-18T15:32:39.347000 CVE-2023-24343,0,0,d251214a0e80bbc1652809830ae45654632b0e128cea4fecfea9ad00cc1f3017,2023-04-26T18:55:30.893000 @@ -225418,7 +225418,7 @@ CVE-2023-33672,0,0,291fb7f59d1eae6b75bde1b5d591242bc0fb25cab928068f6a85a8688c610 CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000 CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000 CVE-2023-33676,0,0,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000 -CVE-2023-33677,0,1,35438bc3c583b720476f0810047f72c89de7148b69d615cdaedc0dd5902008d1,2024-08-28T19:35:04.520000 +CVE-2023-33677,0,0,35438bc3c583b720476f0810047f72c89de7148b69d615cdaedc0dd5902008d1,2024-08-28T19:35:04.520000 CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000 CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000 CVE-2023-3369,0,0,29db5da69a767c35aea22ed723b1c6ee7c43f48ed1175441113bf5511d1f51e2,2023-11-07T04:18:36.577000 @@ -230203,7 +230203,7 @@ CVE-2023-40096,0,0,80c28bf71c8b791e73e10c9865fe8d8ebce552d17765524b6f7ba8d0a8a23 CVE-2023-40097,0,0,fcc14a5c69e91f7c4d728f7cbe0f0a48c2badf3e8d8d2f00222df0c4c9ef7a84,2024-02-02T03:14:39.080000 CVE-2023-40098,0,0,69f1206eae11d461353fadcedd8eb7551d87c233816314ea6c393cc2539141ed,2024-02-02T03:14:34.950000 CVE-2023-4010,0,0,a8a9f7812f565816476651b6e5296effbd88d1bb2d79eb39527cfc3f0a26dfd0,2023-11-07T04:22:02.797000 -CVE-2023-40100,0,1,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b418,2024-08-28T19:35:06.173000 +CVE-2023-40100,0,0,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b418,2024-08-28T19:35:06.173000 CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000 CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000 CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000 @@ -230327,8 +230327,8 @@ CVE-2023-40235,0,0,72105b9c559b1ddc2ad9f13c18ab13a9fa55a22727500e92992c4e0f4ec55 CVE-2023-40236,0,0,14f71801e1dfdcd9b355f3adbfa06238032294610f81b46a111266eb7777a93e,2023-12-29T18:39:44.950000 CVE-2023-40238,0,0,8cd9a6ac9959ba296d215977c1b87d1d771afcf7aab5c34be210430f1271dda5,2024-01-05T18:15:29.060000 CVE-2023-40239,0,0,aa0e89bb1e96bd5e8e2f363b3dde8360217f94f32277b47a1c6e77ce38b58a84,2023-09-07T16:26:26.913000 -CVE-2023-4024,0,1,3263f70bc4cfa471a1ebfbe3b6dd7f1caa59a19b55a8814fb5cad997ea7b1073,2024-08-28T18:32:02.433000 -CVE-2023-4025,0,1,875d633a8539be92bae12be6b1a35372471c5c3157e9171ada60f67dadd02517,2024-08-28T18:30:15.657000 +CVE-2023-4024,0,0,3263f70bc4cfa471a1ebfbe3b6dd7f1caa59a19b55a8814fb5cad997ea7b1073,2024-08-28T18:32:02.433000 +CVE-2023-4025,0,0,875d633a8539be92bae12be6b1a35372471c5c3157e9171ada60f67dadd02517,2024-08-28T18:30:15.657000 CVE-2023-40250,0,0,e7ce0448e3779d770797cca3047b64ac1d7604cdc050879a2952ebbea5fc57b1,2024-01-18T20:24:35.633000 CVE-2023-40251,0,0,e47d373aa9704daf646bd928a2cc0678149d495cfca9b7abbd3818e5c74903f1,2023-08-29T02:15:08.277000 CVE-2023-40252,0,0,27897e9f2fd3e9374d607e66dbdfb25f185ac2f919ae5207dfb1a7fd5974c153,2023-08-29T02:15:08.503000 @@ -231325,7 +231325,7 @@ CVE-2023-4149,0,0,5a341b7a68a99d862a2511fd7c4a78db3797c78d3afe50d681d537931f6fe4 CVE-2023-4150,0,0,9e17d01d6dfd1bbad4581e9bdc99c95cb8eb97d9ecbd407283e813b7b9285ddf,2023-11-07T04:22:11.360000 CVE-2023-41503,0,0,21a3f966ba8ab913409d2ff2fb633345f410b80e162d1526608421e53802bf8f,2024-08-02T19:35:22.577000 CVE-2023-41504,0,0,848cc4699c1e8eb18242fd890d1d1b583b0b775a2ec9c39e2320016a91149dcd,2024-08-05T14:35:01.417000 -CVE-2023-41505,0,1,aefb47bffb6d5b20a178fde4ec0b5b68799db86995d46b1812020cc11de222af,2024-08-28T19:35:06.953000 +CVE-2023-41505,0,0,aefb47bffb6d5b20a178fde4ec0b5b68799db86995d46b1812020cc11de222af,2024-08-28T19:35:06.953000 CVE-2023-41506,0,0,d854ac7b20badfa924f73cdc9c8d229d9b3405b1560ab063fe84fca34598864e,2024-08-27T20:35:01.473000 CVE-2023-41507,0,0,42d7d587d5d24994ad22c5fee4b7a0d6974f9356ec83148dba96a9f7c6064ec6,2023-09-08T16:51:07.547000 CVE-2023-41508,0,0,9c51a520e4e0cd0b92dd417c82bafa4b094dbd24138cf8d018d6424f00a3ea0c,2023-09-11T18:53:12.833000 @@ -232092,7 +232092,7 @@ CVE-2023-42578,0,0,23816d96a4e8f8e7a85e681befe6c1b4beef53cae2b13da25d8ba105d77fb CVE-2023-42579,0,0,943fbf5d99df6edb832545cbbb389aa9f400ef688a2c81d3258a334debe4480e,2023-12-12T21:22:00.157000 CVE-2023-4258,0,0,70cc916926ada92ee8983ef15a32e9a54f92480bc5437f4dc1fabee6bc18e751,2023-09-26T17:19:08.510000 CVE-2023-42580,0,0,857d6b0c372e6663712d898c016feff0c3c218909136cd95337a864def798f99,2023-12-12T17:09:19.990000 -CVE-2023-42581,0,1,51a00bb7f2ed622b0d566db5c08d53683b1453c01821648994dfe0bb825438d4,2024-08-28T19:35:07.143000 +CVE-2023-42581,0,0,51a00bb7f2ed622b0d566db5c08d53683b1453c01821648994dfe0bb825438d4,2024-08-28T19:35:07.143000 CVE-2023-4259,0,0,66c07068928725737fca6c815c044a284bfe54d498bc2dc1dfdc90d5db05576a,2023-12-22T19:33:51.477000 CVE-2023-4260,0,0,825d2e262d09d358795c77a30ca8ce45e8b4eeaff5088b76af0e3b42b67d864b,2023-12-22T19:33:33.067000 CVE-2023-4262,0,0,96c5e685e0ea51dcabf79db9f0bdc769da7bbc4411b11be6252f295df8d63962,2024-08-01T00:15:02.090000 @@ -232337,7 +232337,7 @@ CVE-2023-42869,0,0,2efc0c625b3f1a276a18ac7ae086c1c80073dac1702473316e3e6db4eb620 CVE-2023-42870,0,0,85fcae2d7fb76b4e32365c34612d1da44d242ece827fcc97bcfc9ce0e906872d,2024-01-16T23:52:09.227000 CVE-2023-42871,0,0,833a3e23a8d61427d074f23dee0288edd3316bac0beeec700383292c5a110e03,2024-01-16T23:52:19.197000 CVE-2023-42872,0,0,89caf9b59964cf9b9d094258bce26b8b185e25cef5a5508065b1c6001ad7b56e,2024-01-16T23:52:30.453000 -CVE-2023-42873,0,0,e686cea391819c4142966b12ed58d878dc6bba5d3054cec5e70eef0f4876faf8,2024-02-22T19:07:27.197000 +CVE-2023-42873,0,1,f1055070f5d2c8964679f9d4c375bc90c864cdc2b3efb5cf9fe0466754f266b2,2024-08-28T20:35:03.950000 CVE-2023-42874,0,0,964baee28b6c72a15098069b9e881e1b193059d80a9fe10f47c0787dba9650a1,2023-12-13T23:29:19.097000 CVE-2023-42876,0,0,974317a11812600494105057904f88983c49db0f187d890a9f6b1ea5995af4ff,2024-01-12T14:42:40.430000 CVE-2023-42877,0,0,6cad27eae60657c9f948e06003fc8819bbc3ef2215aadba8c1d4e84902953011,2024-08-01T13:44:48.073000 @@ -232582,7 +232582,7 @@ CVE-2023-43298,0,0,9dc228ff73bdf528d43d0ed69906bd07f68ca6fc9bc3f0ef853fca3322473 CVE-2023-43299,0,0,d94c0bf3ab73b965669565a71d51568c9bc57077de1c801b8cedf6d024d95ce3,2023-12-11T17:49:28.370000 CVE-2023-4330,0,0,2fd86e9dd0e579883f8f7c0829ab8b7bda8ac701dd8a56f071347c2e4152f68e,2023-11-07T04:22:28.047000 CVE-2023-43300,0,0,f0be1d017072b0cff316436c66a7299c83b2fd4838fb89ce71859847a9053a33,2023-12-13T21:24:31.183000 -CVE-2023-43301,0,1,6f50951f3b5632dfdd837d8c68cd8a26f5a2fe1134449bdb506bbd5fe04343bb,2024-08-28T18:35:04.500000 +CVE-2023-43301,0,0,6f50951f3b5632dfdd837d8c68cd8a26f5a2fe1134449bdb506bbd5fe04343bb,2024-08-28T18:35:04.500000 CVE-2023-43302,0,0,edd1d8c368949a8601a81887ecd4be6df4ec6d90acda56627d9aeac98fd2253e,2023-12-13T21:24:15.203000 CVE-2023-43303,0,0,01a5e9c635cbf46583a40d8cd583b7ab7550198f2870556b254d79899012babb,2023-12-13T21:24:10.403000 CVE-2023-43304,0,0,5c0749626957cae1c690c285ce09a1c1b29fbb73d61b41212b63ce9ff0280580,2023-12-13T21:24:04.613000 @@ -235612,7 +235612,7 @@ CVE-2023-4772,0,0,a5b93b502ddd01f9ee27674c836bf711ac9d02f44090fbc833b759d04d7de8 CVE-2023-47722,0,0,4f8feb65ac7241c12bbfc6f420a659b6dc9261f80cca7593f7d59fc3078ebf18,2023-12-12T21:04:18.177000 CVE-2023-47726,0,0,ceb40283504932a4e91f9e28d60424f146c7ffbecdb57c926139775e8d80827a,2024-06-20T12:44:01.637000 CVE-2023-47727,0,0,1611cf4537a23d5fbfc3a2499faf292e60ac118492bebcff86e1854dfc9ea8f7,2024-05-02T18:00:37.360000 -CVE-2023-47728,0,0,d5fe6c1fa9be5819dc3a81d2161e01e198896c58d4166a1e912cbc704f80b62c,2024-08-19T13:00:23.117000 +CVE-2023-47728,0,1,9d9b004fcde3982f43b196d097d8f47dbe8e79b165e63e4e225567a4a70b10dd,2024-08-28T21:40:55.593000 CVE-2023-4773,0,0,01f0d277e96ad9628dd6920885ad7b499f840100cbeefdbe3a242a19aa900bdd,2023-11-07T04:22:57.903000 CVE-2023-47731,0,0,bdb6aabed94397db2521c199a558a02d451711e75ae9322b4498e9bbac095b67,2024-04-24T13:39:42.883000 CVE-2023-4774,0,0,18865190999a54b58dcf753cd88068601ff8cb29b163a504c848eb5e82d8b2e4,2023-11-07T04:22:58.080000 @@ -236914,7 +236914,7 @@ CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e8 CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000 CVE-2023-49539,0,0,3d9077c363f63e00a9a99e014f79fcf2da947642965bca45dcb61b1a8743768c,2024-03-01T22:22:25.913000 CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000 -CVE-2023-49543,0,0,9b27cf28e2f4c20b40d2a61fced0fc62af90f21931996c253e884b5f19a62074,2024-03-01T22:22:25.913000 +CVE-2023-49543,0,1,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000 CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000 CVE-2023-49545,0,0,5c8aa915328bef2165801ea42c2341178b1be4c886fc54a48ff456640387987f,2024-08-26T20:35:08.767000 CVE-2023-49546,0,0,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000 @@ -238418,7 +238418,7 @@ CVE-2023-51820,0,0,7aa0f7d98725dd77268f0caeb4fb8d7e759133db0c7956115ba3b94b4e25c CVE-2023-51828,0,0,90063f5e09b01f503f1f6e58b8400efb2ad9738539cfe67915469ad778201a68,2024-08-27T19:35:09.897000 CVE-2023-5183,0,0,b93a57cbfd23c7656908cf8ce0c47fe83e4871febf63c360b65228bdb8fcae2a,2023-10-02T19:22:03.777000 CVE-2023-51833,0,0,b10ac15f68016bd5d4bd8d474cb15f2be07ff92fa1dfb1c5cbe6b8926dbb6e85,2024-01-31T23:32:20.930000 -CVE-2023-51835,0,0,95cc4db7c615cdb1c602639e2e37c3a762bd3c301b530acb72f57667401f78e7,2024-02-29T13:49:47.277000 +CVE-2023-51835,0,1,1004f16e80cfae3e9d64447b344df5ce8071dd9ded705f59fac6569aa35fdf59,2024-08-28T20:35:05.240000 CVE-2023-51837,0,0,ee6381e3ad2625a17fc9f7c6d4f9ac85250766336ea84c83e6b004280ea3c079,2024-02-05T18:26:18.803000 CVE-2023-51838,0,0,7d9f6553d406d679830def1ed8648869865057343b17af403444c3ad443f10fa,2024-02-10T04:04:47.587000 CVE-2023-51839,0,0,8034f770436aab6d940c193dd221e45f8cd0e35b2a744ae0d6fd22bcab3ad938,2024-02-06T17:02:34.433000 @@ -240125,7 +240125,7 @@ CVE-2023-6139,0,0,58b38774f648051a2e873a85ff7a37aee0cf4ea89e9a3a4e1cb9e586395309 CVE-2023-6140,0,0,d7aafe3b370ae93fdafc86b9788a271fc411e8123752fb92571bb74932be1e51,2024-01-11T19:50:08.143000 CVE-2023-6141,0,0,c8dcaa0f230bcf4bab61b5120b835e0002022e253aa8729320cdbf7d8b88a7c3,2024-01-11T19:48:22.663000 CVE-2023-6142,0,0,3fe59169d0ca291deeb17bb2da3d1e912e0369f1ef3de114449566381868dbc1,2023-11-29T17:21:22.010000 -CVE-2023-6143,0,1,2b02b2a87e188ae67b19643934110db253247a6a6318ed4d21a616265991aa41,2024-08-28T19:35:07.420000 +CVE-2023-6143,0,0,2b02b2a87e188ae67b19643934110db253247a6a6318ed4d21a616265991aa41,2024-08-28T19:35:07.420000 CVE-2023-6144,0,0,f1ada52cef47fbae7861cb468cbf9029aefa6079f9529a530cc69ebc44690282,2023-11-29T17:21:04.480000 CVE-2023-6145,0,0,b6eb696be83bb3d8e6f03bcc3cffbbf6ce301a3b5d147393bbef0fd0f87c4ee0,2024-02-29T01:42:33.440000 CVE-2023-6146,0,0,0a628bb48560248a46754aa0cc3ac6ec47651dc2ffdb0446c47e5313a06edf08,2023-12-12T17:20:59.940000 @@ -241139,10 +241139,10 @@ CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c47 CVE-2024-0045,0,0,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000 CVE-2024-0046,0,0,652dd2830858c9f5da14ce2fb1063779ed8d3adc9358318f9bd8799e5a854450,2024-08-05T20:35:02.317000 CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000 -CVE-2024-0048,0,1,2b50afbb16484af02f7a9fac9c6d27f3ee81b516e9d386d878d7bca0ff138175,2024-08-28T19:35:07.667000 +CVE-2024-0048,0,0,2b50afbb16484af02f7a9fac9c6d27f3ee81b516e9d386d878d7bca0ff138175,2024-08-28T19:35:07.667000 CVE-2024-0049,0,0,f9f835822b69f6be57714cc4435ee72c0d6574c4bbf25abdddb096ed40c941c2,2024-08-01T13:45:56.777000 CVE-2024-0050,0,0,58a42c9b281faf7f034f105a443afa241b3c1edb6abc4c502f110ae260e2255e,2024-08-14T20:35:05.473000 -CVE-2024-0051,0,1,d8619ee025d9755a2c3cbb0bd85ce3e0383bc5138599bd4fcfc12bfd088fcc67,2024-08-28T19:35:08.443000 +CVE-2024-0051,0,0,d8619ee025d9755a2c3cbb0bd85ce3e0383bc5138599bd4fcfc12bfd088fcc67,2024-08-28T19:35:08.443000 CVE-2024-0052,0,0,028f0ef50c0a5bd8d4204c572d3df54976f47eea47c82f4c337b4b73e60f4aea,2024-03-12T12:40:13.500000 CVE-2024-0053,0,0,1819b010c6a0341de8f41f40de4966b4aa1ac2481826c4f42a23be7eb74898c6,2024-03-12T12:40:13.500000 CVE-2024-0054,0,0,65ffdd62a15fbba9fa1857978982b951512db6bc7615451d76f1e47eca67a7de,2024-03-19T13:26:46 @@ -242141,7 +242141,7 @@ CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990c CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000 CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000 CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000 -CVE-2024-1174,0,0,5819d7dc07530e4f78032d8ca2898aeefda75500673f943b0bbe932afae90f9f,2024-03-01T22:22:25.913000 +CVE-2024-1174,0,1,1a20d0936daa8c05ea33a8dfff3a4c4c734ee1e57e74d832a558685298d668aa,2024-08-28T21:35:03.473000 CVE-2024-1175,0,0,190484da8a43d8915393af59d3a99a603fc65c2c05796109a63c7e3028461e1e,2024-07-24T20:32:01.573000 CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc6a,2024-03-13T18:16:18.563000 CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb88,2024-02-13T14:06:04.817000 @@ -243948,7 +243948,7 @@ CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000 CVE-2024-2150,0,0,c22643bdc0b2ebd66d5b5ba194b52141f4bdaa1a38843b6dbc7c558d59d8b77c,2024-05-17T02:38:04.570000 CVE-2024-21500,0,0,e32cca032c5c817f0140a0fc7fc7560c3a63cfca90476fe248b7470595a38be1,2024-02-20T19:50:53.960000 -CVE-2024-21501,0,1,d04e2442e85706ba7437e49b49125d8ebfada3b71184a475809a9f06322396f6,2024-08-28T18:35:07.823000 +CVE-2024-21501,0,0,d04e2442e85706ba7437e49b49125d8ebfada3b71184a475809a9f06322396f6,2024-08-28T18:35:07.823000 CVE-2024-21502,0,0,fb5ae175e215ddb01ef01146351120b7135179219e17913fc19fbdc46d2b3141,2024-02-26T13:42:22.567000 CVE-2024-21503,0,0,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000 CVE-2024-21504,0,0,d1975e31d99912870265dfe3c0f9fa565e4267402a6881e83026bdfe490998fd,2024-03-19T13:26:46 @@ -244949,7 +244949,7 @@ CVE-2024-23110,0,0,1ac4a7144e9209f9a89949f05fe1e7cc8c377744b32bfb607f177f1a970f3 CVE-2024-23111,0,0,752974f238ed1f3e5e428baa91d031d0aceea7be33f8a58b9a2a43bae855557c,2024-08-23T02:47:13.560000 CVE-2024-23112,0,0,95e5175d7388e29c67df9af8c672941dd9e221ee4e0a1ee87f756c639ee8dad2,2024-03-15T14:51:58.497000 CVE-2024-23113,0,0,a86bcac9b7145820c2db580ab2ab4b188eadec5244c508e4a8d29ba1588a2fac,2024-02-22T15:33:00.970000 -CVE-2024-23114,0,0,03e50e602026c87049fc39891badf0add6dff4aacb97347ed09b1b72c8d9744c,2024-02-20T19:50:53.960000 +CVE-2024-23114,0,1,7252a5a302093b43221ea76f9a6a29eda61311bf101ae44cd86a63862ce26956,2024-08-28T20:35:06.210000 CVE-2024-23115,0,0,7b60c057c6ecb2992362930744ce2990e40a5ef55d9da25b0609baa5f284fa28,2024-04-02T12:50:42.233000 CVE-2024-23116,0,0,b697b868738862e20bfb62cd043729402a6443f2a45a0bdae976d2a021726d27,2024-04-02T12:50:42.233000 CVE-2024-23117,0,0,35c4c339ac9e75a53935ba1466f971b15f8b507bfeb01dc62bdf9baf493fb678,2024-04-02T12:50:42.233000 @@ -245803,7 +245803,7 @@ CVE-2024-24307,0,0,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a CVE-2024-24308,0,0,9ada0d13ba5340544a70c5b14e080090e424c427d0bb515a6aa9cb42f7e5a321,2024-08-19T17:35:09.203000 CVE-2024-24309,0,0,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000 CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000 -CVE-2024-24310,0,0,af04adebe05e8114c2a9b004dbebb8cc6f695f58ee0a67c77d2adc708c42b448,2024-02-26T13:42:22.567000 +CVE-2024-24310,0,1,49de2d229494dcaf88bdbea8808fdf97cef92477947ea551609470feec6450a8,2024-08-28T21:35:04.093000 CVE-2024-24311,0,0,0b1cb4c07817a4dcaf8ad6ee7df96b5fd803208f5f5402c3441d71356d2e8e1c,2024-02-14T21:39:26.980000 CVE-2024-24312,0,0,c3d81851b0a21c153d5502fcc6af6d534386ad04fb506c5f3df2dbd0255efd0a,2024-07-03T01:48:16.113000 CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583f43,2024-07-03T01:48:16.943000 @@ -246253,7 +246253,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000 CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000 -CVE-2024-25024,0,0,5b50d32398b3d8009e2e511ffa51300a2834b21c0a317a99bfa2ae17a818833f,2024-08-15T13:01:10.150000 +CVE-2024-25024,0,1,c5213c97e29706cc8502e6ba764e983599ae5293cf5cf0bdf7f7d6886ba77ef4,2024-08-28T21:53:10.720000 CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000 CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000 CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000 @@ -246366,7 +246366,7 @@ CVE-2024-25170,0,0,5a57c221aced5771a411a434828fd35e5d41dcc64fd1585dedec2f988b96a CVE-2024-25175,0,0,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000 CVE-2024-2518,0,0,67143896f82c167febad3b5ae58ed9a1bb65a46487dbef8c359c6c9e56cccd8d,2024-05-17T02:38:16.523000 CVE-2024-25180,0,0,8c8cea33a8c1bad01398ae9d5caf8e0f261db9188d8abf6e5630bbb7f06810da,2024-08-26T20:35:12.890000 -CVE-2024-25187,0,0,235931cb55f2324cb5235f058c93cb713e862085431cae896b9108cfe9eba975,2024-04-02T12:50:42.233000 +CVE-2024-25187,0,1,3f849b5c9e9055fc7421b5d436dcb2dd592f0d29cf293a63eb0bdef9513504b8,2024-08-28T20:35:06.460000 CVE-2024-25189,0,0,b7285685c6f5c1c6f11a2dabc1c6b4d00245303e64f2bbc0a8b2b13145e32ef7,2024-08-26T19:35:15.397000 CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac80,2024-05-17T02:38:16.610000 CVE-2024-25190,0,0,c3a0f2b38cd0b3f7473eb6954f63f83b24d13fd5e163be63555d08acedef83ae,2024-08-19T20:35:06.090000 @@ -246385,7 +246385,7 @@ CVE-2024-25209,0,0,d5a869bb410fd2403b975aa6acf4c48509a1d388c3696e8d5965ba3440b96 CVE-2024-2521,0,0,0838497f1916a708252295ddb1e5512e6c3ac757ef93b04ae3f403784c7490e3,2024-05-17T02:38:16.787000 CVE-2024-25210,0,0,dd28b2c6cb9a88a5b91c68f6ad7360de203218fb8e2273a408f42a17c2d3394b,2024-02-14T16:13:16.563000 CVE-2024-25211,0,0,f0c0cc0b75a85bd287956104006e6509dabb58e126ecbb91e5dbba932e52990a,2024-02-14T16:13:16.563000 -CVE-2024-25212,0,0,4989dc122506c608076abea65ae7e0b9789e3d95d8eb0664d8c70c9ad9009364,2024-02-15T06:27:12.610000 +CVE-2024-25212,0,1,2f511dbe53dda725f1026e6fb3684ad3dcdbb4e3a9bf4b3999eacf1d7a2579a0,2024-08-28T20:35:07.213000 CVE-2024-25213,0,0,c54ec18894af4a5d6ced7000bcaa8c487846e8fcbfc5321ba8aad242a58f22d8,2024-02-15T06:27:20.520000 CVE-2024-25214,0,0,1ba8af84b5d311dbb39674bae13cefbf6d7fcb4d9ffa5558f51b66ae2fef5be2,2024-08-16T20:35:06.060000 CVE-2024-25215,0,0,3b37a94df90b65e7417dee74161c3b1b221d93df92a185b49be1c5811fcd762a,2024-02-15T06:27:41.287000 @@ -246488,7 +246488,7 @@ CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313 CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000 CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000 CVE-2024-25414,0,0,e37faede54af522703a4e537065f1d12f9e2e079cddb040df250a6ab47704e37,2024-02-16T13:37:51.433000 -CVE-2024-25415,0,0,669eb2c339e3bc5aae821eb5536f61ec9a8ace328fdd7918c4b65de35957067d,2024-06-07T15:15:49.860000 +CVE-2024-25415,0,1,43d479f30c3959db40e37d85a2a1b1d045a277956526655bc82aa0e8d248892a,2024-08-28T20:35:08.127000 CVE-2024-25417,0,0,cf357097a5dbee01106addf2bdb29bed8730a5f939b7183e3782b75ef2c81884,2024-02-12T21:39:48.423000 CVE-2024-25418,0,0,fbf3230abb474f635289b641f229f06b9a80ca6e048d349c7b63bb08b846e66c,2024-02-12T21:39:57.963000 CVE-2024-25419,0,0,86ab500bc7ab26f561a7c75d9375e21b9bceb9aa3d956bf22a9e15d3fe2a75df,2024-02-12T21:40:04.610000 @@ -246683,7 +246683,7 @@ CVE-2024-2571,0,0,944818011263aece939e20c7251816424f7831487c7b65e2eb2d8bf532c69b CVE-2024-25710,0,0,d1e1c2f14ac0fdaa17f43a1220d128117b47331cb5ccaceca080941af70611b1,2024-03-07T17:15:12.940000 CVE-2024-25711,0,0,c4c08c8cc09954759ac01254a6c034bf78d852c0e2f0fb9c387add767b4de561,2024-02-27T14:20:06.637000 CVE-2024-25712,0,0,cd76bf59fa3b149c026f0736470198c42042811b7fa0e2166e37d9fe09aff8b0,2024-02-29T13:49:29.390000 -CVE-2024-25713,0,0,35921be59b83d8af2e145b580a5667b3fbf17b7b509666f1c0fba54cc2b0bcc8,2024-04-19T23:15:10.380000 +CVE-2024-25713,0,1,3d79b0984c1664e4ac69ee01cb3f8d7ad091cc5b18ae7eaaba60f08548db4afd,2024-08-28T21:35:04.973000 CVE-2024-25714,0,0,70f54472da145604490960ea7894946414b866256679ffb698af736efe283386,2024-08-01T13:47:49.190000 CVE-2024-25715,0,0,c088d4b977142e9dcb9ad21b32e4f9aa61385e1d7ddbd4c017103ce015b7a37f,2024-02-16T21:35:54.270000 CVE-2024-25718,0,0,36013110a47522378a7f909cc9712cbde51ab694884ada3d0c70dc8ae34e1797,2024-08-01T20:35:25.977000 @@ -246708,8 +246708,8 @@ CVE-2024-25741,0,0,fa774b03cf2ebe73114d17fe942f33d91843719d380f7003343f1feba56a5 CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000 CVE-2024-25743,0,0,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000 CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e1f6,2024-02-12T14:20:03.287000 -CVE-2024-25746,0,1,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000 -CVE-2024-25748,0,1,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000 +CVE-2024-25746,0,0,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000 +CVE-2024-25748,0,0,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000 CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000 CVE-2024-25751,0,0,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000 CVE-2024-25753,0,0,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000 @@ -246773,7 +246773,7 @@ CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb35 CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000 CVE-2024-25891,0,0,84cfc5f312c597141ee54b1ce3a081aaaa3c04f515375840db467867fd6cd895,2024-02-22T19:07:27.197000 CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000 -CVE-2024-25893,0,0,6074afa7b83b45196c5c6ba86bd6a55a5db84fa3d221197e7e610730da7175c7,2024-02-22T19:07:27.197000 +CVE-2024-25893,0,1,e6dd333e76ca528d7682aca848e688db2c531a8ac894f28a9101c266e57021da,2024-08-28T21:35:05.727000 CVE-2024-25894,0,0,110687aa8f80df3297624f90f6f33809d75def9197abe56922d406f86b8dd02c,2024-08-01T13:47:55.813000 CVE-2024-25895,0,0,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000 CVE-2024-25896,0,0,08f878ee14441b76754056ef0405ddf3a84202dc82f048a455b46423ba277c2d,2024-02-22T19:07:27.197000 @@ -246877,7 +246877,7 @@ CVE-2024-25989,0,0,14738c46f94e94e6b7897446658f285f8e9a188c6fec45e970fce017c50eb CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48ad8,2024-03-18T19:40:00.173000 CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000 CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000 -CVE-2024-25992,0,1,caaba6874e69765d9fe6451819eb539f4e123768237e917b71bdea3c61f79a30,2024-08-28T19:35:09.697000 +CVE-2024-25992,0,0,caaba6874e69765d9fe6451819eb539f4e123768237e917b71bdea3c61f79a30,2024-08-28T19:35:09.697000 CVE-2024-25993,0,0,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000 CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000 CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000 @@ -247222,11 +247222,11 @@ CVE-2024-2640,0,0,d67ac0f9a6f6b556e0c1b723f2f31c17146e454f4580301ea55d956e5019b2 CVE-2024-2641,0,0,9224bc0a65307cb53933c2d7858f8e3abf23dbc7ae542920adafdc9d5bf4c895,2024-05-17T02:38:22.647000 CVE-2024-2642,0,0,f4d5d0409211a54140db72574a0074f769063560d7df04b7b7402f6cc784e4a4,2024-05-17T02:38:22.743000 CVE-2024-2644,0,0,fab6e7415abdc266e0f9914dee035a72adfdb797420e958820a3298690e993b0,2024-06-05T20:15:12.680000 -CVE-2024-26445,0,0,74115bffcb152deed7c7fab52d82a4ce2ff67f5690ad0b6e7b2b606b95da4bcd,2024-02-22T19:07:27.197000 +CVE-2024-26445,0,1,3ad35fce57999549366fe75957d1ee38511704ca77b59a13d71bd470d9abd074,2024-08-28T21:35:06.473000 CVE-2024-2645,0,0,67f71252e39d0ed76704dae79e75d677c0e90051473290647c0cf447a8a8225f,2024-06-27T20:15:20.417000 CVE-2024-26450,0,0,2146e3629e9f66432c697f6f39985fce2f3781294b94d7100d7ec0e05de5d8ff,2024-03-09T08:15:06.120000 CVE-2024-26454,0,0,81eabbcddc4452199e1fbc82a1f9c649bd6c739560f3b4e9fd2208f082955849,2024-03-15T12:53:06.423000 -CVE-2024-26455,0,0,4a35ecf92a208e49d66ccdff386f1d2053fb9597db1a9f9f2c48be61a141ec4e,2024-02-26T22:10:40.463000 +CVE-2024-26455,0,1,24002b24bc6de1eece0f3fc2139bf437dca858793debcca4d45e15415e2ceb55,2024-08-28T21:35:07.220000 CVE-2024-26458,0,0,a765d34e6f5b725d584f2b00225139e479f8d76beade21f52c1720860105f89b,2024-05-14T15:09:00.470000 CVE-2024-2646,0,0,ee46ce874cc14b8f1b3378e14871fd20ec8fc831984d94fc396d6a2b62dd0259,2024-05-17T02:38:23.033000 CVE-2024-26461,0,0,0b892c8bcbbbf8814ae786a53ca82ff2dc0971c3ced34bcc3c4cddb340bd0150,2024-08-14T16:35:10.207000 @@ -247252,7 +247252,7 @@ CVE-2024-26484,0,0,c8047678f7231824b5c927e31411e2a4e30944b1f11ae642e23849e18530b CVE-2024-26489,0,0,66cfbedf131a53c21ff3313641983aeb0011805244fec1b387ac6a56f1259318,2024-02-22T19:07:27.197000 CVE-2024-2649,0,0,33b94c38d3a45f74f6718ae1eb94103cab8852874cf5ba7ffe3119736f42cfff,2024-05-17T02:38:23.307000 CVE-2024-26490,0,0,aa5c95d9568ffeff67d082f5e625a8d3790e84f13ee3d4cb803a75ca49441fa4,2024-02-22T19:07:27.197000 -CVE-2024-26491,0,0,3d9a25d9d13dab43f4fccb79edc1a9c15bdabd787c28cc0e8ec66c7f9fee32e0,2024-02-22T19:07:27.197000 +CVE-2024-26491,0,1,74f1ba8b39e9410256b69e956a81c1395874aa769444270185f7eb4f2f689d03,2024-08-28T20:35:09.023000 CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000 CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000 CVE-2024-2650,0,0,4b5612c4084720b2f75ed069d914fcdc0a38f0f53c7b3b04b755c2a4e98778bb,2024-04-10T13:23:38.787000 @@ -247263,7 +247263,7 @@ CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000 CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000 CVE-2024-26521,0,0,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000 -CVE-2024-26529,0,1,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000 +CVE-2024-26529,0,0,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000 CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000 CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000 CVE-2024-26540,0,0,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000 @@ -247953,7 +247953,7 @@ CVE-2024-27209,0,0,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f2 CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000 CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000 CVE-2024-27211,0,0,6894b26756f6df7632bdb8a4b3513238346653fd0ee071685f883ad79c0a0f9c,2024-08-05T15:35:12.083000 -CVE-2024-27212,0,1,cd8d0cb9f45aa7ccf7d445110f8f2832810df99d9a78af5cf6414a8df74e5422,2024-08-28T19:35:10.640000 +CVE-2024-27212,0,0,cd8d0cb9f45aa7ccf7d445110f8f2832810df99d9a78af5cf6414a8df74e5422,2024-08-28T19:35:10.640000 CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5cbdf,2024-08-01T13:48:19.280000 CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000 CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000 @@ -247968,7 +247968,7 @@ CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213a CVE-2024-27225,0,0,aa18bff66f03b0f275eac87bd5ea1a86e059d41f5a0861894165d74704434328,2024-03-12T12:40:13.500000 CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000 CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3889,2024-03-15T20:15:09.153000 -CVE-2024-27228,0,1,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000 +CVE-2024-27228,0,0,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000 CVE-2024-27229,0,0,b8b459ee0fc242831e7e68eb1fe9ed70ba0320038a180145828d0bdce79101e7,2024-03-12T12:40:13.500000 CVE-2024-2723,0,0,a5d6e6fcb13799b6bac3165664e5b326db07e4b162d1f25e3d1dd5f10681ec04,2024-03-22T15:34:43.663000 CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f128d,2024-03-12T12:40:13.500000 @@ -248217,7 +248217,7 @@ CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c148 CVE-2024-27564,0,0,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000 CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000 CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000 -CVE-2024-27568,0,1,5ef0355531266755ad4e5c631ffae6be8854ea4f1050fa4f02e42546b592e64c,2024-08-28T19:35:12.240000 +CVE-2024-27568,0,0,5ef0355531266755ad4e5c631ffae6be8854ea4f1050fa4f02e42546b592e64c,2024-08-28T19:35:12.240000 CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000 CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000 CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000 @@ -248249,7 +248249,7 @@ CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c CVE-2024-27629,0,0,ca701c59a502c4787b60da8baa107f0262ef924b3c876e947b7b71c4687e448d,2024-08-01T13:48:34.650000 CVE-2024-2763,0,0,fa0860401e6fc5d5f4cf46ca75d9efd537ac3aaa7b5e2d61b6a29dcaeeced91c,2024-05-17T02:38:28.787000 CVE-2024-27630,0,0,a1ea11c1c8b1f1d78e79a31b066ec8424df55ae64238847d3d73b77f87b170a7,2024-08-16T19:35:06.250000 -CVE-2024-27631,0,1,823cf2520a1b79ed7d411349f6166aa032b72a764cabcf9507963ec85aab2169,2024-08-28T19:35:13.040000 +CVE-2024-27631,0,0,823cf2520a1b79ed7d411349f6166aa032b72a764cabcf9507963ec85aab2169,2024-08-28T19:35:13.040000 CVE-2024-27632,0,0,0bf9f7e4e2b38f2fc36100c20b55c947c0d336f90050dc79733290c2e357ef37,2024-08-16T19:35:06.933000 CVE-2024-2764,0,0,31aa1e4cc55fa8edb093bc5aa135070b01e8111153eb7b17aab12d3117a8f555,2024-05-17T02:38:28.880000 CVE-2024-2765,0,0,fdf9b012a44b1c7f6607dd1b547bd408571aa1e43b10c68fb7aad7dc812bebe9,2024-05-02T18:00:37.360000 @@ -248278,7 +248278,7 @@ CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7 CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000 CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000 CVE-2024-27703,0,0,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000 -CVE-2024-27705,0,1,54a199ba78880b9893651da6ac13e5ae7eff87b01c1a1af6fe633bcde862516c,2024-08-28T19:35:13.840000 +CVE-2024-27705,0,0,54a199ba78880b9893651da6ac13e5ae7eff87b01c1a1af6fe633bcde862516c,2024-08-28T19:35:13.840000 CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000 CVE-2024-27707,0,0,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000 CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000 @@ -248704,7 +248704,7 @@ CVE-2024-28211,0,0,430c54d116686ae784e7eaccdb0936e227c2ec2e15c8ea6c22903f691dfd9 CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000 CVE-2024-28213,0,0,bfeb5a9850403273fba4fe10f3167a73d5223f6f7fda26be2c4ac6dd12d8be00,2024-08-22T20:35:07.957000 CVE-2024-28214,0,0,39bba1286ca0521fe316864fd954bf03f219b032070caf8de48b3a3685bfb8b5,2024-03-07T13:52:27.110000 -CVE-2024-28215,0,0,6b2656e187f54be3b8692756e38dcefabd67fa7060f9733da9dff9ce708bf4af,2024-03-07T13:52:27.110000 +CVE-2024-28215,0,1,a538bdef30dbb031199c7dfaee20eca8adf76f8b58f82232828c1af7095801cd,2024-08-28T21:35:07.973000 CVE-2024-28216,0,0,f89fd6be85ceea4def53181b2265abb3d7c379c6ee2f0473f5a0630c050a6151,2024-08-12T20:35:02.990000 CVE-2024-28219,0,0,565e95e78290480ce059c2c945e1cbfe2222bb0e5f4c019f24f3af4bf523bbf1,2024-08-20T20:35:22.290000 CVE-2024-2822,0,0,5135e9aa23c4836200c76de0e1596e8aa68817f4e4641238aa9f03a498ac5941,2024-08-23T21:35:06.587000 @@ -248775,7 +248775,7 @@ CVE-2024-28327,0,0,7ed9ed9c0231950061a20f16d0b466fa43b5d37d46730fdcd21aca4b586a2 CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000 CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000 CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000 -CVE-2024-28338,0,1,fa368ff4231d46bff92ce959939349d4377377b2a7cc5fa138cc06ab225389c8,2024-08-28T19:35:14.627000 +CVE-2024-28338,0,0,fa368ff4231d46bff92ce959939349d4377377b2a7cc5fa138cc06ab225389c8,2024-08-28T19:35:14.627000 CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000 CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000 CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000 @@ -248799,7 +248799,7 @@ CVE-2024-28392,0,0,06cb10a631fd05972f01d306a65738665b321fedeaef5f914b0141bbfeeda CVE-2024-28393,0,0,98451f8d9822a6b89492c2246ee689f6a0cd0063a443e3e1e266aaee6d314fd8,2024-08-27T20:35:26.183000 CVE-2024-28394,0,0,deda5a51a503650846c49022c68c524e604146c1517d74b07ab34d848f21e6e1,2024-08-05T17:35:09.203000 CVE-2024-28395,0,0,75690be4a0e06f64f466f922ea142c5dcb8737bca683828d65c2ab40844c2948,2024-08-01T13:49:05.027000 -CVE-2024-28396,0,0,e2e5ec394ca570d1a0e7ca873049e09f9ea87c9a858dde784a7ae9cd510f7e8a,2024-03-20T17:18:26.603000 +CVE-2024-28396,0,1,8cb5fabb0fee24ec43485928975014b880ae447df888f2a2c1c1b2d99d360299,2024-08-28T21:35:08.140000 CVE-2024-28397,0,0,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000 CVE-2024-2840,0,0,d22529ec081718c114a32dcf5767c6cdef3a269eb91ab5eeb1189d10f2a33e86,2024-05-02T18:00:37.360000 CVE-2024-28401,0,0,f4b5194cb0dd8b5d39958cccf56c345aac334d6aa2a694b4c9032746830c6bf8,2024-03-17T22:38:29.433000 @@ -248820,7 +248820,7 @@ CVE-2024-2843,0,0,ec6fc6f68f72e3acc7e3cf9a461f6426012340a0a7859f669b2fed1af3faf2 CVE-2024-28430,0,0,1f48afa9bf4d947c1ce61d4a7a4ead3c4544a34c0818c90617ece3e71ea09b44,2024-08-02T19:35:26.997000 CVE-2024-28431,0,0,187dbaabbf0136fed911938811416ce05a422db491326bbc9a1774dcc2dbc8d0,2024-08-06T16:35:09.430000 CVE-2024-28432,0,0,fcdf955800ccb293dde53594dd09dc78313f9ac8f6f86ebf0d39d32c444079dc,2024-08-05T18:35:14.987000 -CVE-2024-28434,0,0,ec4590de9963214229aa112f1c2ad2fa85380f4041b7dae287eb880ebccdce0a,2024-03-25T16:43:06.137000 +CVE-2024-28434,0,1,222cca26fc6bcca325de7c3fc66f0ca84ff351a367d8e3c5edb1f1654c6b9247,2024-08-28T21:35:08.910000 CVE-2024-28435,0,0,56edd25b761c3ffb8a735b3d38a367cd1e0143a3f57c9ae6abc90ef28134618d,2024-08-26T16:35:07.230000 CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000 CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000 @@ -248851,7 +248851,7 @@ CVE-2024-28547,0,0,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd13 CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000 CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000 CVE-2024-28551,0,0,c28fe5afcd679c3aa0a3784905b4c05c433762c4432fa1ed2b44c099adba75a4,2024-08-05T20:35:07.203000 -CVE-2024-28553,0,1,d2d49d3b32b4ad4e5ed1fb793d3a4f18745439a22613343ef69fff92328aa945,2024-08-28T18:35:12.120000 +CVE-2024-28553,0,0,d2d49d3b32b4ad4e5ed1fb793d3a4f18745439a22613343ef69fff92328aa945,2024-08-28T18:35:12.120000 CVE-2024-28556,0,0,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000 CVE-2024-28557,0,0,77a8a38b1b31bd457d2e1155d30ba64028e47880496797c0f23104b8d60d248a,2024-08-21T15:35:04.820000 CVE-2024-28558,0,0,7b30a622f0a0af74fb84bf56f284f0001ad46af28ee0c7db870ba46879fc3d39,2024-08-01T13:49:08.363000 @@ -248913,12 +248913,12 @@ CVE-2024-28672,0,0,538db36b26db573d0bb55cb40ad522fa7947acf5e2956b1e113432093746b CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000 CVE-2024-28675,0,0,80c451d1a35a0ff52d3fba9d95128727c58bec6c40fc50594a98fbdeafd67949,2024-08-06T16:35:10.273000 CVE-2024-28676,0,0,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000 -CVE-2024-28677,0,1,0f69f140894f68c5b932d6edf8946595fb50d2c8b4a12358d0887d19b71fe56c,2024-08-28T19:35:15.447000 +CVE-2024-28677,0,0,0f69f140894f68c5b932d6edf8946595fb50d2c8b4a12358d0887d19b71fe56c,2024-08-28T19:35:15.447000 CVE-2024-28678,0,0,b5c73aa5d385f8f65998ff1de30b4021247079d7e1aba9c219ff89ef49624a6a,2024-08-26T17:35:03.903000 CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000 CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000 CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000 -CVE-2024-28681,0,1,8a70f4514954d5b714df36fb204c3727ca85171b03b512322548d2cf00cd1bfc,2024-08-28T19:35:16.270000 +CVE-2024-28681,0,0,8a70f4514954d5b714df36fb204c3727ca85171b03b512322548d2cf00cd1bfc,2024-08-28T19:35:16.270000 CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000 CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000 CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000 @@ -249417,7 +249417,7 @@ CVE-2024-29387,0,0,a7de4d7b83fd64ee90e8a52b42eaf0b9beccc3b6bea7a05d204d65990fc8f CVE-2024-2939,0,0,2535289099c8d33fbb19094f7fbda628b2a57cb3f5893b4424d20e832d7b98bf,2024-05-17T02:38:38.230000 CVE-2024-29390,0,0,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000 CVE-2024-29392,0,0,5e4ea30f516a843bdc62850b43582fcaf1c5126262e50fed5352ce6a7a6be694,2024-05-22T18:59:20.240000 -CVE-2024-29399,0,1,697a66baad6ee4bae50c3e5a1e61a40d3516a4fa5056cb7fa4cab7012d6514f5,2024-08-28T18:35:13.337000 +CVE-2024-29399,0,0,697a66baad6ee4bae50c3e5a1e61a40d3516a4fa5056cb7fa4cab7012d6514f5,2024-08-28T18:35:13.337000 CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df39a,2024-06-05T20:15:13.267000 CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000 CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000 @@ -249433,7 +249433,7 @@ CVE-2024-2943,0,0,f4b6ad287b4a622c4b41944858fa2f89e0fbf42a503dbbb6e34a72b168b98f CVE-2024-29432,0,0,1f40369b53faae4e5d7b1d21dfb652ce13f2ec8046b060be84a2ef35a51b0061,2024-08-27T16:35:10.203000 CVE-2024-29433,0,0,1d2b8851aa0f5fe2986e1714c213ddc2e530a38e6018ee3fbc359ceb0627168a,2024-04-02T12:50:42.233000 CVE-2024-29434,0,0,2d35bfe8233ada26f52a8aa24ec4bb94ada1e07f5e74fe641dc47a96ca48d619,2024-04-03T12:38:04.840000 -CVE-2024-29435,0,0,875cbdaf24fc385b5e7a9e6b4648f22f1ae4b6f76f07a45f82a4354af5229b55,2024-04-02T12:50:42.233000 +CVE-2024-29435,0,1,20d58edc46c6a6b5293600c5a6b42d712862fc08450fab6e6e1fcd84ee305434,2024-08-28T20:35:10.057000 CVE-2024-29439,0,0,071dc3c8f449deb74ddce6b8d054e2fea88eca6c0700f7f8d6ed7663f767e1ba,2024-05-27T01:15:14.397000 CVE-2024-2944,0,0,d1dd72df0b9b939fa739d98df646f3f94ca4f14d2968c93f0c6764852c0e47b3,2024-05-17T02:38:38.893000 CVE-2024-29440,0,0,5b5e3b17b0e40e37a1bc2598ac1913c0af07a4c46f5b9983183aaa750b04d2f6,2024-05-27T01:15:14.497000 @@ -249454,7 +249454,7 @@ CVE-2024-2946,0,0,220fbf3d281fb179dce3b92b2f13da4971e0ad50361a1c155497aeea2ac2f8 CVE-2024-29460,0,0,f954a0fb0d0ecede72346246898998047378b0ff85ba4078b6d862a1eed2ae65,2024-08-01T13:49:30.940000 CVE-2024-29461,0,0,7435a5125007ae496ee06dfe30d9a23e23411a0a41be62219557118da196f31f,2024-07-11T15:05:34.270000 CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000 -CVE-2024-29469,0,0,2079505dc0da5a3cbf2c6e066fddfdad1eb85fcaa078af0bbb19417ca0e16ca0,2024-03-21T12:58:51.093000 +CVE-2024-29469,0,1,83f06e4c8f7934a02756619832b06a82358511a99079845e0d056ac078f5e062,2024-08-28T21:35:09.653000 CVE-2024-2947,0,0,7fa842f2bc2c8f223df34834539dd7f7d20bc53e8c380819b606cea859d50c0a,2024-06-12T09:15:17.717000 CVE-2024-29470,0,0,56425811d021c212dbd848b24d323bfc83ff20dfcd604f9dd34d98a1dfae7b6e,2024-03-21T12:58:51.093000 CVE-2024-29471,0,0,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000 @@ -249478,7 +249478,7 @@ CVE-2024-2951,0,0,f710e6d4245ad6c04fc32de495a410058cbe73872608e5a79d1a40f0d8a1be CVE-2024-29510,0,0,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf0da,2024-07-08T14:18:07.743000 CVE-2024-29511,0,0,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000 CVE-2024-29513,0,0,8cfcc3ee68a773ba517d1f3723d5fc41ae5eef49bbfc2250bce477983b34e599,2024-08-01T13:49:32.137000 -CVE-2024-29514,0,1,7caae15adf93c68426a0607e9f9430b69dadcf282c5b338343171d0469306829,2024-08-28T19:35:17.070000 +CVE-2024-29514,0,0,7caae15adf93c68426a0607e9f9430b69dadcf282c5b338343171d0469306829,2024-08-28T19:35:17.070000 CVE-2024-29515,0,0,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535a56,2024-08-19T20:35:11.413000 CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000 CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000 @@ -249540,7 +249540,7 @@ CVE-2024-29753,0,0,2fe72d442a3bd6e3a448018f4b0c5fd08bbb9368714b97406c81c1f0d2544 CVE-2024-29754,0,0,b25a573175d6d8364c520f2c021a5fa5bc0a8d78f24f393d4d4bf2a3811b35a3,2024-04-08T18:49:25.863000 CVE-2024-29755,0,0,461a086b173843c1ce38032ceaf4026cd899fd13096838c66c3bf8c91a37dca7,2024-04-08T18:49:25.863000 CVE-2024-29756,0,0,a317fd9c651464f79ee6fff622436852efb1b09b79adc8a90233c2482f2cabef,2024-08-13T20:35:08.120000 -CVE-2024-29757,0,1,1258c85600b0e0b6c3574edf77ce10dfb1958d15da1a6a11aec242b319b28be3,2024-08-28T19:35:17.877000 +CVE-2024-29757,0,0,1258c85600b0e0b6c3574edf77ce10dfb1958d15da1a6a11aec242b319b28be3,2024-08-28T19:35:17.877000 CVE-2024-29758,0,0,e99e03c9577f34d61d791ec358a8107af85a294778a310a65b4722e9f6af13d4,2024-03-27T15:49:41.437000 CVE-2024-29759,0,0,f4cc1ab31785f6c5323fd4d9a7da94ce475eca6cb36b30795902b25143b7dbeb,2024-03-27T15:49:41.437000 CVE-2024-2976,0,0,31ce9b59b83e33d10ee556791a66c7b468926a678a71bf4f87b9bde3e94a00ea,2024-05-17T02:38:39.800000 @@ -250321,7 +250321,7 @@ CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728 CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000 CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000 CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000 -CVE-2024-30565,0,1,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d216,2024-08-28T19:35:18.093000 +CVE-2024-30565,0,0,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d216,2024-08-28T19:35:18.093000 CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000 CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000 CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000 @@ -250338,14 +250338,14 @@ CVE-2024-30588,0,0,08e16a935f9fee8841f929d18032525bac7add60ccde5932cbd5663b4480d CVE-2024-30589,0,0,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000 CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000 CVE-2024-30590,0,0,74e13fafb4ea3fa2c3367d4c745d913b8700a9f648c307a3b7eeb10d783ad4d0,2024-08-01T13:50:13.810000 -CVE-2024-30591,0,1,e902c9af734db5833927060c0bddd3a7ba217bf46fdf47a12b5c187281d25d93,2024-08-28T18:35:14.280000 +CVE-2024-30591,0,0,e902c9af734db5833927060c0bddd3a7ba217bf46fdf47a12b5c187281d25d93,2024-08-28T18:35:14.280000 CVE-2024-30592,0,0,507c49506de5111d6c96010bf6286cc127ab92c8bc8bbb896558bfe34d4346f9,2024-08-01T13:50:14.590000 CVE-2024-30593,0,0,408d3bb4f55aa72702260e4a6dec5da795a667370808b6fd57e94ac266b7ab6e,2024-08-01T13:50:15.377000 CVE-2024-30594,0,0,031ab14998cc22e319a2672b5d267e5c02bd96f6f8b3034c7bd0cc097da3d0fc,2024-08-16T19:35:08.517000 CVE-2024-30595,0,0,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000 CVE-2024-30596,0,0,3e2307388e29cecf1eee26f29964858677d06f5c8613113eca2047417d85c54f,2024-08-27T21:35:21.827000 CVE-2024-30597,0,0,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2f1a,2024-08-01T13:50:16.157000 -CVE-2024-30598,0,1,6ed6779adc284652fa82476796af034f1e40ee104aa46937c35f6a5778b7c19a,2024-08-28T18:35:15.197000 +CVE-2024-30598,0,0,6ed6779adc284652fa82476796af034f1e40ee104aa46937c35f6a5778b7c19a,2024-08-28T18:35:15.197000 CVE-2024-30599,0,0,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000 CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000 CVE-2024-30600,0,0,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000 @@ -250363,7 +250363,7 @@ CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69a CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000 CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000 CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000 -CVE-2024-30624,0,1,ff6bf3285a4a0405e10b51a01d4154fed0ab5f5e8637b8cc2e4a3a03c98f121e,2024-08-28T18:35:15.953000 +CVE-2024-30624,0,0,ff6bf3285a4a0405e10b51a01d4154fed0ab5f5e8637b8cc2e4a3a03c98f121e,2024-08-28T18:35:15.953000 CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000 CVE-2024-30626,0,0,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000 CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000 @@ -251081,7 +251081,7 @@ CVE-2024-31815,0,0,3a4fb879bd99cdccbff5aa7dddf7124d852246045820d3d5445bebcfb10f3 CVE-2024-31816,0,0,b044f3a9b0aa1619e0c2fca0cc8f8b5745d80dbd48fcbf7e00f1caed5cc7299b,2024-08-14T14:35:18.370000 CVE-2024-31817,0,0,24b4e557f7af935e7754f7b85cb41f724f58a7b4e914343cc50d4eac0b54d001,2024-08-01T13:51:12.960000 CVE-2024-31818,0,0,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000 -CVE-2024-31819,0,1,bfd6addbaf0640b479e38e78486acd7f48f4365622b9d1c32199ef52964cc949,2024-08-28T19:35:18.897000 +CVE-2024-31819,0,0,bfd6addbaf0640b479e38e78486acd7f48f4365622b9d1c32199ef52964cc949,2024-08-28T19:35:18.897000 CVE-2024-3182,0,0,5b91472f2c23656576ba0485d37ef11d644641d0d37c54a71b00010283df192c,2024-08-01T16:35:10.453000 CVE-2024-31820,0,0,c45ae4d9cf96e998a8e3836a25349d6dbd49df94bb64d18020aab9488babbb10,2024-08-01T13:51:13.733000 CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000 @@ -252745,6 +252745,7 @@ CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a919 CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000 CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000 CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000 +CVE-2024-34195,1,1,85b392229a6201caf031923e85b74fa52c56af0784be74d04a74145fdcf21d9f,2024-08-28T20:35:10.893000 CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000 CVE-2024-34198,0,0,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000 CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 @@ -253229,7 +253230,7 @@ CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c982681 CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000 CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000 CVE-2024-34905,0,0,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000 -CVE-2024-34906,0,0,2d514f74a75383567e242812745d1978f5a5608d1bafa528fe1c42a0f093f8ed,2024-05-23T20:42:22.080000 +CVE-2024-34906,0,1,f750c2112b1b61a4b0d4bb941243c567b56a2b55a50a8501386482dd06b49ac1,2024-08-28T21:35:11 CVE-2024-34909,0,0,75ef6b64b1e62b9391afd10085bc7fe5995801e2be117fc0dc8d712e21d5d32b,2024-07-03T02:00:52.603000 CVE-2024-3491,0,0,3f53627a80e697de4556db2343c1e928afb824dee19f0a6a29ac6e39296f869d,2024-04-23T12:52:09.397000 CVE-2024-34913,0,0,4ee00b2163d3042020be6fa672a11467385e4c8bf271adab1a0d83cdeeaf8210,2024-05-23T20:59:34.540000 @@ -253474,7 +253475,7 @@ CVE-2024-35340,0,0,1292363a48b3318ab4eea61a21d1774d64143b2f1ea71749d49412fca7f08 CVE-2024-35341,0,0,2394ba36fcc9e849f9840edb2ba384b36eee4d7eebd73846ccbdccf118ee1563,2024-08-01T13:52:36.597000 CVE-2024-35342,0,0,a4f7369f8f0a6de9d16902cacb7a44f46ba0a7d7f218612f1259029d70c7f06e,2024-05-29T13:02:09.280000 CVE-2024-35343,0,0,afbb68674236a89009facceb114c5d242ad657f17e86d5d8fbbfd0cec8107edb,2024-08-01T13:52:37.563000 -CVE-2024-35344,0,0,bc74dd675a5dce7f00a3f726cd43afdec09d5a821ebe8ae8c283145b225cfc80,2024-05-29T13:02:09.280000 +CVE-2024-35344,0,1,347a536906c9cd275b6604bba463b1e6f3bbbbe6dff687daf180f85bf210928a,2024-08-28T20:35:11.640000 CVE-2024-35345,0,0,94f6cac212d9f349d4de9b7da46a3407365d342f37822b3360eee738ef0a1e40,2024-08-19T17:35:17.703000 CVE-2024-35349,0,0,11658c700be6076291828420e77d9bdb67d68c65b2a15cfc033913a7e5b5639c,2024-08-01T13:52:38.343000 CVE-2024-3535,0,0,73d791a5850d78576003eae31f8a489c9a6c4b90f35033ec73a578c9367a898c,2024-05-17T02:39:59.803000 @@ -254892,7 +254893,7 @@ CVE-2024-37321,0,0,e43d264e800a81e0d6029e42f0d44c2c5a3a79449b2b0be508db95416510e CVE-2024-37322,0,0,d2c3e4ead54adc24099fd08e32c15f700d67b352b7a8bd2d3b4bfc1ce21a81e9,2024-08-20T15:47:23.830000 CVE-2024-37323,0,0,4d91cfc2869ee17646bfec1969f43f1ccc3bb5b998368edbb19a54f7b2235add,2024-08-20T15:47:26.383000 CVE-2024-37324,0,0,abc8ac852770b9e6c0196ac0f888a778413aab684c72411dcdd7abfdca6af10e,2024-08-20T15:47:29.147000 -CVE-2024-37325,0,0,1d87585535a572046f3269d4a6e53e39d113df4fc37e43ad494b3059408daa64,2024-06-13T18:36:09.013000 +CVE-2024-37325,0,1,6294d12bef740deef9232a4260a6662461a231eb0cf805c573aaa423ed122236,2024-08-28T21:29:34.533000 CVE-2024-37326,0,0,ac7472d1fb1d18503007a35e6fe41ee1151b7dc6ef627e10a11e757c5664ebf5,2024-08-20T15:47:31.987000 CVE-2024-37327,0,0,6d3d3ead5193ba04066eb6050d2d8a7e0a77d229a7111950b5a3609d911907f0,2024-08-20T15:47:34.730000 CVE-2024-37328,0,0,76f8e407d4325cd98c4d4d2117be19b060f62c1c032de62e6462543f2d8b8dac,2024-08-20T15:47:37.937000 @@ -256231,14 +256232,14 @@ CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9 CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000 CVE-2024-39502,0,0,99b689f6371529c59a665d9c426727398f43183fffa63b58cc95bb184d69fa0a,2024-07-12T16:34:58.687000 CVE-2024-39503,0,0,5e4d34ef2c4459378b0d2181b74587a03eb064853eaebcf5be4aab1548d06b82,2024-07-12T16:34:58.687000 -CVE-2024-39504,0,1,bdccaf811e8fa1282cf93f14389fa178db83a9dd861ab1a8383eecda34377824,2024-08-28T19:58:45.653000 +CVE-2024-39504,0,0,bdccaf811e8fa1282cf93f14389fa178db83a9dd861ab1a8383eecda34377824,2024-08-28T19:58:45.653000 CVE-2024-39505,0,0,33dc1a3989cb5c060d5c4f30fa91554943c85a657f65588f826529ceef0f94a9,2024-07-12T16:34:58.687000 -CVE-2024-39506,0,1,8c462840acc6bb08d9230b602444b2f73c8c80f6b650776b8310449d2261b908,2024-08-28T19:58:56.013000 +CVE-2024-39506,0,0,8c462840acc6bb08d9230b602444b2f73c8c80f6b650776b8310449d2261b908,2024-08-28T19:58:56.013000 CVE-2024-39507,0,0,1f47c187fd37c3a4a4dbd94d24344ef551d55fa35ab3ff979c4b1cc67002f4d5,2024-07-12T16:34:58.687000 CVE-2024-39508,0,0,26013578589e34725fa81a94c339e09cc309ea5ca5a92a64ba271fcd81f91dee,2024-07-12T16:34:58.687000 CVE-2024-39509,0,0,6f4a3358b91af56191a71e0d0b835dd811a8ac97ff57de735049825822c090da,2024-07-12T16:34:58.687000 CVE-2024-3951,0,0,5ca8c536acbbd299aeb225ced02a6adee99ff33cec2e6b61bb0e0674eb9863cc,2024-05-08T17:05:24.083000 -CVE-2024-39510,0,1,219c25ef60503ac3e7f220cf8600d0b269f5ff3251fb7cce8e3ea23df3d2c0a2,2024-08-28T19:59:12.947000 +CVE-2024-39510,0,0,219c25ef60503ac3e7f220cf8600d0b269f5ff3251fb7cce8e3ea23df3d2c0a2,2024-08-28T19:59:12.947000 CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000 CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000 CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000 @@ -256396,7 +256397,7 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67 CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000 -CVE-2024-39717,0,1,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000 +CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 @@ -256666,8 +256667,8 @@ CVE-2024-40520,0,0,a2ac37b5fe4993386ad0c401ff27a90a4ee5d292a95a31b8ec4196b4a0643 CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000 CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000 CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000 -CVE-2024-40530,0,1,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000 -CVE-2024-40531,0,1,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000 +CVE-2024-40530,0,0,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000 +CVE-2024-40531,0,0,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000 CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000 CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000 CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000 @@ -256853,7 +256854,7 @@ CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650 CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000 CVE-2024-40897,0,0,7f0ff77f7480d176e5ca1f86675f7cea8983627e8b9afaea0e9328e4e4b96a32,2024-08-27T13:52:53.790000 CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000 -CVE-2024-40899,0,1,e780b074d783a002df6b4261424c6db082994ffa39e09f112feba6d38138eca6,2024-08-28T19:59:22.927000 +CVE-2024-40899,0,0,e780b074d783a002df6b4261424c6db082994ffa39e09f112feba6d38138eca6,2024-08-28T19:59:22.927000 CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000 CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000 CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000 @@ -256889,9 +256890,9 @@ CVE-2024-40929,0,0,922566e6896182fcd86bab51cbd2b2f5e83578ebe1d9528e2a3d395a2a144 CVE-2024-4093,0,0,4094c134af1a117994cc6fa0b479bc18db1d53d46b6fa3e1bad5f760245c30a1,2024-05-17T02:40:15.433000 CVE-2024-40930,0,0,b4f4f0f521513c469fe141e4f04568fa708146afbf26b9e43ef67c49fbb97034,2024-07-12T16:34:58.687000 CVE-2024-40931,0,0,1ce51d0c1cf3e56971909d12fef17b7b190325030f87851f102025b07310a339,2024-07-12T16:34:58.687000 -CVE-2024-40932,0,1,a9cf96830b006378bce6c68ed0757ef896fae1b35ee3940d03a768e94ae65c5a,2024-08-28T19:48:53.420000 +CVE-2024-40932,0,0,a9cf96830b006378bce6c68ed0757ef896fae1b35ee3940d03a768e94ae65c5a,2024-08-28T19:48:53.420000 CVE-2024-40933,0,0,96771d62b803cb6fb8413f216e98fe7325b9f160d5178302017c1ebbfdf41ad1,2024-07-12T16:34:58.687000 -CVE-2024-40934,0,1,0f4fa006864a9d48c0a4ffb7ec8d6898f10d1c1eb85215eb8c4ca2a5d7b3ba19,2024-08-28T19:49:04.307000 +CVE-2024-40934,0,0,0f4fa006864a9d48c0a4ffb7ec8d6898f10d1c1eb85215eb8c4ca2a5d7b3ba19,2024-08-28T19:49:04.307000 CVE-2024-40935,0,0,a229105c5d2bb66ee17d53a34892f169d9c296108d2f7d99e57d4944bc30c1f0,2024-07-12T16:34:58.687000 CVE-2024-40936,0,0,34f66f9dfd47f0ce49d1c77b26ffc55123e4f460cffd6c4a4b7f8e6444317e13,2024-07-12T16:34:58.687000 CVE-2024-40937,0,0,18b0b0dc1e836fe3ae2e170c8982a2b4836f0393f58deb5f92b95d810e69aed1,2024-07-12T16:34:58.687000 @@ -256913,12 +256914,12 @@ CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000 CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000 CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000 -CVE-2024-40954,0,1,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000 -CVE-2024-40955,0,1,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000 -CVE-2024-40956,0,1,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000 -CVE-2024-40957,0,1,4169395d36d8df754af0ff2f0952d94b9d03cad9228a2cd953255dac27d54c21,2024-08-28T18:58:59.793000 -CVE-2024-40958,0,1,4055162d5de8cf1b7ae3f4360cf522ef9d8bb94c58b99c5968e7d3b887a367e8,2024-08-28T18:46:29.543000 -CVE-2024-40959,0,1,3efe7268d6bd3d9c0e7792eede131c4531003b8b0a406d93c2abed58e13790c2,2024-08-28T18:46:52.453000 +CVE-2024-40954,0,0,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000 +CVE-2024-40955,0,0,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000 +CVE-2024-40956,0,0,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000 +CVE-2024-40957,0,0,4169395d36d8df754af0ff2f0952d94b9d03cad9228a2cd953255dac27d54c21,2024-08-28T18:58:59.793000 +CVE-2024-40958,0,0,4055162d5de8cf1b7ae3f4360cf522ef9d8bb94c58b99c5968e7d3b887a367e8,2024-08-28T18:46:29.543000 +CVE-2024-40959,0,0,3efe7268d6bd3d9c0e7792eede131c4531003b8b0a406d93c2abed58e13790c2,2024-08-28T18:46:52.453000 CVE-2024-4096,0,0,50bdcb96d8146d46d54f79639093726453baeacacf83f329111a9e971fb9861d,2024-08-01T13:59:25.313000 CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb3e1,2024-08-21T16:53:01.407000 CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000 @@ -257125,7 +257126,7 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9 CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000 CVE-2024-41226,0,0,0f1b0fab09deb513b318e5339bb250b54a4148cca3ff553dad16500490764bac,2024-08-12T16:01:32.383000 CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000 -CVE-2024-41236,1,1,c4e6a64b54b2e943aa2644b716126f214c4e5e917f99a2fe950f6695e8ec8574,2024-08-28T18:35:16.790000 +CVE-2024-41236,0,0,c4e6a64b54b2e943aa2644b716126f214c4e5e917f99a2fe950f6695e8ec8574,2024-08-28T18:35:16.790000 CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000 CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000 CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000 @@ -257819,11 +257820,11 @@ CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000 CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000 CVE-2024-42461,0,0,bba68fac1714eca06b2f70a5c715b9fe71087992bafdb6d29066928e025c5f76,2024-08-16T16:51:40.270000 -CVE-2024-42462,0,0,b19edc28fc2a0bfff5cef08f2bf42ed64517efd4df4ba40c3d5c0700285641c9,2024-08-19T13:00:23.117000 -CVE-2024-42463,0,0,81d9a620e868a0ee28f0a813c40c25ffd53a77197edb11311bdbccacef4f97a2,2024-08-19T13:00:23.117000 -CVE-2024-42464,0,0,d02c3f121530d2f61ac64a8500ff797e919368a6bce85f1a457f8ab7d180089e,2024-08-19T13:00:23.117000 -CVE-2024-42465,0,0,370301b2cfcf79d37c820942768e011b48c883a5ad5f34c844a8b31f6c852503,2024-08-19T13:00:23.117000 -CVE-2024-42466,0,0,b7b0b6e42cec15c89fd794bcf02c2ed85362d59270ae7e0a3cc806f9fa81dfcd,2024-08-19T13:00:23.117000 +CVE-2024-42462,0,1,8ae903dc9e00dcb9d20585b4534acebe4eef4829225fa8001c74505d7d4227e8,2024-08-28T20:46:39.227000 +CVE-2024-42463,0,1,1887d4b9dbb205a7918713aab61d422ae1234ef53aa6637fd3664544692f6740,2024-08-28T20:38:25.227000 +CVE-2024-42464,0,1,c028981b0f05209b8f9398c3d10076a5d141612668af4661ca8e9b565e3a5a68,2024-08-28T20:35:52.940000 +CVE-2024-42465,0,1,cc1706811a59c806dba0a5fe5e46aaf63eb46135d4336575a42fc94641a6632d,2024-08-28T20:32:31.737000 +CVE-2024-42466,0,1,b147a6143c0f1b29bc81d9c541a33cc57bd399450bc78084e7c0d7553a8f8a24,2024-08-28T20:48:14.917000 CVE-2024-42467,0,0,e23e0abc0a807db2a53f3a498d6ca2ef36fe18197da36ac218027e00b6ca7984,2024-08-12T13:41:36.517000 CVE-2024-42468,0,0,20ab5d9f17a6b01a0da06bad1509e9a4dc8119cebd6158ac0abf8cefec4df7e5,2024-08-12T13:41:36.517000 CVE-2024-42469,0,0,30cb7e23c62f8ac5ce9bc45ebb27cbde0a399d6ba51c92609f7c3b2c2f4965cc,2024-08-12T13:41:36.517000 @@ -258012,6 +258013,7 @@ CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f0 CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000 CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000 CVE-2024-42792,0,0,4eaaa19a355275b40166aa1a2acd468fef8bb5420612bb7385f6e2e1abaacd08,2024-08-26T19:10:09.607000 +CVE-2024-42793,1,1,2fd1699f07cb06cbca846a8c551b761a2dfd05d711fbd58716ff3794ae7bdac7,2024-08-28T20:35:12.570000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000 @@ -258024,7 +258026,7 @@ CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9e CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000 CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000 CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000 -CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28 +CVE-2024-42851,0,1,00274099170db6704046005a45a40a4a9a23778f1139c6df90d1c8a79410eb5f,2024-08-28T20:15:07.787000 CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9775,2024-08-23T19:35:15.240000 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 @@ -258032,10 +258034,10 @@ CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bf CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 CVE-2024-42900,0,0,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000 -CVE-2024-42905,1,1,63b2e3708e6370f68c8f0eab942c4bf94d6d07b2bc063f6d5b24c75cc4e46eeb,2024-08-28T19:35:20.503000 +CVE-2024-42905,0,0,63b2e3708e6370f68c8f0eab942c4bf94d6d07b2bc063f6d5b24c75cc4e46eeb,2024-08-28T19:35:20.503000 CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000 CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000 -CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000 +CVE-2024-42913,0,1,4ee002af12bf9d3762c244fec3fad984905617a81f77c95a7eb3d308c6c9d288,2024-08-28T20:15:07.880000 CVE-2024-42914,0,0,3f5ac8ab7960d4d4afba31e3c38cdf6845691feab9592a20b6c730d697770531,2024-08-26T17:35:10.510000 CVE-2024-42915,0,0,f864c31afbca80b902e69688b4024ae2389f775878951406a546e92d288d6fa4,2024-08-23T18:35:05.490000 CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4e17,2024-08-27T14:47:12.097000 @@ -258333,7 +258335,7 @@ CVE-2024-43444,0,0,fbee9de686ac80a9fde5553d13b4aef0864614401bc5081d1c7ab76503d44 CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000 CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000 CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000 -CVE-2024-43472,0,1,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000 +CVE-2024-43472,0,0,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000 CVE-2024-43477,0,0,7032b6e49493834ede52e5f56f0a124d3ffe61f7e9da696a9c0c79526fdcc194,2024-08-23T16:18:28.547000 CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 @@ -258379,6 +258381,7 @@ CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8 CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59df9c,2024-08-23T18:46:31.730000 CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000 CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000 +CVE-2024-43805,1,1,b99c33cd6517c00926284743df2ece4d29840e6987c1cb900e897f113c9998cd,2024-08-28T20:15:07.963000 CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000 CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000 CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000 @@ -258593,7 +258596,8 @@ CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 -CVE-2024-44761,1,1,361838cb7a1b116b9f497344dd8aff3b164952f24f968d85f6ede5ec3de92766,2024-08-28T19:15:08.933000 +CVE-2024-44760,1,1,9cf81a9e0ab04798a87becebbd5fde247ae48b2da57114bbb10303113ed6f0ac,2024-08-28T21:35:14.657000 +CVE-2024-44761,0,1,7d80c180501c990311d966122b1346cb700cb148eb429229d3870413a61d343c,2024-08-28T20:35:14.040000 CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000 CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000 CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000 @@ -258614,9 +258618,9 @@ CVE-2024-4488,0,0,1067ee59b8b50187d3b6e6dcedd09634fc158d8d3cf8abb63a1cced20ae50a CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000 CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000 CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000 -CVE-2024-44913,1,1,3d0a718f021ba05c36d3cde74252c706d497214671f8cff4d115bea728d16df4,2024-08-28T19:35:21.377000 -CVE-2024-44914,1,1,f9f8ba7025d22966f03b97ab83fc8a2749a603d218d7389ac39cfd20db2d5481,2024-08-28T19:35:22.160000 -CVE-2024-44915,1,1,9030bbe2236b67114df101ba08f9c9855f4e55916353587c850f6e3720a8d862,2024-08-28T19:35:22.957000 +CVE-2024-44913,0,0,3d0a718f021ba05c36d3cde74252c706d497214671f8cff4d115bea728d16df4,2024-08-28T19:35:21.377000 +CVE-2024-44914,0,0,f9f8ba7025d22966f03b97ab83fc8a2749a603d218d7389ac39cfd20db2d5481,2024-08-28T19:35:22.160000 +CVE-2024-44915,0,0,9030bbe2236b67114df101ba08f9c9855f4e55916353587c850f6e3720a8d862,2024-08-28T19:35:22.957000 CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000 CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000 CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000 @@ -258646,8 +258650,15 @@ CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000 CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 +CVE-2024-45043,1,1,64e1d74029a8220ee97cc913320ac0ff74a6720da3a17522c390ec0155ccaf98,2024-08-28T20:15:08.347000 +CVE-2024-45046,1,1,8cdac0b20865765113a8b4b0b2d2ef87a79d79d8e2fc42a7271e4d63391523e6,2024-08-28T21:15:06.603000 +CVE-2024-45048,1,1,f69fdb24175b6f7ace06b9eb02d37b28bd8091a69e42131265e80e387c282be3,2024-08-28T21:15:06.817000 CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000 CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000 +CVE-2024-45054,1,1,a13624c329f0bdd0fd7658e8735d8dc858ccaeb0147d1b3630226002f3177470,2024-08-28T20:15:08.547000 +CVE-2024-45057,1,1,dae225468c5e970563487e367d430f56eab47b0de224e37bbd34b62154462c20,2024-08-28T21:15:07.027000 +CVE-2024-45058,1,1,1d7b030bfdf11ee9e7b86fb4c1f5d13d8fdd33b4e5da1c1474457fed7bc73e59,2024-08-28T21:15:07.283000 +CVE-2024-45059,1,1,1b1554031fc92d503bcd73c79a9939703fac7a68247e1643f55a22d235390e8e,2024-08-28T21:15:07.473000 CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000 @@ -258672,9 +258683,9 @@ CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9 CVE-2024-45189,0,0,a1a91d374d9461d5778df63a2cf5d241a6c11d01b78d41c23bf70fd5616239fd,2024-08-26T12:47:20.187000 CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000 CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943350,2024-08-26T12:47:20.187000 -CVE-2024-45191,0,1,24320cb2d6c99102884a32a46b7a31b3437a78a394995949745365d8548a79f9,2024-08-28T19:15:09.110000 -CVE-2024-45192,0,1,4666f187009b1a4ab720c7a921aa9d4f66b4b44b91cc16546d5c51cd8fcccab7,2024-08-28T19:15:09.210000 -CVE-2024-45193,0,1,450979f4ae6c2f3dd1e7534dcc90d4edb6b061770952d9d6772a5ec5592929a7,2024-08-28T19:15:09.297000 +CVE-2024-45191,0,0,24320cb2d6c99102884a32a46b7a31b3437a78a394995949745365d8548a79f9,2024-08-28T19:15:09.110000 +CVE-2024-45192,0,0,4666f187009b1a4ab720c7a921aa9d4f66b4b44b91cc16546d5c51cd8fcccab7,2024-08-28T19:15:09.210000 +CVE-2024-45193,0,0,450979f4ae6c2f3dd1e7534dcc90d4edb6b061770952d9d6772a5ec5592929a7,2024-08-28T19:15:09.297000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 @@ -260246,7 +260257,7 @@ CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69 CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000 CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000 CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000 -CVE-2024-6361,0,1,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000 +CVE-2024-6361,0,0,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000 CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000 CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000 CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000 @@ -260700,7 +260711,7 @@ CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830ad CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000 CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000 CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000 -CVE-2024-7061,0,1,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000 +CVE-2024-7061,0,0,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000 CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000 CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000 CVE-2024-7064,0,0,5f6dedf11b173ba1a8a6a366c520a45122cad062892b1564ebd329daa4d14d92,2024-08-15T13:01:10.150000 @@ -261053,8 +261064,8 @@ CVE-2024-7569,0,0,07c556a0d4f236c73af8fac785c7f2963a3da01e4fc90b977a8fbdbb989590 CVE-2024-7570,0,0,5fffab459f0b197c9cc8f01b0f615f787054152c65ebadc4d4a680afc4fd51fa,2024-08-14T02:07:05.410000 CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000 -CVE-2024-7578,0,1,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000 -CVE-2024-7579,0,1,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000 +CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000 +CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000 CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000 CVE-2024-7581,0,0,f07aa40688c73c9e33d119ea47382f8f327c1f1763032f4818fad72345e632d2,2024-08-07T19:59:00.853000 CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000 @@ -261206,12 +261217,12 @@ CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b025 CVE-2024-7848,0,0,0ee368073eef37c35843cc78ada12ebce75ec11f5e51f0fe556018a4bb2deefe,2024-08-22T12:48:02.790000 CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000 CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000 -CVE-2024-7851,0,0,a3f499a96b03d0001447f268138d29dda5356c0889ebe13c4e09da447417c59f,2024-08-19T13:00:23.117000 -CVE-2024-7852,0,0,d81b5371e4f0add1d395c3b1194a942c6ec099c1cdc2d46560d4b57bf5d930b7,2024-08-19T13:00:23.117000 -CVE-2024-7853,0,0,602b79ace26812f03f94bfc9d8a0781cb4744715aed03debdd7aa8ad39738b45,2024-08-19T13:00:23.117000 +CVE-2024-7851,0,1,a6804e632dae2a5227b1aeec5affef71a5e6512f1f3daab8681dcd169bd0ed5e,2024-08-28T21:10:07.750000 +CVE-2024-7852,0,1,90686965379176e60723e17deb3351871fe4c0caf2dc6a3e7de2597d0bb591c0,2024-08-28T21:07:30.690000 +CVE-2024-7853,0,1,14a48e1ad8f1b546c0c87aa2d80a70dd8973b153912e39385d618671fd730a73,2024-08-28T21:03:35.003000 CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3a0,2024-08-21T12:30:33.697000 CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000 -CVE-2024-7867,0,0,82b57dfccdd939abae2ae322a7ca7d62e21983bdf28e6531a7b846c252314b6b,2024-08-19T13:00:23.117000 +CVE-2024-7867,0,1,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000 CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000 CVE-2024-7885,0,0,53926a53ab4f71fc31c04b79b6d61e8c39bb180f373c05a721578db45aa87a6a,2024-08-23T17:05:24.343000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000