Auto-Update: 2024-10-22T18:00:41.619481+00:00

This commit is contained in:
cad-safe-bot 2024-10-22 18:03:42 +00:00
parent cbbccc4822
commit 047cf7199e
91 changed files with 3592 additions and 490 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-5919",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-05-30T14:55:08.397",
"lastModified": "2018-10-30T16:27:53.280",
"lastModified": "2024-10-22T17:11:30.463",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -61,6 +61,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE08247-BC07-4968-BFE0-491D761BD438"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E768D8A2-18A9-4CA7-96E2-FF3393A380A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE65908-798A-4872-BD17-F42CA1C33898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BBFF0E62-6B39-4562-A261-1C3E3A587977"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0BEFC8EC-9C9C-49D9-93DE-D5D091709E32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD31DFD-F92C-4535-88AE-41E3AA402FD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB6FA42-3CAF-4EAD-8A00-6CC1C41B91F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD7AAB17-29B5-4423-ACCB-6C8A06B0F641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7068B8FB-5689-4A9D-ABFC-D7BE19A0BEFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8396101C-CC57-4692-A505-47F30F12647C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:*:*:*:*:*:*:*:*",
@ -106,56 +156,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.4:rc_1:*:*:*:*:*:*",
"matchCriteriaId": "CB6535F9-8DB6-475A-AE93-65BDD9E3E9A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FED9C4-46FA-4EA2-B7D3-2F28620AD8A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "701BED72-481E-45AE-A949-BF6C71C932AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5C376E8F-783E-47E8-B078-251297C02964"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA1821C-4DE1-4DBA-B557-8BF863EB2AFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "14C3C311-C719-43EE-A1D6-C4B7A7D96156"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7824CF78-D5F7-4FC0-98FD-D639CAA2A7BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1448D780-F020-40C9-B3EC-D3DC909CC056"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C646DF6D-8EA3-4560-B220-F5A72EA37C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16296DF4-8A23-4459-B98C-4A500573812B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "18A20846-B612-4839-B693-6E8E7F632415"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-10242",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-04-04T15:29:00.377",
"lastModified": "2019-05-06T17:00:24.877",
"lastModified": "2024-10-22T17:11:30.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "05DD0327-9366-44E6-A979-A62A8BD5CCDB"
"criteria": "cpe:2.3:a:oisf:suricata:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E70E3C16-A589-4B73-8B36-F3924DDF5F31"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-10244",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-04-04T16:29:00.273",
"lastModified": "2019-04-07T01:24:48.190",
"lastModified": "2024-10-22T17:11:30.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "05DD0327-9366-44E6-A979-A62A8BD5CCDB"
"criteria": "cpe:2.3:a:oisf:suricata:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E70E3C16-A589-4B73-8B36-F3924DDF5F31"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-18625",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-06T21:15:11.427",
"lastModified": "2023-02-01T19:24:01.150",
"lastModified": "2024-10-22T17:11:30.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -86,8 +86,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:5.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "E53901EA-04BF-41AB-BE28-841F040F2C2A"
"criteria": "cpe:2.3:a:oisf:suricata:5.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "43F8D25A-DA90-4CD5-BC77-E0B151372D3F"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-18792",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-06T18:15:23.183",
"lastModified": "2021-07-21T11:39:23.747",
"lastModified": "2024-10-22T17:11:30.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,15 +85,15 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.5",
"versionEndExcluding": "4.1.6",
"matchCriteriaId": "E9F969C0-A5A7-47C5-ACF1-6A01D9CE0CE4"
"matchCriteriaId": "FE67AEB2-4237-48F9-97F5-D80071AD27F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:suricata-ids:suricata:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E393ADB-16B5-4ED1-AB51-7D853FA8FD57"
"criteria": "cpe:2.3:a:oisf:suricata:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91532ED8-EDCD-4220-9E0F-552B3D3C8AB4"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2022-23861",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T16:15:04.897",
"lastModified": "2024-10-22T16:15:04.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/mbadanoiu/CVE-2022-23861",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://ysoft.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2022-23862",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T16:15:05.443",
"lastModified": "2024-10-22T16:15:05.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the \"NT Authority\\System\" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/mbadanoiu/CVE-2022-23862",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23862/blob/main/SafeQ%20-%20CVE-2022-23862.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://ysoft.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2742",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-01-02T23:15:10.567",
"lastModified": "2023-08-08T14:22:24.967",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T17:35:00.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2743",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-01-02T23:15:10.620",
"lastModified": "2023-01-09T19:15:51.240",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:01.157",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-3842",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-01-02T23:15:10.677",
"lastModified": "2023-01-09T19:15:21.247",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:03.307",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0471",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-01-30T09:15:08.790",
"lastModified": "2023-02-06T21:42:57.417",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:06.327",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20803",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-08-07T04:15:13.867",
"lastModified": "2023-08-09T17:50:30.643",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:07.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.6,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20804",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-08-07T04:15:13.930",
"lastModified": "2023-08-09T17:53:15.283",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:08.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20805",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-08-07T04:15:13.993",
"lastModified": "2023-08-09T17:53:38.957",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:08.963",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27602",
"sourceIdentifier": "security@apache.org",
"published": "2023-04-10T08:15:06.967",
"lastModified": "2023-04-19T12:15:08.170",
"lastModified": "2024-10-22T16:35:09.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27603",
"sourceIdentifier": "security@apache.org",
"published": "2023-04-10T08:15:07.133",
"lastModified": "2023-04-14T19:45:47.010",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:10.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28706",
"sourceIdentifier": "security@apache.org",
"published": "2023-04-07T15:15:08.017",
"lastModified": "2023-04-14T14:23:05.247",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:10.210",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28710",
"sourceIdentifier": "security@apache.org",
"published": "2023-04-07T15:15:08.113",
"lastModified": "2023-05-22T14:27:01.200",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:10.403",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29215",
"sourceIdentifier": "security@apache.org",
"published": "2023-04-10T08:15:07.237",
"lastModified": "2023-04-13T18:16:08.277",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:10.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29216",
"sourceIdentifier": "security@apache.org",
"published": "2023-04-10T08:15:07.290",
"lastModified": "2023-04-13T18:16:11.797",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:10.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30465",
"sourceIdentifier": "security@apache.org",
"published": "2023-04-11T15:15:10.673",
"lastModified": "2023-04-18T19:30:08.003",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:10.960",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4046",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-08-01T15:15:09.847",
"lastModified": "2024-10-21T19:24:02.230",
"lastModified": "2024-10-22T16:35:14.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4047",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-08-01T15:15:09.903",
"lastModified": "2024-10-21T19:24:02.230",
"lastModified": "2024-10-22T16:35:15.043",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45230",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:11.727",
"lastModified": "2024-03-13T02:15:50.157",
"lastModified": "2024-10-22T16:35:13.497",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -79,6 +79,16 @@
"value": "CWE-119"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-49567",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-10-18T08:15:03.143",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-22T16:39:16.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in the Bitdefender Total Security HTTPS scanning functionality where the product incorrectly checks the site's certificate, which allows an attacker to make MITM SSL connections to an arbitrary site. The product trusts certificates that are issued using the MD5 and SHA1 collision hash functions which allow attackers to create rogue certificates that appear legitimate."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en la funci\u00f3n de an\u00e1lisis HTTPS de Bitdefender Total Security, en la que el producto comprueba incorrectamente el certificado del sitio, lo que permite a un atacante realizar conexiones SSL MITM a un sitio arbitrario. El producto conf\u00eda en los certificados emitidos mediante las funciones hash de colisi\u00f3n MD5 y SHA1, lo que permite a los atacantes crear certificados falsos que parecen leg\u00edtimos."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
@ -69,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "27.0.25.115",
"matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93"
}
]
}
]
}
],
"references": [
{
"url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-certificates-using-collision-hash-functions-in-bitdefender-total-security-https-scanning-va-11239/",
"source": "cve-requests@bitdefender.com"
"source": "cve-requests@bitdefender.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49570",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-10-18T09:15:02.770",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:26:47.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
@ -73,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "27.0.25.115",
"matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93"
}
]
}
]
}
],
"references": [
{
"url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-basic-constraints-certificate-in-bitdefender-total-security-https-scanning-va-11210/",
"source": "cve-requests@bitdefender.com"
"source": "cve-requests@bitdefender.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6055",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-10-18T08:15:03.387",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-22T16:39:00.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
@ -73,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "27.0.25.115",
"matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93"
}
]
}
]
}
],
"references": [
{
"url": "https://bitdefender.com/support/security-advisories/improper-certificate-validation-in-bitdefender-total-security-https-scanning-va-11158/",
"source": "cve-requests@bitdefender.com"
"source": "cve-requests@bitdefender.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6056",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-10-18T08:15:03.500",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-22T16:38:43.993",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
@ -73,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "27.0.25.115",
"matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93"
}
]
}
]
}
],
"references": [
{
"url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-self-signed-certificates-in-bitdefender-total-security-https-scanning-va-11164/",
"source": "cve-requests@bitdefender.com"
"source": "cve-requests@bitdefender.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6057",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-10-18T08:15:03.627",
"lastModified": "2024-10-22T16:00:07.397",
"lastModified": "2024-10-22T16:38:29.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -66,19 +66,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 2.2,
"impactScore": 5.2
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6824",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:13.920",
"lastModified": "2024-01-23T15:35:27.123",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-22T16:35:16.083",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10055",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-18T08:15:03.843",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:28:59.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -51,18 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ninjateam:click_to_chat:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.4",
"matchCriteriaId": "64C989BB-93E2-4412-B1EF-74FAEC7844A5"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3169768/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/support-chat/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b4c13600-0791-4ade-9c28-f43f164aedae?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10078",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-18T08:15:04.060",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:28:26.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -51,106 +71,199 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.4",
"matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L111",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L112",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L113",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L114",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L115",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L116",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L117",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L118",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L119",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L120",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L121",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L122",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L123",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L124",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L125",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L126",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L127",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L128",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L129",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L130",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L131",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L132",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L133",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L134",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d12c4b1c-23d0-430f-a6ea-0a3ab487ed10?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10079",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-18T08:15:04.300",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:27:54.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.4",
"matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L1318",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d038f1a2-4755-417f-965d-508b57c05738?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10080",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-18T08:15:04.507",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:27:38.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.4",
"matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L1622",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1bee1eeb-5354-47c9-9ae1-b1608d87d7bb?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10131",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-10-19T04:15:05.300",
"lastModified": "2024-10-21T17:10:22.857",
"lastModified": "2024-10-22T17:15:03.203",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,19 +22,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10173",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-20T05:15:02.830",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-22T17:05:13.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,26 +150,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:didiglobal:ddmq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA66207A-D4D3-4B53-9922-7C3769E241F5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/didi/DDMQ/issues/37",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/didi/DDMQ/issues/37#issue-2577905007",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.280957",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.280957",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.421516",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20421",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-16T17:15:14.193",
"lastModified": "2024-10-18T12:53:04.627",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-22T17:51:08.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,99 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.0.2",
"matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
"matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.2.5",
"matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
"matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.2.5",
"matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*",
"matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40083",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:05.703",
"lastModified": "2024-10-21T21:15:05.703",
"lastModified": "2024-10-22T17:35:03.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Buffer Overflow vulnerabilty in the local_app_set_router_token function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via sscanf reading the token and timezone JSON fields into a fixed-length buffer."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "http://vilo.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40084",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:05.770",
"lastModified": "2024-10-21T21:15:05.770",
"lastModified": "2024-10-22T17:35:04.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Buffer Overflow in the Boa webserver of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via exceptionally long HTTP methods or paths."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "http://vilo.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40085",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:05.853",
"lastModified": "2024-10-21T21:15:05.853",
"lastModified": "2024-10-22T17:35:04.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Buffer Overflow vulnerability in the local_app_set_router_wan function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via pppoe_username and pppoe_password fields being larger than 128 bytes in length."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "http://vilo.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40086",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:05.923",
"lastModified": "2024-10-21T21:15:05.923",
"lastModified": "2024-10-22T17:35:05.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Buffer Overflow vulnerability in the local_app_set_router_wifi_SSID_PWD function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via a password field larger than 64 bytes in length."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "http://vilo.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40087",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:06.003",
"lastModified": "2024-10-21T21:15:06.003",
"lastModified": "2024-10-22T17:35:06.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Insecure Permissions. Lack of authentication in the custom TCP service on port 5432 allows remote, unauthenticated attackers to gain administrative access over the router."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "http://vilo.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40089",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:06.150",
"lastModified": "2024-10-21T21:15:06.150",
"lastModified": "2024-10-22T17:35:07.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Command Injection vulnerability in Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, authenticated attackers to execute arbitrary code by injecting shell commands into the name of the Vilo device."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "http://vilo.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40090",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:06.223",
"lastModified": "2024-10-21T21:15:06.223",
"lastModified": "2024-10-22T17:35:07.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Information Disclosure. An information leak in the Boa webserver allows remote, unauthenticated attackers to leak memory addresses of uClibc and the stack via sending a GET request to the index page."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "http://vilo.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40091",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:06.313",
"lastModified": "2024-10-21T21:15:06.313",
"lastModified": "2024-10-22T17:35:08.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 lacks authentication in the Boa webserver, which allows remote, unauthenticated attackers to retrieve logs with sensitive system."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "http://vilo.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43611",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:29.240",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-22T16:01:19.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,8 +41,18 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,10 +65,75 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7428",
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6414",
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2762",
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1189",
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43611",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-45518",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:03.837",
"lastModified": "2024-10-22T17:15:03.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE)."
}
],
"metrics": {},
"references": [
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46240",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T16:15:07.407",
"lastModified": "2024-10-22T16:15:07.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under action=system and the company/contact parameters under action=addcust within admin.php file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46538",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:03.950",
"lastModified": "2024-10-22T17:15:03.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in pfsense v2.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $pconfig variable at interfaces_groups_edit.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/physicszq/web_issue/blob/main/pfsense/interfaces_groups_edit_file.md_xss.md",
"source": "cve@mitre.org"
},
{
"url": "https://redmine.pfsense.org/issues/15778",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47485",
"sourceIdentifier": "hsrc@hikvision.com",
"published": "2024-10-18T09:15:03.093",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:23:22.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,12 +59,68 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1236"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hikvision:hikcentral_master:*:*:*:*:lite:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.3.0",
"matchCriteriaId": "126DB70D-715D-4BC7-8038-0316BA2890DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/",
"source": "hsrc@hikvision.com"
"source": "hsrc@hikvision.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47486",
"sourceIdentifier": "hsrc@hikvision.com",
"published": "2024-10-18T09:15:03.217",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:11:07.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,12 +59,67 @@
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hikvision:hikcentral_master:*:*:*:*:lite:*:*:*",
"versionEndExcluding": "2.3.0",
"matchCriteriaId": "9BC8FAE8-57D7-4D5C-A6CA-97AE26FCBC65"
}
]
}
]
}
],
"references": [
{
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/",
"source": "hsrc@hikvision.com"
"source": "hsrc@hikvision.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47487",
"sourceIdentifier": "hsrc@hikvision.com",
"published": "2024-10-18T09:15:03.400",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:10:08.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,12 +59,68 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hikvision:hikcentral_professional:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.6.1",
"matchCriteriaId": "569288FC-D541-4CF0-AC58-30048842B620"
}
]
}
]
}
],
"references": [
{
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/",
"source": "hsrc@hikvision.com"
"source": "hsrc@hikvision.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47676",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T12:15:04.687",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:12:39.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -11,19 +11,89 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb.c: fix UAF of vma in hugetlb fault pathway\n\nSyzbot reports a UAF in hugetlb_fault(). This happens because\nvmf_anon_prepare() could drop the per-VMA lock and allow the current VMA\nto be freed before hugetlb_vma_unlock_read() is called.\n\nWe can fix this by using a modified version of vmf_anon_prepare() that\ndoesn't release the VMA lock on failure, and then release it ourselves\nafter hugetlb_vma_unlock_read()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "451C50ED-169E-4E8C-BFD9-95D0C8C3231C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/98b74bb4d7e96b4da5ef3126511febe55b76b807",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d59ebc99dee0a2687a26df94b901eb8216dbf876",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e897d184a8dd4a4e1f39c8c495598e4d9472776c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,28 +2,102 @@
"id": "CVE-2024-47746",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:04.667",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:00:35.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set\n\nThis may be a typo. The comment has said shared locks are\nnot allowed when this bit is set. If using shared lock, the\nwait in `fuse_file_cached_io_open` may be forever."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fuse: use un bloqueo exclusivo cuando FUSE_I_CACHE_IO_MODE est\u00e1 configurado. Esto puede ser un error tipogr\u00e1fico. El comentario dec\u00eda que no se permiten bloqueos compartidos cuando este bit est\u00e1 configurado. Si se usa un bloqueo compartido, la espera en `fuse_file_cached_io_open` puede ser eterna."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "451C50ED-169E-4E8C-BFD9-95D0C8C3231C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2f3d8ff457982f4055fe8f7bf19d3821ba22c376",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4e181761ffec67307157a7e8a78d58ee4130cf00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fa4890bd8237e5a1e7428acd7328729db2703b23",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47747",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:04.753",
"lastModified": "2024-10-22T15:09:13.173",
"lastModified": "2024-10-22T16:11:40.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47749",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:04.950",
"lastModified": "2024-10-22T15:00:29.497",
"lastModified": "2024-10-22T16:08:31.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47752",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:05.203",
"lastModified": "2024-10-22T15:04:46.523",
"lastModified": "2024-10-22T16:11:09.037",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47753",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:05.283",
"lastModified": "2024-10-22T15:04:18.277",
"lastModified": "2024-10-22T16:10:40.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47754",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:05.377",
"lastModified": "2024-10-22T15:03:31.147",
"lastModified": "2024-10-22T16:10:21.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47756",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:05.550",
"lastModified": "2024-10-22T15:02:11.467",
"lastModified": "2024-10-22T16:09:56.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47819",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:07.500",
"lastModified": "2024-10-22T16:15:07.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco, a free and open source .NET content management system, has a cross-site scripting vulnerability starting in version 14.0.0 and prior to versions 14.3.1 and 15.0.0. This can be leveraged to gain access to higher-privilege endpoints, e.g. if you get a user with admin privileges to run the code, you can potentially elevate all users and grant them admin privileges or access protected content. Versions 14.3.1 and 15.0.0 contain a patch. As a workaround, ensure that access to the Dictionary section is only granted to trusted users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-c5g6-6xf7-qxp3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48570",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:04.087",
"lastModified": "2024-10-22T17:15:04.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Client Management System 1.0 was discovered to contain a SQL injection vulnerability via the Between Dates Reports parameter at /admin/bwdates-reports-ds.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Luc1f3r066/Client-Management-System-v1.0-",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-48605",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T16:15:07.757",
"lastModified": "2024-10-22T16:15:07.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Helakuru Desktop Application v1.1 allows a local attacker to execute arbitrary code via the lack of proper validation of the wow64log.dll file."
}
],
"metrics": {},
"references": [
{
"url": "https://clement.notin.org/blog/2020/09/12/CVE-2020-7315-McAfee-Agent-DLL-injection/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/surajhacx/HelakuruV.1.1-DLLHijack",
"source": "cve@mitre.org"
},
{
"url": "https://medium.com/%40xNEED/dll-hijacking-jagexlauncher-819599165822",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/51461",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48706",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:04.180",
"lastModified": "2024-10-22T17:15:04.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the title parameter with action=add or action=editform within the (a) managemessage.php file and (b) managetask.php file respectively."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48707",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:04.273",
"lastModified": "2024-10-22T17:15:04.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under (a) action=add or action=edit within managemilestone.php file and (b) action=addpro within admin.php file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS3.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48708",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:04.370",
"lastModified": "2024-10-22T17:15:04.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Collabtive 3.1 is vulnerable to Cross-Site Scripting (XSS) via the name parameter in (a) file tasklist.php under action = add/edit and in (b) file admin.php under action = adduser/edituser."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS4.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-48925",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:07.853",
"lastModified": "2024-10-22T16:15:07.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco, a free and open source .NET content management system, has an improper access control issue starting in version 14.0.0 and prior to version 14.3.0. The issue allows low-privilege users to access the webhook API and retrieve information that should be restricted to users with access to the settings section. Version 14.3.0 contains a patch."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 0.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-4gp9-ff99-j6vj",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48926",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:08.090",
"lastModified": "2024-10-22T16:15:08.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco, a free and open source .NET content management system, has an insufficient session expiration issue in versions on the 13.x branch prior to 13.5.2, 10.x prior to 10.8.7, and 8.x prior to 8.18.15. The Backoffice displays the logout page with a session timeout message before the server session has fully expired, causing users to believe they have been logged out approximately 30 seconds before they actually are. Versions 13.5.2, 10.8,7, and 8.18.15 contain a patch for the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-fp6q-gccw-7qqm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48927",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:08.360",
"lastModified": "2024-10-22T16:15:08.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco, a free and open source .NET content management system, has a remote code execution issue in versions on the 13.x branch prior to 13.5.2, 10.x prior to 10.8.7, and 8.x prior to 8.18.15. There is a potential risk of code execution for Backoffice users when they \u201cpreview\u201d SVG files in full screen mode. Versions 13.5.2, 10.8,7, and 8.18.15 contain a patch for the issue. As a workaround, derver-side file validation is available to strip script tags from file's content during the file upload process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-5955-cwv4-h7qh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48929",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:08.617",
"lastModified": "2024-10-22T16:15:08.617",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco is a free and open source .NET content management system. In versions on the 13.x branch prior to 13.5.2 and versions on the 10.x branch prior to 10.8.7, during an explicit sign-out, the server session is not fully terminated. Versions 13.5.2 and 10.8.7 contain a patch for the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wxw9-6pv9-c3xc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-49208",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:04.503",
"lastModified": "2024-10-22T17:15:04.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Archer Platform 2024.03 before version 2024.08 is affected by an authorization bypass vulnerability related to supporting application files. A remote unprivileged attacker could potentially exploit this vulnerability to elevate their privileges and delete system icons."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
"source": "cve@mitre.org"
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-49209",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:05.763",
"lastModified": "2024-10-22T17:15:05.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Archer Platform 2024.03 before version 2024.09 is affected by an API authorization bypass vulnerability related to supporting application files. A remote unprivileged attacker could potentially exploit this vulnerability to elevate their privileges and upload additional system icons."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
"source": "cve@mitre.org"
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-49210",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:05.970",
"lastModified": "2024-10-22T17:15:05.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected XSS was discovered in an iView List Archer Platform UX page in Archer Platform 6.x before version 2024.09. A remote unauthenticated attacker could potentially exploit this by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and executed by the web browser in the context of the vulnerable web application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
"source": "cve@mitre.org"
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-49211",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:06.193",
"lastModified": "2024-10-22T17:15:06.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected XSS was discovered in a Dashboard Listing Archer Platform UX page in Archer Platform 6.x before version 2024.08. A remote unauthenticated attacker could potentially exploit this by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and executed by the web browser in the context of the vulnerable web application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
"source": "cve@mitre.org"
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-49373",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:08.860",
"lastModified": "2024-10-22T16:15:08.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "No Fuss Computing Centurion ERP is open source enterprise resource planning (ERP) software. Prior to version 1.2.1, an authenticated user can view projects within organizations they are not apart of. Version 1.2.1 fixes the problem."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-653"
}
]
}
],
"references": [
{
"url": "https://github.com/nofusscomputing/centurion_erp/commit/c3a4685200faa060167d4fde86e806dc91eddcae",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nofusscomputing/centurion_erp/pull/358",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nofusscomputing/centurion_erp/security/advisories/GHSA-5qmx-pr2f-qhj5",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49615",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:04.690",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:43:14.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:henriquerodrigues:safetyforms:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "B2B347EB-4A6A-4D4C-821E-18B688A74A5D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/safetymails-forms/wordpress-safetyforms-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49616",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:04.903",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:41:58.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nyasro:rate_own_post:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "25EB6F93-D409-49FF-B598-0CC78E15AAFD"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/rate-own-post/wordpress-rate-own-post-plugin-1-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49617",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:05.130",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:51:35.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bhaskardhote:back_link_tracker:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "DD111F5C-5BB5-4770-B263-3727C61EB314"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/back-link-tracker/wordpress-back-link-tracker-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49618",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:05.347",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:50:18.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jordanlyall:mytweetlinks:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.1",
"matchCriteriaId": "748A3C09-C3A5-4B9B-8BDD-3AF5016A4905"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mytweetlinks/wordpress-mytweetlinks-plugin-1-1-1-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,36 +2,130 @@
"id": "CVE-2024-49850",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:05.797",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:12:14.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos\n\nIn case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL\nreferencing a non-existing BTF type, function bpf_core_calc_relo_insn\nwould cause a null pointer deference.\n\nFix this by adding a proper check upper in call stack, as malformed\nrelocation records could be passed from user space.\n\nSimplest reproducer is a program:\n\n r0 = 0\n exit\n\nWith a single relocation record:\n\n .insn_off = 0, /* patch first instruction */\n .type_id = 100500, /* this type id does not exist */\n .access_str_off = 6, /* offset of string \"0\" */\n .kind = BPF_CORE_TYPE_ID_LOCAL,\n\nSee the link for original reproducer or next commit for a test case."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: maneja correctamente reubicaciones BPF_CORE_TYPE_ID_LOCAL malformadas En caso de un registro de reubicaci\u00f3n malformado del tipo BPF_CORE_TYPE_ID_LOCAL que haga referencia a un tipo BTF inexistente, la funci\u00f3n bpf_core_calc_relo_insn causar\u00eda una desreferencia de puntero nulo. Solucione esto agregando una verificaci\u00f3n superior adecuada en la pila de llamadas, ya que los registros de reubicaci\u00f3n malformados podr\u00edan pasarse desde el espacio de usuario. El reproductor m\u00e1s simple es un programa: r0 = 0 exit Con un solo registro de reubicaci\u00f3n: .insn_off = 0, /* parchear la primera instrucci\u00f3n */ .type_id = 100500, /* este id de tipo no existe */ .access_str_off = 6, /* desplazamiento de la cadena \"0\" */ .kind = BPF_CORE_TYPE_ID_LOCAL, Consulte el enlace para el reproductor original o la pr\u00f3xima confirmaci\u00f3n para un caso de prueba."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "09358D68-A717-469E-B900-8002A642E29A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.54",
"matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2288b54b96dcb55bedebcef3572bb8821fc5e708",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3d2786d65aaa954ebd3fcc033ada433e10da21c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/584cd3ff792e1edbea20b2a7df55897159b0be3e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dc7ce14f00bcd50641f2110b7a32aa6552e0780f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e7e9c5b2dda29067332df2a85b0141a92b41f218",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-49855",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:06.270",
"lastModified": "2024-10-22T15:17:29.283",
"lastModified": "2024-10-22T16:12:27.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-49859",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:06.627",
"lastModified": "2024-10-22T15:24:57.640",
"lastModified": "2024-10-22T16:13:03.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-362"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-9050",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-10-22T13:15:02.410",
"lastModified": "2024-10-22T13:15:02.410",
"lastModified": "2024-10-22T17:15:06.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -36,6 +36,10 @@
]
},
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:8312",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-9050",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-9129",
"sourceIdentifier": "security@puppet.com",
"published": "2024-10-22T17:15:06.557",
"lastModified": "2024-10-22T17:15:06.557",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In versions of Zend Server 8.5 and prior to version 9.2 a format string injection was discovered. \n\nReported by Dylan Marino"
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@puppet.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "security@puppet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
],
"references": [
{
"url": "https://portal.perforce.com/s/detail/a91PA000001SYZFYA4",
"source": "security@puppet.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-9287",
"sourceIdentifier": "cna@python.org",
"published": "2024-10-22T17:15:06.697",
"lastModified": "2024-10-22T17:15:06.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@python.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "GREEN",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "cna@python.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"references": [
{
"url": "https://github.com/python/cpython/issues/124651",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/pull/124712",
"source": "cna@python.org"
},
{
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/",
"source": "cna@python.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-9355",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-10-01T19:15:09.793",
"lastModified": "2024-10-04T13:51:25.567",
"lastModified": "2024-10-22T17:15:06.853",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -60,6 +60,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:7550",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:8327",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-9355",
"source": "secalert@redhat.com"

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-9452",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-18T05:15:07.607",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:23:59.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
},
{
"lang": "es",
"value": "El complemento Branding para WordPress es vulnerable a Cross-Site Scripting almacenado mediante cargas de archivos SVG en todas las versiones hasta la 1.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gurieveugen\\&vitaliyshebela:branding:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "F579BE43-2D93-4F36-A54D-3D8EE16054AA"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/branding/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8736cf81-3fb8-4c81-a878-7d73a3e68fc2?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9537",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2024-10-18T15:15:04.170",
"lastModified": "2024-10-22T01:00:02.043",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T17:33:23.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-10-21",
"cisaActionDue": "2024-11-11",
@ -65,6 +65,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
@ -87,42 +107,108 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.1.0",
"versionEndExcluding": "12.1.3",
"matchCriteriaId": "4BFE7072-C420-4186-8441-AD5A531382EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.0",
"versionEndExcluding": "12.2.3",
"matchCriteriaId": "BE089841-BC12-4DF6-86A3-71AF46CC2345"
}
]
}
]
}
],
"references": [
{
"url": "https://arcticwolf.com/resources/blog/rackspace-breach-linked-to-zero-day-vulnerability-sciencelogic-sl1s-third-party-utility/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Press/Media Coverage"
]
},
{
"url": "https://community.sciencelogic.com/blog/latest-kb-articles-and-known-issues-blog-board/week-of-september-30-2024---latest-kb-articles-and-known-issues-part-1-of-2/1690",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://rackspace.service-now.com/system_status?id=detailed_status&service=4dafca5a87f41610568b206f8bbb35a6",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.sciencelogic.com/s/article/15465",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.sciencelogic.com/s/article/15527",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Permissions Required"
]
},
{
"url": "https://twitter.com/ynezzor/status/1839931641172467907",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.bleepingcomputer.com/news/security/rackspace-monitoring-data-stolen-in-sciencelogic-zero-day-attack/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Press/Media Coverage"
]
},
{
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9537",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.theregister.com/2024/09/30/rackspace_zero_day_attack/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Press/Media Coverage"
]
}
]
}

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-9848",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-18T05:15:07.807",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-22T16:42:25.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Product Customizer Light plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
},
{
"lang": "es",
"value": "El complemento Product Customizer Light para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.0.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:k2-service:product_customizer_light:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "6D4CD46E-314B-44E3-AEB7-C4489853D8A4"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/product-customizer-light/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18d1feee-347c-4f43-a01b-67b3d0a5b2d6?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-22T16:00:52.758050+00:00
2024-10-22T18:00:41.619481+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-22T16:00:07.397000+00:00
2024-10-22T17:51:08.113000+00:00
```
### Last Data Feed Release
@ -33,54 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
266711
266733
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `22`
- [CVE-2024-10234](CVE-2024/CVE-2024-102xx/CVE-2024-10234.json) (`2024-10-22T14:15:14.573`)
- [CVE-2024-26271](CVE-2024/CVE-2024-262xx/CVE-2024-26271.json) (`2024-10-22T15:15:05.523`)
- [CVE-2024-26272](CVE-2024/CVE-2024-262xx/CVE-2024-26272.json) (`2024-10-22T15:15:05.740`)
- [CVE-2024-26273](CVE-2024/CVE-2024-262xx/CVE-2024-26273.json) (`2024-10-22T15:15:05.937`)
- [CVE-2024-38002](CVE-2024/CVE-2024-380xx/CVE-2024-38002.json) (`2024-10-22T15:15:06.277`)
- [CVE-2024-43173](CVE-2024/CVE-2024-431xx/CVE-2024-43173.json) (`2024-10-22T15:15:06.800`)
- [CVE-2024-43177](CVE-2024/CVE-2024-431xx/CVE-2024-43177.json) (`2024-10-22T15:15:07.020`)
- [CVE-2024-50311](CVE-2024/CVE-2024-503xx/CVE-2024-50311.json) (`2024-10-22T14:15:19.450`)
- [CVE-2024-50312](CVE-2024/CVE-2024-503xx/CVE-2024-50312.json) (`2024-10-22T14:15:19.973`)
- [CVE-2024-8980](CVE-2024/CVE-2024-89xx/CVE-2024-8980.json) (`2024-10-22T15:15:07.337`)
- [CVE-2022-23861](CVE-2022/CVE-2022-238xx/CVE-2022-23861.json) (`2024-10-22T16:15:04.897`)
- [CVE-2022-23862](CVE-2022/CVE-2022-238xx/CVE-2022-23862.json) (`2024-10-22T16:15:05.443`)
- [CVE-2024-45518](CVE-2024/CVE-2024-455xx/CVE-2024-45518.json) (`2024-10-22T17:15:03.837`)
- [CVE-2024-46240](CVE-2024/CVE-2024-462xx/CVE-2024-46240.json) (`2024-10-22T16:15:07.407`)
- [CVE-2024-46538](CVE-2024/CVE-2024-465xx/CVE-2024-46538.json) (`2024-10-22T17:15:03.950`)
- [CVE-2024-47819](CVE-2024/CVE-2024-478xx/CVE-2024-47819.json) (`2024-10-22T16:15:07.500`)
- [CVE-2024-48570](CVE-2024/CVE-2024-485xx/CVE-2024-48570.json) (`2024-10-22T17:15:04.087`)
- [CVE-2024-48605](CVE-2024/CVE-2024-486xx/CVE-2024-48605.json) (`2024-10-22T16:15:07.757`)
- [CVE-2024-48706](CVE-2024/CVE-2024-487xx/CVE-2024-48706.json) (`2024-10-22T17:15:04.180`)
- [CVE-2024-48707](CVE-2024/CVE-2024-487xx/CVE-2024-48707.json) (`2024-10-22T17:15:04.273`)
- [CVE-2024-48708](CVE-2024/CVE-2024-487xx/CVE-2024-48708.json) (`2024-10-22T17:15:04.370`)
- [CVE-2024-48925](CVE-2024/CVE-2024-489xx/CVE-2024-48925.json) (`2024-10-22T16:15:07.853`)
- [CVE-2024-48926](CVE-2024/CVE-2024-489xx/CVE-2024-48926.json) (`2024-10-22T16:15:08.090`)
- [CVE-2024-48927](CVE-2024/CVE-2024-489xx/CVE-2024-48927.json) (`2024-10-22T16:15:08.360`)
- [CVE-2024-48929](CVE-2024/CVE-2024-489xx/CVE-2024-48929.json) (`2024-10-22T16:15:08.617`)
- [CVE-2024-49208](CVE-2024/CVE-2024-492xx/CVE-2024-49208.json) (`2024-10-22T17:15:04.503`)
- [CVE-2024-49209](CVE-2024/CVE-2024-492xx/CVE-2024-49209.json) (`2024-10-22T17:15:05.763`)
- [CVE-2024-49210](CVE-2024/CVE-2024-492xx/CVE-2024-49210.json) (`2024-10-22T17:15:05.970`)
- [CVE-2024-49211](CVE-2024/CVE-2024-492xx/CVE-2024-49211.json) (`2024-10-22T17:15:06.193`)
- [CVE-2024-49373](CVE-2024/CVE-2024-493xx/CVE-2024-49373.json) (`2024-10-22T16:15:08.860`)
- [CVE-2024-9129](CVE-2024/CVE-2024-91xx/CVE-2024-9129.json) (`2024-10-22T17:15:06.557`)
- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-10-22T17:15:06.697`)
### CVEs modified in the last Commit
Recently modified CVEs: `82`
Recently modified CVEs: `67`
- [CVE-2024-47747](CVE-2024/CVE-2024-477xx/CVE-2024-47747.json) (`2024-10-22T15:09:13.173`)
- [CVE-2024-47749](CVE-2024/CVE-2024-477xx/CVE-2024-47749.json) (`2024-10-22T15:00:29.497`)
- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-22T15:04:46.523`)
- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-22T15:04:18.277`)
- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-22T15:03:31.147`)
- [CVE-2024-47755](CVE-2024/CVE-2024-477xx/CVE-2024-47755.json) (`2024-10-22T15:46:38.027`)
- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-22T15:02:11.467`)
- [CVE-2024-47757](CVE-2024/CVE-2024-477xx/CVE-2024-47757.json) (`2024-10-22T15:54:48.830`)
- [CVE-2024-49613](CVE-2024/CVE-2024-496xx/CVE-2024-49613.json) (`2024-10-22T15:29:55.203`)
- [CVE-2024-49614](CVE-2024/CVE-2024-496xx/CVE-2024-49614.json) (`2024-10-22T15:34:09.190`)
- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-22T15:17:29.283`)
- [CVE-2024-49857](CVE-2024/CVE-2024-498xx/CVE-2024-49857.json) (`2024-10-22T15:48:42.347`)
- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-22T15:24:57.640`)
- [CVE-2024-6959](CVE-2024/CVE-2024-69xx/CVE-2024-6959.json) (`2024-10-22T14:02:57.660`)
- [CVE-2024-7889](CVE-2024/CVE-2024-78xx/CVE-2024-7889.json) (`2024-10-22T14:50:55.187`)
- [CVE-2024-7890](CVE-2024/CVE-2024-78xx/CVE-2024-7890.json) (`2024-10-22T14:53:32.763`)
- [CVE-2024-9206](CVE-2024/CVE-2024-92xx/CVE-2024-9206.json) (`2024-10-22T15:27:08.847`)
- [CVE-2024-9364](CVE-2024/CVE-2024-93xx/CVE-2024-9364.json) (`2024-10-22T15:26:10.673`)
- [CVE-2024-9366](CVE-2024/CVE-2024-93xx/CVE-2024-9366.json) (`2024-10-22T15:09:48.177`)
- [CVE-2024-9373](CVE-2024/CVE-2024-93xx/CVE-2024-9373.json) (`2024-10-22T15:07:23.907`)
- [CVE-2024-9382](CVE-2024/CVE-2024-93xx/CVE-2024-9382.json) (`2024-10-22T14:31:49.097`)
- [CVE-2024-9383](CVE-2024/CVE-2024-93xx/CVE-2024-9383.json) (`2024-10-22T14:27:13.377`)
- [CVE-2024-9674](CVE-2024/CVE-2024-96xx/CVE-2024-9674.json) (`2024-10-22T14:02:50.473`)
- [CVE-2024-9703](CVE-2024/CVE-2024-97xx/CVE-2024-9703.json) (`2024-10-22T15:25:27.887`)
- [CVE-2024-9892](CVE-2024/CVE-2024-98xx/CVE-2024-9892.json) (`2024-10-22T15:46:17.880`)
- [CVE-2024-40091](CVE-2024/CVE-2024-400xx/CVE-2024-40091.json) (`2024-10-22T17:35:08.760`)
- [CVE-2024-43611](CVE-2024/CVE-2024-436xx/CVE-2024-43611.json) (`2024-10-22T16:01:19.373`)
- [CVE-2024-47485](CVE-2024/CVE-2024-474xx/CVE-2024-47485.json) (`2024-10-22T16:23:22.890`)
- [CVE-2024-47486](CVE-2024/CVE-2024-474xx/CVE-2024-47486.json) (`2024-10-22T16:11:07.547`)
- [CVE-2024-47487](CVE-2024/CVE-2024-474xx/CVE-2024-47487.json) (`2024-10-22T16:10:08.027`)
- [CVE-2024-47676](CVE-2024/CVE-2024-476xx/CVE-2024-47676.json) (`2024-10-22T16:12:39.830`)
- [CVE-2024-47746](CVE-2024/CVE-2024-477xx/CVE-2024-47746.json) (`2024-10-22T16:00:35.703`)
- [CVE-2024-47747](CVE-2024/CVE-2024-477xx/CVE-2024-47747.json) (`2024-10-22T16:11:40.627`)
- [CVE-2024-47749](CVE-2024/CVE-2024-477xx/CVE-2024-47749.json) (`2024-10-22T16:08:31.637`)
- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-22T16:11:09.037`)
- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-22T16:10:40.380`)
- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-22T16:10:21.907`)
- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-22T16:09:56.570`)
- [CVE-2024-49615](CVE-2024/CVE-2024-496xx/CVE-2024-49615.json) (`2024-10-22T16:43:14.190`)
- [CVE-2024-49616](CVE-2024/CVE-2024-496xx/CVE-2024-49616.json) (`2024-10-22T16:41:58.513`)
- [CVE-2024-49617](CVE-2024/CVE-2024-496xx/CVE-2024-49617.json) (`2024-10-22T16:51:35.353`)
- [CVE-2024-49618](CVE-2024/CVE-2024-496xx/CVE-2024-49618.json) (`2024-10-22T16:50:18.527`)
- [CVE-2024-49850](CVE-2024/CVE-2024-498xx/CVE-2024-49850.json) (`2024-10-22T16:12:14.193`)
- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-22T16:12:27.030`)
- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-22T16:13:03.267`)
- [CVE-2024-9050](CVE-2024/CVE-2024-90xx/CVE-2024-9050.json) (`2024-10-22T17:15:06.420`)
- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-10-22T17:15:06.853`)
- [CVE-2024-9452](CVE-2024/CVE-2024-94xx/CVE-2024-9452.json) (`2024-10-22T16:23:59.420`)
- [CVE-2024-9537](CVE-2024/CVE-2024-95xx/CVE-2024-9537.json) (`2024-10-22T17:33:23.837`)
- [CVE-2024-9848](CVE-2024/CVE-2024-98xx/CVE-2024-9848.json) (`2024-10-22T16:42:25.867`)
## Download and Usage

View File

@ -63138,7 +63138,7 @@ CVE-2013-5915,0,0,368d20521458dfd67f96a5930cda6772edd7252de200104ef31ef51939f90d
CVE-2013-5916,0,0,b0d284bafa3ac6246187547ee2d43684ad1236bff154114e61e3a3cf31f28810,2014-05-09T17:42:40.380000
CVE-2013-5917,0,0,638bc89fbb16450da932db01256312e62affb65f570814a57e05659a3af11b92,2013-09-23T19:23:45.877000
CVE-2013-5918,0,0,6126663f639f7e21c569c9ea85ac23b75cd9e059660132fae7fd8284aef28e2b,2013-09-23T22:29:07.197000
CVE-2013-5919,0,0,30699efb71c093b0e58f24544bf6df97538bcae149af62bf024902b9dff43824,2018-10-30T16:27:53.280000
CVE-2013-5919,0,1,0adc17bb11f2ed9913c73cca5c613c7fea4d3c599f1f6f5eb6d738930fd51ded,2024-10-22T17:11:30.463000
CVE-2013-5930,0,0,58f14391c3ad819c611b2142260d6a3525ec3ab4e3dcd27e90aedb68e5c54d13,2017-08-29T01:33:53.340000
CVE-2013-5931,0,0,7e3f79c8d8dbe38950577fa1ce89a252dd9f139e65131fb691e22345ef4f0c31,2013-10-15T18:03:40.417000
CVE-2013-5932,0,0,c7fa0da30fdd1df0a4bb0e5d331120001e0abaab1eb852698805535985dd763f,2013-10-03T18:35:43.510000
@ -111407,9 +111407,9 @@ CVE-2018-10238,0,0,5ce73cfdf6c911ff33f92d929345a4f196b913aa547a8ce47a1937c167cf2
CVE-2018-10239,0,0,b413a71aadf645ae4e886f0aa705ec52a2de7806a1f09a861d8dce143f02edad,2019-06-20T17:17:33.690000
CVE-2018-10240,0,0,502d71f1fe0738d6cd63f255ca904d3701317895a3d0d52edad3a0c6d08616be,2018-06-25T17:04:30.363000
CVE-2018-10241,0,0,e96a43e60e432a1531f502eabdd83306afa8aa26926945ca2aaa1a6a36637314,2018-06-20T14:17:18.543000
CVE-2018-10242,0,0,f39e96444e074913df132f95302e1e4da40b4d31a29c66625f2e557da5245295,2019-05-06T17:00:24.877000
CVE-2018-10242,0,1,6239bb33c05dfa81a63f17b2e9a1fdc8e16d715b4d7e738f2a88de6db03f5eff,2024-10-22T17:11:30.463000
CVE-2018-10243,0,0,b53749bcaaacf564e23f6a7a8d50a34723505f0b1455fd458f02a46a1fc4083c,2019-04-08T23:29:00.323000
CVE-2018-10244,0,0,87b877f1834f7e6e54019a805d6b5dc0c4f4374021737fa7ae57be5e904d4fef,2019-04-07T01:24:48.190000
CVE-2018-10244,0,1,4bb60ec008f032343bd62792cf96edfdce93226bbd029d819e1e37d8d0b2850f,2024-10-22T17:11:30.463000
CVE-2018-10245,0,0,8bae6774155e92f5cb720f0e2f763f381e2a1565088ccfec93c7ee7b948fd8e6,2018-05-18T17:06:54.793000
CVE-2018-10248,0,0,d20f22e2cafcc987233870942fc0f94f1531ddf23af0119f749ea3fa2683e488,2018-05-21T16:40:00.863000
CVE-2018-10249,0,0,b29ed9b3250171b089061b1f6a968f53655a0949f17ffaf296a30927c193d744,2018-05-22T15:00:55.567000
@ -135737,7 +135737,7 @@ CVE-2019-1862,0,0,73be23ed6169d16a07019413510f2ff1d6d9d5b23423727dad7c525ab7de7b
CVE-2019-18622,0,0,1df28778183d6abbb1e44ad7d65ccd139dbfd35d9b86ceb6618f6fa7cbf94666,2023-11-07T03:06:52.997000
CVE-2019-18623,0,0,2d88c594bd920a45844903bf885464713b1665aba2a35a43a772a8a355951563,2019-11-12T18:34:11.033000
CVE-2019-18624,0,0,96b8c4a6d8d884d1986dee07622e67462b6f07d15de4bee67bd69ed2ef6303d4,2023-11-07T03:06:53.063000
CVE-2019-18625,0,0,37126c8a682671b0ee96b0d7b511e31af3fab89b6d78665f184d4f9a2851de8e,2023-02-01T19:24:01.150000
CVE-2019-18625,0,1,2602f7b35c60fc7154aef534c6cf964c071202fef48802bb5fcae6f9f3c77eb1,2024-10-22T17:11:30.463000
CVE-2019-18626,0,0,2bcdd33e07732415d4f8d9d13f77081c7fae106c686a2a9db5ec78003bd95c89,2021-07-21T11:39:23.747000
CVE-2019-18628,0,0,0a6571bdb0039cb6bb9b503480f5259e0aae045b719f98155f82586e98649463,2021-03-05T19:25:03.187000
CVE-2019-18629,0,0,979ee48d22f2a4d7bf8f765069349736f6d5e8195e1cb3f2fca8dd5f2767917e,2021-03-11T16:21:42.453000
@ -135904,7 +135904,7 @@ CVE-2019-18786,0,0,f7b30acdbe06e41ba214eef680ff681b69fd3c81ecd62d74c7d2e45107f6b
CVE-2019-1879,0,0,b69bf614f656b8f53aaf6933887d8ce9a93223b5fcdc56f559ea8db64c4607f8,2019-10-09T23:48:25.037000
CVE-2019-18790,0,0,f3ae15afe951af3264c1f39856a167edc0b0d5f4bfd44be838869db02c5b4617,2022-05-13T20:56:27.693000
CVE-2019-18791,0,0,55a8db09b5493780b14bfe0dfd0cd0d7df9ca2af1963058224ac92556a1e1ee6,2020-02-20T21:24:25.883000
CVE-2019-18792,0,0,46f32578340cee54d6fe0b51c16149b3e6bb38c788ae10f87a59b61256799f01,2021-07-21T11:39:23.747000
CVE-2019-18792,0,1,b197a0f768336ae7cef9f470042e0204d0d7eb61a7e5ae1a80b5cefbb7b0ff06,2024-10-22T17:11:30.463000
CVE-2019-18793,0,0,388e575fd403449ea4ad2c57a93e31debdd0488e80101e71fbd65a8206a1cdae,2019-11-14T21:14:09.950000
CVE-2019-18794,0,0,ec2d73b58d3f046e284f4910595f05dff351ee3caddd343e457f2053f0491b1d,2020-10-27T15:28:24.953000
CVE-2019-18795,0,0,27f7ec1fb5dab54447ec2b6b844407921f47e51c0d432d565a938f6792e32e2b,2020-10-27T15:28:09.483000
@ -193038,6 +193038,8 @@ CVE-2022-23856,0,0,ee2cbc2426322388ff1afe7a44f2d91a7a9d83fba9914f637e37fe8ae0521
CVE-2022-23857,0,0,132a872c07af8d8c70261b35abca8d6a153a1859a711a2ed034df1a2f2ae9139,2022-01-27T16:14:04.917000
CVE-2022-23858,0,0,62f1f606d4b9efbf1631daba2d503d290be6f481e4bba2a8ebf7e52bf48393a1,2022-12-09T16:23:45.117000
CVE-2022-2386,0,0,09f49d4259c6ee996cc850650c207ec22add260b3b84ba16b896c572ed7d3292,2022-08-12T14:17:49.413000
CVE-2022-23861,1,1,749026e9e7284e0036f11dafc4b8939d74e8bac8ff9ef70ec728150a0c070436,2024-10-22T16:15:04.897000
CVE-2022-23862,1,1,474bfd48b6baee74958d3f1c9028db1fb9db25971396e5181791000be4d0e6c6,2024-10-22T16:15:05.443000
CVE-2022-23863,0,0,718dca3b438e5f32d08c79cae192ff7673ae1521722bf5bc5fb8ef6492a0b31b,2023-08-08T14:22:24.967000
CVE-2022-23865,0,0,34050304e0195f46e2f5ca23d58f867b7e2ee63ec6639e974e762ba109c518b8,2022-04-22T14:12:24.920000
CVE-2022-23868,0,0,c4621856d933568f66278364ad9aeb56e74477fa3255560a959f3a6c8b310a91,2022-04-04T19:47:02.100000
@ -196004,7 +196006,7 @@ CVE-2022-27413,0,0,1bf73e093b8cb62f8a3eea7413c4a9e4840f866988d4a524423fac3db666a
CVE-2022-27416,0,0,a4cd74f6cc29d3b41356401ea2184243259ce93cf3d00d4f6aa912918b191dca,2022-10-28T20:41:07.257000
CVE-2022-27418,0,0,0a070b71ad967ccfd186c4717efb3bff18a60fdc9c3ecc5dfda25532c46f2106,2022-10-28T20:41:04.007000
CVE-2022-27419,0,0,994eb171df1c6d10a249b0df989544ffdff3f15dd8299ac39a5cf0580d7a49a5,2022-04-20T16:56:24.287000
CVE-2022-2742,0,0,5fc39a3c7ce5b2f7a59724905065558dbd2c69828d2049d6cc525aedf20b8654,2023-08-08T14:22:24.967000
CVE-2022-2742,0,1,a932d6570b56bf449a11204706597e2b66019b2ee9d75e8e490fdabf3af66f97,2024-10-22T17:35:00.793000
CVE-2022-27420,0,0,a1aa723fc92f893c24e887fab41dfbb10b8f11940622b8f050ec7bc1279b9153,2022-05-11T17:21:57.457000
CVE-2022-27421,0,0,5b85d8359fc7d6211c1b9d8e72de55fe6685172d0646d9efa4d2e51f1d2107f5,2023-08-08T14:21:49.707000
CVE-2022-27422,0,0,fa18bf8ab1e0503ba3808aee3c3c27897296bc3ab8ac65353ffe66abaf3b7c2a,2022-04-25T13:47:36.867000
@ -196014,7 +196016,7 @@ CVE-2022-27426,0,0,0548985f0e764d200b000bacf7f46d2ba299dcbe47c9accfe9547c1a94db5
CVE-2022-27427,0,0,1414131cea9dc91f1d4275356915d7d04ce3229fc70cc9f37ee59bf12dd491f0,2023-11-07T03:45:19.823000
CVE-2022-27428,0,0,58081a02131b8ff72388ea2009b53ad9b1621e4927caed88d3d8c075db01789e,2022-05-05T15:57:55.750000
CVE-2022-27429,0,0,8526d66670571e284e4a1ab73cb4843dc69fcc0a9e7bcf356fa0c52ba68e1100,2022-05-05T16:27:20.627000
CVE-2022-2743,0,0,9142752b0c96fb10fbd0217ec3245362a5754f1b937e032c6bd20f233ad63a00,2023-01-09T19:15:51.240000
CVE-2022-2743,0,1,f5d5bbfe8868cb1452d5eb9dfc018b36b4b74554517421c5f361102aaa4892c1,2024-10-22T16:35:01.157000
CVE-2022-27431,0,0,154579f7591d92b17349e90e315fc1122ad1d1b36589287fbb93e13fad5c6a63,2022-05-11T17:22:52.137000
CVE-2022-27432,0,0,de8f1f5eca7a6676948cac20e35002ea53b59e39eda02c7765812169c7289366,2022-04-05T18:43:08.160000
CVE-2022-27434,0,0,f1d1791ccc358d257a78bfdc203bf6b4bfe96782793f84a355baa0d8ef9023f9,2022-07-25T17:03:12.943000
@ -204861,7 +204863,7 @@ CVE-2022-38416,0,0,4c73e953a11225a24c20f9776a984ed42b961ec60234b6e4a0cb1561e867d
CVE-2022-38417,0,0,840176ac21c9c444344f0342ce4bc4e880d17c981d0888310d9f150288c84d6b,2022-09-20T15:19:48.157000
CVE-2022-38418,0,0,00a17c017bdd87d314e60d0fc7e4c3f09124f453fe2417884ba9ba87f933ac97,2022-10-20T05:43:31.677000
CVE-2022-38419,0,0,5d77f6aa3cf64d420eb5281a0bc12c700e77e20f5118a72ec200f5f1b12fe8d0,2022-10-28T21:14:10.887000
CVE-2022-3842,0,0,7221468ae704f176204bc6cc11d92b87502254766612140d84194e7f10e672b1,2023-01-09T19:15:21.247000
CVE-2022-3842,0,1,7cbdb47dde7d69e968b83b2503f5bf65e4910ebe701998b5c810f3de325814c8,2024-10-22T16:35:03.307000
CVE-2022-38420,0,0,e5b829242cd03b9e2375aa26fea21efef5cec261d214c56c088be68999ef45ee,2022-10-20T05:43:52.483000
CVE-2022-38421,0,0,60078496dba3efc7b43c73646ee5f2777a706c1b4add7f448c40a16f0de2ea4a,2022-10-20T05:45:56.967000
CVE-2022-38422,0,0,89736a3c0b28118a69c809c62461820ed3ead456f40b0d4ad535e58644bdbe7c,2022-10-18T19:33:02.870000
@ -213176,7 +213178,7 @@ CVE-2023-0467,0,0,5293db8836d5f1db0e1f5096a27bcb1433113df02b237566a0e27a20f867bb
CVE-2023-0468,0,0,fc23fe7b9211a11b623bdbb98704e621a86f8b2f0533ceb11cc727e0c4cd8436,2023-02-01T15:59:27.927000
CVE-2023-0469,0,0,6431f6fc7e2739ba25419615ad75c75cd9e98861472093ca20181b196405f1eb,2023-02-01T15:58:49.477000
CVE-2023-0470,0,0,4372e365da241629623031d052bfbee0d3928a26394a28ee205196dbe80cd25b,2023-02-02T15:06:12.383000
CVE-2023-0471,0,0,60f2b40b3a409315e7e46b9dd1e93710adbb9ede6612853879ddbaa4345228fb,2023-02-06T21:42:57.417000
CVE-2023-0471,0,1,fe31042cd7a9895782885b55eee589dbac971a3346d8dd56bff42e357601f821,2024-10-22T16:35:06.327000
CVE-2023-0472,0,0,64dd50a5ea2446fcb9d9189b51a3c00d794a4e789c557bb0b545792ee3e7c83c,2024-10-17T18:35:03.323000
CVE-2023-0473,0,0,5d1af04a31dd707260ecab2c9353768ceb21646123f7b3879cf47f75e1e91417,2024-10-17T18:35:04.293000
CVE-2023-0474,0,0,ece696f628e220dfc0baf179fd456c53afb38a72b986a7e64878b873cda652ab,2024-10-17T19:35:08.023000
@ -214966,7 +214968,7 @@ CVE-2023-2056,0,0,54b0ae4fc04ec0efd7229c103683c2930ff5f831061e8f8ceca8837fbf3791
CVE-2023-20560,0,0,4456c42604e8d84ae78603bf586789653bea0524ed4db66bcab5e10c02482283,2023-08-23T16:40:28.757000
CVE-2023-20561,0,0,adb2c260938b34a6cde8cee152fee169eecac2ba79dc3b9a71cd7b36e9d93e73,2023-11-07T04:06:30.730000
CVE-2023-20562,0,0,9eeee6d306bcb80d680502ad0784b113531a741c9dcccd30c407f3009c019e87,2023-08-14T13:34:06.770000
CVE-2023-20563,0,1,dd4b2ef80961e24e6e0c52afc98605747bd7c93c54acc4af6034289012a21d6f,2024-10-22T14:35:09.970000
CVE-2023-20563,0,0,dd4b2ef80961e24e6e0c52afc98605747bd7c93c54acc4af6034289012a21d6f,2024-10-22T14:35:09.970000
CVE-2023-20564,0,0,f0eed53fdd20fbad0905e108323c57455e9bb8366a13da5465965e9996efc536,2023-08-23T16:40:10.780000
CVE-2023-20565,0,0,38e6dc11684c0b87d9a62fcc76a2d2c6c5d432536160483f1306ce67c812cd5e,2024-02-13T20:15:52.367000
CVE-2023-20566,0,0,3515285bb0a69e8d7ec99825e5edd97b207c54e2b670ad7975fd3e59b6698a90,2024-06-18T19:15:58.623000
@ -215188,9 +215190,9 @@ CVE-2023-2080,0,0,e157d4e828722bb0499442360051b052d8336e3a66b9f3d98184689a9dd2e7
CVE-2023-20800,0,0,84eb76953561aeedc870a53eb3e5c810f161a8e2002a06a8689cb690bddbdd65,2023-08-09T13:25:26.837000
CVE-2023-20801,0,0,3f54217e44d01e396e4e56936d1401bc5570f2f6ab2c31efd20c7ef5f222325f,2023-08-09T15:07:45.820000
CVE-2023-20802,0,0,b9dc75b05e578e1b1fdb4b7c06bf0ae88c71275a533562261263d991ebf95f25,2023-08-09T18:07:36.453000
CVE-2023-20803,0,0,0d39bcd6be5dabad2e56697a68c7e3070efd2b462171a0fedaa711175489ec24,2023-08-09T17:50:30.643000
CVE-2023-20804,0,0,695c81708d8ae757e2a5e603924e196473f450b47752bba9743fd3f220501f7f,2023-08-09T17:53:15.283000
CVE-2023-20805,0,0,0441a9b963b7630e6da3ad5f9177fe7390a9c99a0ddd358f8735bc89d884b020,2023-08-09T17:53:38.957000
CVE-2023-20803,0,1,812495a0c33694b1008949aaef6370c3b57e0d58b87accd7edcbbc20ee96ee97,2024-10-22T16:35:07.320000
CVE-2023-20804,0,1,8bba2d0119db4a30a7fc0cb32c01afb7e3897eb94df51aab93d98f3fc4e9468e,2024-10-22T16:35:08.190000
CVE-2023-20805,0,1,35002f2ad8a808fe8601a014ab5af840658aebf9423d776d785e03736f3a6eec,2024-10-22T16:35:08.963000
CVE-2023-20806,0,0,e1212d18c0511e7e8cfd4291bfa0ef21149391f80e70fb9ff2e09af2eb5b38b9,2023-08-09T17:37:27.713000
CVE-2023-20807,0,0,8fa020bbbe74f0a7562bc7d504b6ca273b75d7a6cfd0136f67da777af0db86d9,2023-08-09T17:27:57.637000
CVE-2023-20808,0,0,d3374bef82c5ae7d3411ac49d0b7398ed2ad5002fed4b42ae83978aa59a91864,2023-08-09T17:28:11.923000
@ -215199,9 +215201,9 @@ CVE-2023-20810,0,0,9014ffac7457887b984cb3fe9f4c15f8a4e5a4854f58d2ea4ec512300d59c
CVE-2023-20811,0,0,b7903ce0824ce66840540ea530849a85a5feb909ed92ce382f939556ece9d056,2023-08-09T17:51:24.253000
CVE-2023-20812,0,0,997b0dfa377e83e293eb8d659991d33a06fcae812808f0542463b5c449f0fe56,2023-08-09T17:50:43.650000
CVE-2023-20813,0,0,c2ea6a3a70781d7dbccf1526412ecec6c8f2b8be302634f666f379539f3700d6,2023-08-09T17:50:12.463000
CVE-2023-20814,0,1,6dcd7add0dff59884de8d97fc80f79cc2b080d1067c869103b251bdb5c0dd602,2024-10-22T15:35:01.240000
CVE-2023-20815,0,1,6d692414e91394080b5680d8d86c875846bd3ff0b72992a007a21ff563cf950d,2024-10-22T15:35:03.147000
CVE-2023-20816,0,1,1131530cf748ec967a8d5cafdb57ba7a8ec9f43133a3b610c26506688bc02973,2024-10-22T15:35:04.463000
CVE-2023-20814,0,0,6dcd7add0dff59884de8d97fc80f79cc2b080d1067c869103b251bdb5c0dd602,2024-10-22T15:35:01.240000
CVE-2023-20815,0,0,6d692414e91394080b5680d8d86c875846bd3ff0b72992a007a21ff563cf950d,2024-10-22T15:35:03.147000
CVE-2023-20816,0,0,1131530cf748ec967a8d5cafdb57ba7a8ec9f43133a3b610c26506688bc02973,2024-10-22T15:35:04.463000
CVE-2023-20817,0,0,58f94f12dbbd27ecff4c9c45f02bb5c66ca030778a1e43a6c1041583e7476d0a,2024-10-16T21:35:01.640000
CVE-2023-20818,0,0,45ae32b47377e91ea351a73468b41994cd1d3b4ec51c18c8865d863ed741c606,2023-08-09T17:49:30.607000
CVE-2023-20819,0,0,c056b87b2ebed256b5107aaf5ce311d220de95b3b3db7b11c4effe7a4eed0352,2024-09-21T16:35:01.573000
@ -220850,8 +220852,8 @@ CVE-2023-27599,0,0,a6d493ce8131b697a60ae09913019e12914de5421c806a4015a87c94c254e
CVE-2023-2760,0,0,6c074bf21b2267cd8b569941c67b08360124783f809d3989660a823d47cbf8cc,2023-08-09T11:15:10.280000
CVE-2023-27600,0,0,87e67c606dcb11cbbd6ceba8eb248743b1a9a333ff1372c202bb946110f83bab,2023-11-07T04:10:01.763000
CVE-2023-27601,0,0,3159e0a53214d6adf345915c747947d8090757989992077eaa4e4c5257b56321,2023-11-07T04:10:01.887000
CVE-2023-27602,0,0,a80eb5b45c9f4866e932d81fc2716a823c094986ad855f7d67ed615e5137a95d,2023-04-19T12:15:08.170000
CVE-2023-27603,0,0,377363bd944721b07ea3da5dcb27d355b62defd8ba2523bcd4d0bea48c169f2a,2023-04-14T19:45:47.010000
CVE-2023-27602,0,1,7f58c60ee3e1d01b2a0a080305043c4d403e5bc65d7e63a6526fb0172f83382f,2024-10-22T16:35:09.767000
CVE-2023-27603,0,1,4f0435dc38032ab417293eac3e5fff2c23f0739a53b3285705d573a4f3084368,2024-10-22T16:35:10
CVE-2023-27604,0,0,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000
CVE-2023-27605,0,0,3c9bd67e7bbc5a970176fa36f2ef3e0bf73a6762632ef035cc42d3a510e378f7,2023-11-10T04:20:00.893000
CVE-2023-27606,0,0,df5a64e8dccf8b9593928c54f55b0be768a1ad798eb4d0e828b503915ddf62a6,2023-07-26T01:18:52.087000
@ -221852,12 +221854,12 @@ CVE-2023-28702,0,0,322458dc5ce1af990637dfdbb194b4657a53e64709918a6959ad0e26b5d90
CVE-2023-28703,0,0,0f0cebf3a82254d0f256f8ee7ad05786e89f280679305fc77b9a10a202724da0,2024-10-14T04:15:03.210000
CVE-2023-28704,0,0,0ea96abeac4099eb6f8aeff445b717c3ff853eb5b66e71b0c3097300ad8383c5,2024-10-14T04:15:04.400000
CVE-2023-28705,0,0,875ee5eeedcbaf87184e53272462439379c1e8baf901ebbbb714e99fd79f0ba9,2023-06-09T18:14:13.487000
CVE-2023-28706,0,0,dc130697d6700e0efa045bdf171c1153dcc9ec2ee4acf2311f07dc982e547c07,2023-04-14T14:23:05.247000
CVE-2023-28706,0,1,50e6020734b1331e0a1f6818c44fa8ed0422882143ec83bad7c87bb811eda5e9,2024-10-22T16:35:10.210000
CVE-2023-28707,0,0,32d4d4aa6f7aca5e473a1393c06496a21c3a1ef5446c39d4c4403f8b4eeb5898,2023-05-22T14:25:13.693000
CVE-2023-28708,0,0,3676b37bd572d293623b1d4d6062d80511a32f4ec94735432036b13d40cac96c,2023-11-07T04:10:49.370000
CVE-2023-28709,0,0,4a374603268a75183fc4d8867975e646438b75b17cc4c5fec221f049409c16f9,2024-02-16T18:20:07.610000
CVE-2023-2871,0,0,c547a7e85685136989871db883e9d8714fc66f889d110c2bfa95d6061d7e85d5,2024-05-17T02:23:19.727000
CVE-2023-28710,0,0,2f4b323b169897caec0db40f0c6a1cf0096b492a8b3486a44a95ac5973ca18ef,2023-05-22T14:27:01.200000
CVE-2023-28710,0,1,dcae631d3021e39c45fade16b16079aaa2ed37dd596cab7edaa89a5e7ae291a1,2024-10-22T16:35:10.403000
CVE-2023-28711,0,0,9a7e4692df4128407920abfd535c6e1e6ea2e2404eb6b544486446f8035d5a81,2023-11-07T04:10:49.447000
CVE-2023-28712,0,0,48cede95267e940bcf25c0c4d4718d225f1a658760a29a9cf30284758c8924a6,2023-11-07T04:10:49.617000
CVE-2023-28713,0,0,2fb09d63fae7527d1926c34ea4251376e037b7841aef4deb35a0f81acbe0ed9f,2023-06-08T13:48:05.117000
@ -222299,8 +222301,8 @@ CVE-2023-29211,0,0,2f68aae87949c796385b01b5a1828d70058a84385271f8341622722895713
CVE-2023-29212,0,0,d1d948d2138c9038dd86dcfdab359a9afdc8b5b5d4ffdcdddb4e37c09c70c30a,2023-04-26T17:12:14.490000
CVE-2023-29213,0,0,a25e4927a17f1e3b6df251fc7f8769e82929bf598e6fcab652dcd30076d4cdee,2023-05-01T14:02:43.807000
CVE-2023-29214,0,0,aa2db31df8e86921819cb9df437c39aa49cc88918aafea9d75db6fa572adfc11,2023-04-26T17:15:26.733000
CVE-2023-29215,0,0,113754a56d453439fcebbf0d0595ee494fc1b07e85a146a8ee877fb1d01314af,2023-04-13T18:16:08.277000
CVE-2023-29216,0,0,f5704f274fc731df73cbc78eafa55d0050624eea034d6f99ba0964a551f20424,2023-04-13T18:16:11.797000
CVE-2023-29215,0,1,5590d54e81ae1c83de926af549ae4ac3ee0f39fa9770392675cd5db1fda940c1,2024-10-22T16:35:10.597000
CVE-2023-29216,0,1,ad17386fe196604182cfbf47617270a55c1cd069baf7ebbbdd2007698983ae9f,2024-10-22T16:35:10.780000
CVE-2023-29218,0,0,f0282ad8b79cf1bdf860a3575a9a1f598b5604e413bb0608665168800ec76fcc,2024-08-02T14:15:36.417000
CVE-2023-2922,0,0,dc553e71f409f86d2a4e6ca968907fb5462b18e5250b3d03aaf8c3ecb44348a3,2024-05-17T02:23:21.983000
CVE-2023-2923,0,0,55b078298b1195eec01fa938b8be7af85cb16ffb5c08d0c140893148b20a51e4,2024-05-17T02:23:22.090000
@ -223068,7 +223070,7 @@ CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05
CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000
CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31
CVE-2023-30464,0,0,2219fe2a351a90ed5b4baf0c5b582d478e2ecc8c75596249eb60867c38157102,2024-09-20T12:30:17.483000
CVE-2023-30465,0,0,03cb642b9d155b8fc540b2b5aab3b36429c8caf9db77ee091c34798766c54d43,2023-04-18T19:30:08.003000
CVE-2023-30465,0,1,bbb66a417528962547f13dd5a5d32638f3c72abdeaabce4152de7f7162625c60,2024-10-22T16:35:10.960000
CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000
CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000
CVE-2023-30469,0,0,fa32fed5bcf318ec6dc93737679b329fee275c0b22116985f699a53971c9b865,2023-05-30T16:56:04.817000
@ -230767,7 +230769,7 @@ CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de
CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000
CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000
CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000
CVE-2023-4046,0,0,64889660c90ed96dffb36b392dad990b52f684e74bc2a30c683852e7a3354c73,2024-10-21T19:24:02.230000
CVE-2023-4046,0,1,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000
CVE-2023-40460,0,0,cb8d4a4b518509c4362ccb8f0afbc3d4ba81059d0c319d00ce1a78f314f5df45,2023-12-08T15:47:41.403000
CVE-2023-40461,0,0,2ca71e2d74941f7db08d3ae15972c35f65a7a1c0b913d4173afa994ddac5a43a,2023-12-08T15:47:23.163000
CVE-2023-40462,0,0,ffd7cbc54880373ae62e24016d5dd35693f5e2718a1f76f9f7406aa53c66dcee,2024-02-02T03:12:25.617000
@ -230776,7 +230778,7 @@ CVE-2023-40464,0,0,8231b0c451d5b4c35d027e1b67bba80c7df83e1e1ad17ab04a2494355e768
CVE-2023-40465,0,0,c70021b90b2721ff443a40c1111bf31fef348ab6ba2a7cf6bbcd8bc7822299fa,2023-12-08T15:44:51.933000
CVE-2023-40468,0,0,7d84164a8bc2564940a981b796397726ff721c6aa0efdcb2152db15cd7184661,2024-05-03T12:50:12.213000
CVE-2023-40469,0,0,0ed69cdce8225d95cfae6682abc1ebaf65719f0b970e047791ac57fa9c47f189,2024-05-03T12:50:12.213000
CVE-2023-4047,0,0,53121fc9835c528f43f4e27d812b5d6ec5056bccf0b3eefdb432f2299f21732b,2024-10-21T19:24:02.230000
CVE-2023-4047,0,1,f5052efbca7ab9c1a8858a3fd8dd92e74171735df43efce1d062d82505d9c615,2024-10-22T16:35:15.043000
CVE-2023-40470,0,0,afada78b6007b2ba33bbf78e11be4d28f3cd22e160c8e61f962a7cebd7f52155,2024-05-03T12:50:12.213000
CVE-2023-40471,0,0,becbb43c9e1a564fe69963a88bb1087ad0f2669a388b9f3e94466c56f3f010c0,2024-05-03T12:50:12.213000
CVE-2023-40472,0,0,63bad795c4e37646c5a06e5ac3ca24cbaa679ad10a3550f3f51a2397791e5a38,2024-05-03T12:50:12.213000
@ -230855,7 +230857,7 @@ CVE-2023-40546,0,0,6ddbdc19841f6cb290ec2b905e60bc26911fc88c11de04bc8a7d662cb4831
CVE-2023-40547,0,0,aa8c5d2793a75f3ad9a6a915b845d7aafd35608216f0b3f68592a1e5df2bf1b7,2024-09-16T19:16:05.947000
CVE-2023-40548,0,0,dac643ade65c1a191d65ee168a845e302723e7116b47e0d5a4611a62d6447ec0,2024-10-01T14:15:04.700000
CVE-2023-40549,0,0,409bbcdd4cb8887d85ad6922d10081d4ffe6d9a4dd03532a76d9c9a92dc5fdfe,2024-09-16T19:16:06.287000
CVE-2023-4055,0,1,b9a4e2db898bc031a0ef53e359c900d9555e4306b85b3b351cd9251ac09e8ea9,2024-10-22T15:35:10.980000
CVE-2023-4055,0,0,b9a4e2db898bc031a0ef53e359c900d9555e4306b85b3b351cd9251ac09e8ea9,2024-10-22T15:35:10.980000
CVE-2023-40550,0,0,7e315e619d697d87543604bbff3ef14f7418177adad4c5f0a7f3c6da81e8e2d8,2024-09-16T19:16:06.450000
CVE-2023-40551,0,0,6015c82d4677150430822f1faf7d1f0c96ba6952a50dbabd6ada6225e4354973,2024-09-16T19:16:06.617000
CVE-2023-40552,0,0,7fe5ec65193750dbc75f8e72724337bc87d791c5b7214d5dca88292f9d38f754,2023-09-08T21:27:56.877000
@ -234067,7 +234069,7 @@ CVE-2023-45227,0,0,7c7fed76f5d6f3f983df94e726ce31f0b6abeb62d3e6e5afe70912aaeb076
CVE-2023-45228,0,0,f02fdcfce96931a7d3db28875f2dc518b6b7078552506dc86bdb01d18b405427,2023-11-07T19:55:08.333000
CVE-2023-45229,0,0,cfaecc5ce62d696bb446e9b9bba91809f04e1c9f10c9dafb0c3a45094e4067fc,2024-03-07T17:15:10
CVE-2023-4523,0,0,fee4617c65a2bd08463915b79320fa3a3d5417de90db274caa3a49dbf29f46ee,2023-09-29T15:39:05.767000
CVE-2023-45230,0,0,a73057134b61994748454c25fbd687353eb456bbb28ed90a55327c6e09f91765,2024-03-13T02:15:50.157000
CVE-2023-45230,0,1,bbc1e53c454be3b8c6530fef54817baece3c9aa241f0307f93c1b246c2ce29d7,2024-10-22T16:35:13.497000
CVE-2023-45231,0,0,c61d6f99e6b778ffd053ed865b56d4aa4b5f162b3b6cc8b456aa5c715886fd2f,2024-03-13T02:15:50.267000
CVE-2023-45232,0,0,ba5e4efd7c8898ba0a2188a57de8bee02b9050addc3e17693fe94e84c3cdd92c,2024-03-13T02:15:50.347000
CVE-2023-45233,0,0,5568807a60c17e2c0ea160a468109a8a204b479c5ab85e97fd6742059d0f249a,2024-03-13T02:15:50.430000
@ -237206,11 +237208,11 @@ CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d
CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000
CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000
CVE-2023-49566,0,0,5d41a2822babeb9ec619211692e91f45235cebac1ffc90794234a82a955c5d4a,2024-07-16T18:06:05.347000
CVE-2023-49567,0,0,ff5ffedfcb0ff47ec9991291d86d1977abfb466c3e4224ac1c244bb7fa00587b,2024-10-18T12:52:33.507000
CVE-2023-49567,0,1,193003fcd251d5cde9b049285c29ecf9c4d7248fd85a0cdba0232bb4efc2a37b,2024-10-22T16:39:16.370000
CVE-2023-49568,0,0,e295bf606e29529c11cbbb43abed02bc4423081c2a4c69be87e7b9161aed1898,2024-01-22T17:57:41.193000
CVE-2023-49569,0,0,d61d891c4a84c41eb74d9a85c11d68d30d185ae64e4fcddc4c6e7a3912a15d45,2024-01-22T18:57:03.500000
CVE-2023-4957,0,0,78bb0460b3b0f290da79e035e030dce6be4d514bdd0094dcadf90329259b779e,2023-10-16T14:08:22.900000
CVE-2023-49570,0,0,fea19fe915958a084bac97051d0a9ebf8bdcfca1a5036a510423c9e45bb2b03a,2024-10-18T12:52:33.507000
CVE-2023-49570,0,1,f9c7afa434c2b7ac368bce0c36b013ee7d74936062ec20ef84b72c339b1cff41,2024-10-22T16:26:47.317000
CVE-2023-49572,0,0,887de86a687a05ec36d54a2019258a2d8d5e1fc1dbf8ea3bc3a57b5c0467ed12,2024-05-24T18:09:20.027000
CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb7a7,2024-05-24T18:09:20.027000
CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000
@ -239195,7 +239197,7 @@ CVE-2023-52527,0,0,69feac5279ad296f8c62382461ed563ed5c37ec9a4e9995105c7b03fe18dc
CVE-2023-52528,0,0,939a0919c11a416fb09ccd94fbb4242c3c2cc2c0f74810e24bf07ad99dd62190,2024-03-04T13:58:23.447000
CVE-2023-52529,0,0,6fb710ab675e24c4b60b90f8d390bdf0e7583f3fe7abc5ad6111bd5320ab77c9,2024-03-04T13:58:23.447000
CVE-2023-5253,0,0,c4802b58efe25a55292e2d6161746d1a3fe4c3cf13d24e9ae30c1e6051f46d20,2024-09-20T12:15:04.893000
CVE-2023-52530,0,1,5dfdd9ed8b100e234def8ab6e010dd78e03325be3a4ad9ebc534334c0163f6c2,2024-10-22T15:15:04.720000
CVE-2023-52530,0,0,5dfdd9ed8b100e234def8ab6e010dd78e03325be3a4ad9ebc534334c0163f6c2,2024-10-22T15:15:04.720000
CVE-2023-52531,0,0,139c545d33ba10eb3343fe2ebed8bb6f85f222cd821926b67d690a1cf30ff498,2024-03-04T13:58:23.447000
CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbfcfe,2024-03-04T13:58:23.447000
CVE-2023-52533,0,0,87288d9acffdcc3f04e0528abc716d93f9a78d72735b2ac13e2dfefa20c9889c,2024-08-26T18:35:02.780000
@ -239838,7 +239840,7 @@ CVE-2023-5512,0,0,8f255f7600c876ac3f257539ecd63ba70ffd31d409fa952e6e1e6acca138ee
CVE-2023-5514,0,0,10af8b6b0b626b561055de6189ef81fc4a75e29fab24339af80cb860ca2be855,2023-11-08T19:36:35.017000
CVE-2023-5515,0,0,91a527d8a3473e517c634177c09d7c6152b47b2cca5db6d0f913eaea36a318d5,2023-11-08T19:28:26.543000
CVE-2023-5516,0,0,ae73e4c23390248a1b340b12bd6e20a04e577dbe67f7bc8cbdc1d9c665aad45e,2023-11-08T19:40:16.980000
CVE-2023-5517,0,1,07678d2620e60845134465e7e5fab8c3a80cca0b955caa42a72c363e07e4029c,2024-10-22T14:09:02.430000
CVE-2023-5517,0,0,07678d2620e60845134465e7e5fab8c3a80cca0b955caa42a72c363e07e4029c,2024-10-22T14:09:02.430000
CVE-2023-5519,0,0,37aee9a1129923dc93077477efa909f5ba6fdcb7802f73bac61f5648f04e8d65,2023-11-08T18:43:21.643000
CVE-2023-5520,0,0,844f3dfeec17b0f2ef7eb23244c5ae362e4682ab16bd653f8e0d489e8a8f6789,2023-10-13T15:13:36.757000
CVE-2023-5521,0,0,b63acfc129aa3310a98a296c6b047b557f6d4d113cf2debba604fa2d54e6d526,2023-10-13T18:07:46.757000
@ -240341,10 +240343,10 @@ CVE-2023-6051,0,0,65166b01dd71515312d91f9d8071d445b248393f92fbfdc73dd7007d9755f5
CVE-2023-6052,0,0,aade2b22db5b4363b4735382f3bc2b9b7b67324ff9b0a0e43ebe15be0d76ef4d,2024-05-17T02:33:29.807000
CVE-2023-6053,0,0,884dd7c884b65418d1acc2ea8b654cbf552035c51290cebacf8d437558597e99,2024-05-17T02:33:29.920000
CVE-2023-6054,0,0,7c33b8bac31ea414624bbc9ce8995053ec355ffc65ef3213af66e1a1cc5d7096,2024-05-17T02:33:30.020000
CVE-2023-6055,0,0,503fb1072d5a69bee0e88b6ae09189645d07260e6713968dc7d0b8a2bcedf0e4,2024-10-18T12:52:33.507000
CVE-2023-6056,0,0,35d839e4b514b3336d1caecfe0eacb81ca28eb93db0edbbeacdf9c775d9824ca,2024-10-18T12:52:33.507000
CVE-2023-6057,0,1,1aba22158a7c27687aeda258fc29ab23338195d15e7a82e758cfc8a4d5d0deed,2024-10-22T16:00:07.397000
CVE-2023-6058,0,1,80b121b51cef55262f44ff47427075372eaef5bede566f19f4a29d78d39ee80e,2024-10-22T16:00:05.110000
CVE-2023-6055,0,1,6970d6e1cef11b5752b3c4584db2d30f4d434e7f6ccb260e2dbefee021b56d87,2024-10-22T16:39:00.817000
CVE-2023-6056,0,1,5d12957ae6e26dc96870feff725dddb10442b06c2d23031fc39cc9503665774e,2024-10-22T16:38:43.993000
CVE-2023-6057,0,1,bbbddfe2749236535590b210661fb2a64529bd853ca807d86fb37af1e80984cf,2024-10-22T16:38:29.767000
CVE-2023-6058,0,0,80b121b51cef55262f44ff47427075372eaef5bede566f19f4a29d78d39ee80e,2024-10-22T16:00:05.110000
CVE-2023-6061,0,0,3668adbae0969cfab0fed96f2f0cd588b0f30acaede83213c351da7fed813869,2023-12-12T22:24:14.313000
CVE-2023-6062,0,0,9acfdc2e379d5c765b916ddaf4e9e4b9e3e002ce20adb1082d4167d6fe0776c5,2023-11-29T18:01:56.163000
CVE-2023-6063,0,0,6829cec6327e2b0ca6394f26a21b2458a09f31b0b2f6c2afeecc6087b47b68d1,2023-12-08T14:39:22.200000
@ -241001,7 +241003,7 @@ CVE-2023-6815,0,0,fc9ec2453f06f961274a47b9ea9b7407d5368b76455379c9e0fea030732b21
CVE-2023-6816,0,0,c3a19bc55b4b85fddd22fe1085c1d2a08de0931d91570a7c34012695db8c4bb7,2024-09-16T16:15:11.937000
CVE-2023-6817,0,0,cc201b8683c94f706ae74ea5adc28642e020b44ac49d90e4b25ea49578f8bc79,2024-02-08T16:15:47.270000
CVE-2023-6821,0,0,1ecc3c576162236f32f9f64a56f7295ad830704c5fedf9bc87d6ba759b1f7e3e,2024-08-30T08:15:04.520000
CVE-2023-6824,0,0,317fcb7097041988b3396911807cb287d8657125154b4a375fa0829093889531,2024-01-23T15:35:27.123000
CVE-2023-6824,0,1,76df22784ddc4346f4c678b2af0f6a7ab56f1620c7e41a3d47c4be80e64c0eb6,2024-10-22T16:35:16.083000
CVE-2023-6825,0,0,5f2a6b8900d2ecb14567d0b430ce60a11b72adf0d920af3176450139cc927b08,2024-03-13T18:16:18.563000
CVE-2023-6826,0,0,0b04535adf04b35ffa25089a607bb4494dc5795922b9225750066cd0ade8775d,2023-12-21T04:49:03.117000
CVE-2023-6827,0,0,4fbb204335c244872e27df049bcd8cac30f890d15a7027d76fef2150fca5baaf,2023-12-21T04:48:37.823000
@ -242333,20 +242335,20 @@ CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02
CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000
CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000
CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000
CVE-2024-10055,0,0,6d434f327f323d1d4e7933b0f8db3edb29a6b4c6a11d2f352406cae112cfb5b5,2024-10-18T12:52:33.507000
CVE-2024-10055,0,1,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000
CVE-2024-10057,0,0,d8a525e53057703eafafe41b97e25f6595177cb8b862a21217c338a0239a3d3c,2024-10-21T20:53:22.813000
CVE-2024-1006,0,0,fe82f3d0065ffa9f2a59eb5b63e144d9442dc24b73dc23626043d548cf903e88,2024-05-17T02:35:09.467000
CVE-2024-10068,0,0,d30a41a047eea99fec87733a3e9cf71e01923d623f7bff84eb08ba80a39dc81d,2024-10-18T12:52:33.507000
CVE-2024-10069,0,1,5308eb4b652321f9c21627eaa2c30eba36d3e9bdb3c6dfdf40bec48a4f82c2f3,2024-10-22T14:19:58.970000
CVE-2024-10069,0,0,5308eb4b652321f9c21627eaa2c30eba36d3e9bdb3c6dfdf40bec48a4f82c2f3,2024-10-22T14:19:58.970000
CVE-2024-1007,0,0,bb97efced7fb486712fbb95488bae5086c8742bff2dc7feb7593b966188b1cd7,2024-05-17T02:35:09.577000
CVE-2024-10070,0,1,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552301,2024-10-22T14:19:40.597000
CVE-2024-10071,0,1,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000
CVE-2024-10072,0,1,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000
CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552301,2024-10-22T14:19:40.597000
CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000
CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000
CVE-2024-10073,0,0,36e7a75e8440250867ac4ab2920540c9c319ac3650023a2029f396b9acec7ea2,2024-10-18T12:52:33.507000
CVE-2024-10078,0,0,0aa7dd836d17776d3cafdf2b21a76b868a43535c39ebfa97d22b166c12681f1e,2024-10-18T12:52:33.507000
CVE-2024-10079,0,0,16baef55e86d7a7bb7c75a8d8bda456345b338a1ddd8fc352492983721ca02a2,2024-10-18T12:52:33.507000
CVE-2024-10078,0,1,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000
CVE-2024-10079,0,1,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000
CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000
CVE-2024-10080,0,0,7dee1bdb0654db1839e6846f51c6c9699dc09bcdb5e7141706a72d57a008f278,2024-10-18T12:52:33.507000
CVE-2024-10080,0,1,e70a3cc8d8ca25d9e3db818c04f9b2eeee833bf342884de7579048a734fce30e,2024-10-22T16:27:38.840000
CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000
CVE-2024-10093,0,0,655dbc008c9c21b76c775eaa92108777c983716e956bf10f0085a4f9c49fc737,2024-10-18T12:52:33.507000
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
@ -242367,31 +242369,31 @@ CVE-2024-10128,0,0,88b9e310a7215917b3c3eb4a7cebbad5131b0eb240c8e3b152a59db372aef
CVE-2024-10129,0,0,ec801a1f21eba257d935123cd915f870568d53f742fe5aad47c455a4df207feb,2024-10-21T17:10:22.857000
CVE-2024-1013,0,0,0ecf415fc1e3c9674ce36da20d6e67872f02747822a72b780ad0899083ff5765,2024-03-18T12:38:25.490000
CVE-2024-10130,0,0,f6abde51c0a658ac0c1fc5543e76399ba5cf9030b2bf4a0d9258eaf9b51a8cfc,2024-10-21T17:10:22.857000
CVE-2024-10131,0,0,cb9bf9653b1a7751e7f0fa889c2a9d1f6f68f80fbc6fe883721d1af8aab5c345,2024-10-21T17:10:22.857000
CVE-2024-10131,0,1,f20c36c39f167240341b3ceff4ad8596e0ac95c8a6ba4794f233acebd21cebe5,2024-10-22T17:15:03.203000
CVE-2024-10133,0,0,6ac712da64da44a34e6fd349fcf3c834370a70c72d69b9a548fcaa7d1fe57ffa,2024-10-21T17:10:22.857000
CVE-2024-10134,0,0,6267065d9c293b3c2366b6219e1002e933ab90f824c948f3e215158bad3a34cd,2024-10-21T17:10:22.857000
CVE-2024-10135,0,0,51210d7ceeda6ad57adce141fb0fe5d97f34f2c51cfc509b6b738e19f13616dc,2024-10-21T17:09:45.417000
CVE-2024-10136,0,1,17790ffc426ba3f464e327ab05c0c6d36879047b0c8e0a5cf0c1c4a40c857210,2024-10-22T14:15:48.770000
CVE-2024-10137,0,1,bf8dc737c8c1bd8d279f07a2951d8a27fe63f941562664fe26ac2d8ba987f2ed,2024-10-22T14:17:31.527000
CVE-2024-10138,0,1,96b8afb0bc9d868623cd6816cbcb5468c3586235a65dd6af646eb37bb10ccc7b,2024-10-22T14:16:51.547000
CVE-2024-10139,0,1,11c32ddb1edfb399f29c4753543b82ea66d92ffc686e3d29b4d68af5ac18b5a1,2024-10-22T14:18:12.087000
CVE-2024-10136,0,0,17790ffc426ba3f464e327ab05c0c6d36879047b0c8e0a5cf0c1c4a40c857210,2024-10-22T14:15:48.770000
CVE-2024-10137,0,0,bf8dc737c8c1bd8d279f07a2951d8a27fe63f941562664fe26ac2d8ba987f2ed,2024-10-22T14:17:31.527000
CVE-2024-10138,0,0,96b8afb0bc9d868623cd6816cbcb5468c3586235a65dd6af646eb37bb10ccc7b,2024-10-22T14:16:51.547000
CVE-2024-10139,0,0,11c32ddb1edfb399f29c4753543b82ea66d92ffc686e3d29b4d68af5ac18b5a1,2024-10-22T14:18:12.087000
CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f3d,2024-02-02T02:05:39.277000
CVE-2024-10140,0,1,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000
CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000
CVE-2024-10141,0,0,17ce1823f9e1032ce4106436ffa20ca67724ebc3ab8b7874ba66330fada06176,2024-10-21T17:09:45.417000
CVE-2024-10142,0,0,20f3ea99900130160c805394b66019c49272761905b5ea7376caa328a388d2ce,2024-10-21T17:09:45.417000
CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000
CVE-2024-10153,0,1,d622b7ea723b18e6ddfc603f2d4acbb1cff3ff02ebe01257835c2e3461165bac,2024-10-22T14:45:04.670000
CVE-2024-10154,0,1,616a267b44cd60e0ee1735747cba3df9611277c523e780e0ba795002232a909b,2024-10-22T14:44:47.807000
CVE-2024-10155,0,1,d9565565ebd915b9f68cad2dcd8279d89c17488c917f6907534ebb29d04e2fbe,2024-10-22T14:43:42.607000
CVE-2024-10156,0,1,e7f7dbdd558e322e118e7fbce1ba5a75a62d9fa9230b1cef9eb640b274347653,2024-10-22T14:43:00.543000
CVE-2024-10157,0,1,41d9478b3d49e83e6a480f35d8b281656c1266c3ead7379556d3206c6aee4532,2024-10-22T14:42:50.303000
CVE-2024-10158,0,1,4420764b4d9615ea34b62e6a53bef5880d7c140640aa851325cc7eb63df30b43,2024-10-22T14:42:26.727000
CVE-2024-10159,0,1,915dc857f17f9d43c3b78ff8b89ebd3822f1a0e5595f8c164f6b910ba78894d6,2024-10-22T14:41:34.370000
CVE-2024-10153,0,0,d622b7ea723b18e6ddfc603f2d4acbb1cff3ff02ebe01257835c2e3461165bac,2024-10-22T14:45:04.670000
CVE-2024-10154,0,0,616a267b44cd60e0ee1735747cba3df9611277c523e780e0ba795002232a909b,2024-10-22T14:44:47.807000
CVE-2024-10155,0,0,d9565565ebd915b9f68cad2dcd8279d89c17488c917f6907534ebb29d04e2fbe,2024-10-22T14:43:42.607000
CVE-2024-10156,0,0,e7f7dbdd558e322e118e7fbce1ba5a75a62d9fa9230b1cef9eb640b274347653,2024-10-22T14:43:00.543000
CVE-2024-10157,0,0,41d9478b3d49e83e6a480f35d8b281656c1266c3ead7379556d3206c6aee4532,2024-10-22T14:42:50.303000
CVE-2024-10158,0,0,4420764b4d9615ea34b62e6a53bef5880d7c140640aa851325cc7eb63df30b43,2024-10-22T14:42:26.727000
CVE-2024-10159,0,0,915dc857f17f9d43c3b78ff8b89ebd3822f1a0e5595f8c164f6b910ba78894d6,2024-10-22T14:41:34.370000
CVE-2024-1016,0,0,71cf76ab1a6b276906d8ecf764cf0be1d15a9c7c60543569d9e172588701616f,2024-05-17T02:35:10.520000
CVE-2024-10160,0,1,4bd6666e6debc93b42554314b916c7e4a6c32f93acbe48afa502cc48d2414808,2024-10-22T14:40:46.790000
CVE-2024-10160,0,0,4bd6666e6debc93b42554314b916c7e4a6c32f93acbe48afa502cc48d2414808,2024-10-22T14:40:46.790000
CVE-2024-10161,0,0,84bc31c1f8b9c1424a33f38beb007afd12cef556097f836456e7db6854141f50,2024-10-21T21:35:33.377000
CVE-2024-10162,0,0,9586e193571470cd409c779979783fe30cf8798f29cade742d2c6e6b9b66240c,2024-10-21T21:36:10.470000
CVE-2024-10163,0,1,26289a38ca28d6fbf3697cebc7b8e78d717fbaa250d69c3062759b06a1925c3b,2024-10-22T14:28:06.173000
CVE-2024-10163,0,0,26289a38ca28d6fbf3697cebc7b8e78d717fbaa250d69c3062759b06a1925c3b,2024-10-22T14:28:06.173000
CVE-2024-10165,0,0,5e96b8bac045d76007a8a1ccaf66b23094bbe577806718f5c39b95850bfcb648,2024-10-21T21:35:06.987000
CVE-2024-10166,0,0,d38e0eaedffd343f532bd4c1abf13dec4f7eece79809104c00c35d23c5bd77f6,2024-10-21T21:34:52.430000
CVE-2024-10167,0,0,e7ee4350c0d87b98f4009c350ce488d1222a8473f5eed0163be4fcf02375526f,2024-10-21T21:34:25.810000
@ -242399,19 +242401,19 @@ CVE-2024-10169,0,0,e8e6c9fb9383945c3d410fc4f008280f899970c875613eff84d409b4d2eaf
CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc058119760,2024-05-17T02:35:10.627000
CVE-2024-10170,0,0,43858dc94e553ea996e2f62171c2a07580bf4384f9d10283ecd355d244289e84,2024-10-21T21:33:49.663000
CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5aea60,2024-10-21T21:33:26.937000
CVE-2024-10173,0,0,f6c48dfe45f526ea19e91b20ef708b171d9e0a76591dad105e56c584bb12efdc,2024-10-21T17:09:45.417000
CVE-2024-10173,0,1,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000
CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000
CVE-2024-10189,0,0,ffc755e96982501f804ab166cd12d0605832a17249527107c82c3cd65a58ebf1,2024-10-22T10:15:03.610000
CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000
CVE-2024-10191,0,1,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000
CVE-2024-10192,0,1,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000
CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000
CVE-2024-10192,0,0,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000
CVE-2024-10193,0,0,1edc42ac3209c75585ec8c6b26eafba6b0b9f2d61f9e6b3760f20c0ded29aa99,2024-10-21T17:09:45.417000
CVE-2024-10194,0,0,2306506683b8321312c529c12d5538fdae946fec3d958eb6a86af3539ec3be4d,2024-10-21T17:09:45.417000
CVE-2024-10195,0,0,433002dc4be76148bf0f1e8e85e5de7bd9f18de30e21fefcd1f30061067a4930,2024-10-21T17:09:45.417000
CVE-2024-10196,0,0,0b052761dda527c9d578bdd237c16d6bdaa0a843794729a716c520574b82f796,2024-10-21T17:09:45.417000
CVE-2024-10197,0,0,6fe37138acc52d09938e9bcb1e310dbdb2ac9977a35ddc0fec14852ea89360e5,2024-10-21T17:09:45.417000
CVE-2024-10198,0,1,58468dbe56a875fce487b2c24efa66d706cd94ef799a0ad9490149b003e5442b,2024-10-22T15:39:37.217000
CVE-2024-10199,0,1,18eedf0aaa14f9eae78c4d887bc668d26c7f01ea3ac2e8913ea363a18a98b2b0,2024-10-22T15:40:56.637000
CVE-2024-10198,0,0,58468dbe56a875fce487b2c24efa66d706cd94ef799a0ad9490149b003e5442b,2024-10-22T15:39:37.217000
CVE-2024-10199,0,0,18eedf0aaa14f9eae78c4d887bc668d26c7f01ea3ac2e8913ea363a18a98b2b0,2024-10-22T15:40:56.637000
CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000
CVE-2024-10200,0,0,490aa25fdf12ccb46c8a818662c15261aecf127ca00516740d200e5fc0c849a5,2024-10-21T17:09:45.417000
CVE-2024-10201,0,0,fdd706f65f7aa0e194f575c5a7304653f1f8e37bb0097e52a009edadbfcb9ca7,2024-10-21T17:09:45.417000
@ -242419,7 +242421,7 @@ CVE-2024-10202,0,0,3a01bc3efcbe4e17c6fdc2e9102f4cbe8dd4afeaccd594b0d2eceea29302f
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
CVE-2024-10234,1,1,d8689a914e8d9ea543ec1d317c32c7c59c868d4764bd7aca5d600362d697f0db,2024-10-22T14:15:14.573000
CVE-2024-10234,0,0,d8689a914e8d9ea543ec1d317c32c7c59c868d4764bd7aca5d600362d697f0db,2024-10-22T14:15:14.573000
CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000
CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000
@ -243488,8 +243490,8 @@ CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558f
CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000
CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000
CVE-2024-20284,0,0,9b3b99721324d4818410a9544df663e05957416b29cfc7a893b6407ac8b10f3b,2024-10-17T15:03:07.253000
CVE-2024-20285,0,1,f3155d3c8a00277d376702ed52a6bc6aca121da6e27a6fa17f8e7224f2a87919,2024-10-22T14:37:01.363000
CVE-2024-20286,0,1,bdf0757c01bcb457b976c7541d58d87497b7ceecaac7964112fd5b04260633e6,2024-10-22T14:44:16.063000
CVE-2024-20285,0,0,f3155d3c8a00277d376702ed52a6bc6aca121da6e27a6fa17f8e7224f2a87919,2024-10-22T14:37:01.363000
CVE-2024-20286,0,0,bdf0757c01bcb457b976c7541d58d87497b7ceecaac7964112fd5b04260633e6,2024-10-22T14:44:16.063000
CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000
CVE-2024-20289,0,0,67b207e27b4f7addc83d99ce2a16d9a68d81f19bcf8b318a5e667a8a27d96ef2,2024-08-29T13:25:27.537000
CVE-2024-2029,0,0,a382b56e2d9764efda4b6d7c3b8e20dd18832e26c02b52a8a572702baca53793,2024-04-10T19:49:51.183000
@ -243598,8 +243600,8 @@ CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
CVE-2024-20420,0,1,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000
CVE-2024-20421,0,0,aebc346e8d223b2a92de579f5e301f997bbd63d2963e092f52511786b8a1dbc2,2024-10-18T12:53:04.627000
CVE-2024-20420,0,0,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000
CVE-2024-20421,0,1,b8d90bf4638dbe0c37023b3ff1bd11c5ac7ded44281786691979af6c9dbb0983,2024-10-22T17:51:08.113000
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000
@ -247876,9 +247878,9 @@ CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93c
CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000
CVE-2024-2627,0,0,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000
CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000
CVE-2024-26271,1,1,24083e398b43cc7550a39a9a20e629649df704da96b50eed5b54764533cdffb2,2024-10-22T15:15:05.523000
CVE-2024-26272,1,1,c1800722847a57902614b956d55e36f898d5c7885aaf7183308a4058cb973641,2024-10-22T15:15:05.740000
CVE-2024-26273,1,1,bc1bde3b4567b7a81ccdd3b768fac87158cd8e39fba32ce35cfb2d7facaa2765,2024-10-22T15:15:05.937000
CVE-2024-26271,0,0,24083e398b43cc7550a39a9a20e629649df704da96b50eed5b54764533cdffb2,2024-10-22T15:15:05.523000
CVE-2024-26272,0,0,c1800722847a57902614b956d55e36f898d5c7885aaf7183308a4058cb973641,2024-10-22T15:15:05.740000
CVE-2024-26273,0,0,bc1bde3b4567b7a81ccdd3b768fac87158cd8e39fba32ce35cfb2d7facaa2765,2024-10-22T15:15:05.937000
CVE-2024-26275,0,0,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000
CVE-2024-26276,0,0,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000
CVE-2024-26277,0,0,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000
@ -248155,7 +248157,7 @@ CVE-2024-26714,0,0,faa331038fc0a5fbf6f72afaa0a7a8bc95357cfb4083cadd79fcc35354838
CVE-2024-26715,0,0,d743b3d21d5816879e3fd96c31c716696399c03e5a1820cc912de3208fbdf6bb,2024-04-03T17:24:18.150000
CVE-2024-26716,0,0,8caf2f33da96957d0a51361dc6c5b07c63980f425a5f489233e62c63611c86e1,2024-04-03T17:24:18.150000
CVE-2024-26717,0,0,9387e326266c2102c4397017c366213925cfb5b5dbbd15b59d1dedfc41a59a9f,2024-04-03T17:24:18.150000
CVE-2024-26718,0,1,c1fb45de7431b250ab2c14c243fdd27efba040a79388a9c5b41104be96d26eb8,2024-10-22T15:15:06.130000
CVE-2024-26718,0,0,c1fb45de7431b250ab2c14c243fdd27efba040a79388a9c5b41104be96d26eb8,2024-10-22T15:15:06.130000
CVE-2024-26719,0,0,bf095c5ec40e5021963ef58a4045186e372261f83c48e13510021b065ebea2f2,2024-04-03T17:24:18.150000
CVE-2024-2672,0,0,c8d64f7b93993488ba5215c3b2eb1c5f7ca0e18711968330934c30769d9d1de3,2024-06-05T20:15:12.810000
CVE-2024-26720,0,0,0796d3f03354db4b881b215435b033867db943942fb95ad422104cdb227db34a,2024-07-18T12:15:02.847000
@ -250714,7 +250716,7 @@ CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3
CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000
CVE-2024-30157,0,0,b4413e2e5263fd764d22ffa6255e560222ce447dceec65fcb4225e2b11135a83,2024-10-21T21:15:04.620000
CVE-2024-30158,0,1,7aa2072367c304ef15068853d42c7cfc42d686d1c6236aed0361c418da255cee,2024-10-22T14:35:11.397000
CVE-2024-30158,0,0,7aa2072367c304ef15068853d42c7cfc42d686d1c6236aed0361c418da255cee,2024-10-22T14:35:11.397000
CVE-2024-30159,0,0,b905413140e33de6a3d93be87dd7cad7a2e92a94fa8fca3348535d1caf49c569,2024-10-21T21:15:05.073000
CVE-2024-3016,0,0,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000
CVE-2024-30160,0,0,47aa9aaeaf0d9d3169383db35f7389cfd4e3ae26d2060339142e175448806635,2024-10-21T21:15:05.190000
@ -251368,7 +251370,7 @@ CVE-2024-31010,0,0,50d72a628a998ce24996b17a1abb2ea140f353a3cac2e0be5c534b2a597a6
CVE-2024-31011,0,0,0c33284f804930c14c50cb008bf7c23c7b47af354b75abc23cf3e146495b5db3,2024-08-20T15:35:06.517000
CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000
CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000
CVE-2024-3102,0,1,9ab659046e55d9ecd56e44281bca18746bc15afba53539e701a3b46145b5c936,2024-10-22T14:26:30.447000
CVE-2024-3102,0,0,9ab659046e55d9ecd56e44281bca18746bc15afba53539e701a3b46145b5c936,2024-10-22T14:26:30.447000
CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000
CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
@ -254424,9 +254426,9 @@ CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7d
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
CVE-2024-35285,0,1,03b080751de6ba1e65ad3cd896c5321e5c4a73a43e7091a7187257683278015d,2024-10-22T14:35:12.820000
CVE-2024-35286,0,1,35410cd3d18af675e9066896bb72f344aeed35a82c0887bbcc42ece7bdbf8fbc,2024-10-22T14:35:13.583000
CVE-2024-35287,0,1,38643b7462a0d947033f7b2ca609231321a2a14371b7b37b5f4c9c752052cce9,2024-10-22T14:35:14.367000
CVE-2024-35285,0,0,03b080751de6ba1e65ad3cd896c5321e5c4a73a43e7091a7187257683278015d,2024-10-22T14:35:12.820000
CVE-2024-35286,0,0,35410cd3d18af675e9066896bb72f344aeed35a82c0887bbcc42ece7bdbf8fbc,2024-10-22T14:35:13.583000
CVE-2024-35287,0,0,38643b7462a0d947033f7b2ca609231321a2a14371b7b37b5f4c9c752052cce9,2024-10-22T14:35:14.367000
CVE-2024-35288,0,0,5a7e419c5723f5855a10246582e4e92910b876efa85bd2048c10c45e071584c8,2024-10-10T12:51:56.987000
CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000
CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000
@ -254451,7 +254453,7 @@ CVE-2024-3531,0,0,a342a9958ba8d00c279b1676525284c1cab302a477225f05f9d97b5deb0711
CVE-2024-35311,0,0,94751a7e140c2a3ff83ee374530e5919b0823edf97b2e344646a9709229c503b,2024-05-29T19:50:25.303000
CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b3e3,2024-05-20T13:00:34.807000
CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000
CVE-2024-35314,0,1,8b00fc627c3e1c6ff34cbb4708c278713efd499b74ad54064c188a8a66c45f52,2024-10-22T14:35:15.233000
CVE-2024-35314,0,0,8b00fc627c3e1c6ff34cbb4708c278713efd499b74ad54064c188a8a66c45f52,2024-10-22T14:35:15.233000
CVE-2024-35315,0,0,84efd35bd289a945021a9c7dd1849ff64be9b144534b4418f264cb0672980105,2024-10-21T21:15:05.613000
CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000
CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000
@ -256336,7 +256338,7 @@ CVE-2024-37997,0,0,10214765491aa29b8c34faf22f5e8238fda623005890c9342516743753b6c
CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000
CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000
CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000
CVE-2024-38002,1,1,4428864e3adf5d2b2e1699accfaeac253b1059be29e13e1cad19ffb714fdfcb2,2024-10-22T15:15:06.277000
CVE-2024-38002,0,0,4428864e3adf5d2b2e1699accfaeac253b1059be29e13e1cad19ffb714fdfcb2,2024-10-22T15:15:06.277000
CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000
CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000
CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000
@ -257045,7 +257047,7 @@ CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269
CVE-2024-38817,0,0,09723b24db0d6a084c268e07b58c10ca202cbe9290f0f8fec2db45f626cd7af3,2024-10-10T12:51:56.987000
CVE-2024-38818,0,0,622849f8ff4dfc75febef96b69e498222845497635b94ea6c1bb47520700e61d,2024-10-10T12:51:56.987000
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
CVE-2024-38820,0,1,a5b616e0d9bc58c5d9f58ca8cd3d5a01be45dc2cf2e2573532c8a51afcf4ca4c,2024-10-22T15:42:22.633000
CVE-2024-38820,0,0,a5b616e0d9bc58c5d9f58ca8cd3d5a01be45dc2cf2e2573532c8a51afcf4ca4c,2024-10-22T15:42:22.633000
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
@ -257422,7 +257424,7 @@ CVE-2024-39493,0,0,1e9db7e81ec34cee90fac11925a12057887fa787e4909a68e8233bca0ebf8
CVE-2024-39494,0,0,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210e13,2024-07-24T19:17:25.057000
CVE-2024-39495,0,0,882ab91a71cdaa0b14beca48f2b2546ecf350f5bc761609487e97f811c1f052c,2024-08-20T15:35:19.527000
CVE-2024-39496,0,0,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000
CVE-2024-39497,0,1,d605ece57edd8c1924d68da30a47dcb5e1db73bc0b73e7007642bc3b1bb2dae6,2024-10-22T15:15:06.630000
CVE-2024-39497,0,0,d605ece57edd8c1924d68da30a47dcb5e1db73bc0b73e7007642bc3b1bb2dae6,2024-10-22T15:15:06.630000
CVE-2024-39498,0,0,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000
CVE-2024-39499,0,0,8bd78139ee9d6c3d000d5156a9790ce67d1b2af9b3aee62da6523d24ba14e435,2024-07-12T16:34:58.687000
CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9d94,2024-07-12T16:34:58.687000
@ -257807,16 +257809,16 @@ CVE-2024-40060,0,0,8684e047d9ba2e6cc4bcc7c4afd5cb58b4b20c732a4bb0dd43020155d17e1
CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000
CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
CVE-2024-40083,0,0,11e680e8bf1517e2634a64aa49a46d6caf49581be97998a9d9f77cf3267fbcc9,2024-10-21T21:15:05.703000
CVE-2024-40084,0,0,534d11aef460ce9b34eb113477df41417197fd033d77d213100aad9c356df749,2024-10-21T21:15:05.770000
CVE-2024-40085,0,0,5e26333c4ab2860e64b8bbaca881d20b70f9d1931f87426da705490dd3f5755b,2024-10-21T21:15:05.853000
CVE-2024-40086,0,0,c921105c5ce57300119e18e8e6cfd8c24b8606d1f2e73bc08ab08f658ee80221,2024-10-21T21:15:05.923000
CVE-2024-40087,0,0,6ee4107522c5969a2a517f5043d2f6b349c6a2286a5705254f08c3d25d87672b,2024-10-21T21:15:06.003000
CVE-2024-40088,0,1,f7759b011e80db767fd1dbd212bf4323a92520bb9be3957ba923eab16655ce61,2024-10-22T14:35:16.010000
CVE-2024-40089,0,0,fe50fd0a5e7736656c8bd604a9e5fad05ea85bca29858fe641bda85bc04f9a4a,2024-10-21T21:15:06.150000
CVE-2024-40083,0,1,6214757a38a28413207a0d4d3bf59a87ad21f64a445a6477f90c9814d96e64d5,2024-10-22T17:35:03.297000
CVE-2024-40084,0,1,e5a48869dc57daf978e93f4d404b40d8cd7575a004e2e23910e1636b2fbf4ba2,2024-10-22T17:35:04.057000
CVE-2024-40085,0,1,7cc1b970ba005bdf1c26ff25b3a180cbc5e09f7dbecaeac58ab4095d9a54f531,2024-10-22T17:35:04.843000
CVE-2024-40086,0,1,d477aa9a9d381f98d54e41fcc40bef402826f6575f7a4d21e22aed5f418bbdb5,2024-10-22T17:35:05.600000
CVE-2024-40087,0,1,be7927f3488a0d370038975baafb448110d1c8fb340e9ed7e5d0faed3d81a193,2024-10-22T17:35:06.420000
CVE-2024-40088,0,0,f7759b011e80db767fd1dbd212bf4323a92520bb9be3957ba923eab16655ce61,2024-10-22T14:35:16.010000
CVE-2024-40089,0,1,ed4eb5a53b2cd859e53f91fb6a09f58a08f10b728994f90f9ffa170b92bfb777,2024-10-22T17:35:07.167000
CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000
CVE-2024-40090,0,0,71c1d9398c5476b3448760d412c55985d17dac30c14dfff9be3cec0e88b95dcf,2024-10-21T21:15:06.223000
CVE-2024-40091,0,0,77588eb2eb6db1704cc9e7edc29d724d334c5e0f77077e1081bebdfa0e3119b6,2024-10-21T21:15:06.313000
CVE-2024-40090,0,1,1d8565eba1bbb89f12f02c55fd6cc2d4a5a146a6b0b6272e27409baab823c846,2024-10-22T17:35:07.957000
CVE-2024-40091,0,1,d7ceb5c1a6a6f5dd1f114159610592371d05efa53ae448a2bdee1e5d98966d98,2024-10-22T17:35:08.760000
CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000
CVE-2024-40096,0,0,7067973a4296a7a70beea7b209cd71d2a86d44a9bdfd60035b86d8848d99631b,2024-08-30T16:14:41.957000
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
@ -258235,7 +258237,7 @@ CVE-2024-4095,0,0,e2a40f44bdf8e372a41806afdce4161562b7b4bb2bcba8f3987036690d2e81
CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f822,2024-07-12T16:34:58.687000
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000
CVE-2024-40953,0,1,e65ed296f4076fd3edc9aaa9905f7ecd5e00c5e8a9ee2fde440fe5cbe0a29245,2024-10-22T15:15:06.720000
CVE-2024-40953,0,0,e65ed296f4076fd3edc9aaa9905f7ecd5e00c5e8a9ee2fde440fe5cbe0a29245,2024-10-22T15:15:06.720000
CVE-2024-40954,0,0,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000
CVE-2024-40955,0,0,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000
CVE-2024-40956,0,0,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000
@ -258709,8 +258711,8 @@ CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107
CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000
CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000
CVE-2024-41712,0,0,fda1df8096c7e740d7c1e5b76ebc20ad4db1e4b92172ce54a6c2dabadb93a134,2024-10-21T21:15:06.387000
CVE-2024-41713,0,1,db1b71817a5ce0b697df043f8e1585f7943defebfef472347a986524d193ee8f,2024-10-22T14:35:16.817000
CVE-2024-41714,0,1,b7e979e6a2ada11f31a276f8770fe1bb150c75726a0f17380180742b9a2f6160,2024-10-22T14:35:17.650000
CVE-2024-41713,0,0,db1b71817a5ce0b697df043f8e1585f7943defebfef472347a986524d193ee8f,2024-10-22T14:35:16.817000
CVE-2024-41714,0,0,b7e979e6a2ada11f31a276f8770fe1bb150c75726a0f17380180742b9a2f6160,2024-10-22T14:35:17.650000
CVE-2024-41715,0,0,35d1e19982d6029b0a8b7671c2382ff20d85aa479fa52b1ecc90bc4ca8088cf0,2024-10-17T17:15:11.530000
CVE-2024-41716,0,0,add00a3b8bb5c856cb11efe54462b72e0907045ad71076c98ae404e938cc3293,2024-09-13T19:53:47.723000
CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000
@ -259668,8 +259670,8 @@ CVE-2024-43165,0,0,8125472d7e20e379acd67d29cc7075b43b03a71223ce60c46b14d0ffb4bd9
CVE-2024-43167,0,0,c4eae034ed90d957ee0d40ac6b75e1eb711889b4b8905f404c5783e222980273,2024-10-21T12:15:03.837000
CVE-2024-43168,0,0,ef0081344887975b429a2b0b7741a490ebb03d62e914345ff88e9fc7663b3374,2024-10-21T12:15:04.327000
CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000
CVE-2024-43173,1,1,5c8f90b9861a166e104ffcc99d3b578724b942af6f62a199be390ecf1a3fb743,2024-10-22T15:15:06.800000
CVE-2024-43177,1,1,8b0b35d5d6991691783cdf8a0eab90dfd9795fad78b616442a1d6b5530beee1e,2024-10-22T15:15:07.020000
CVE-2024-43173,0,0,5c8f90b9861a166e104ffcc99d3b578724b942af6f62a199be390ecf1a3fb743,2024-10-22T15:15:06.800000
CVE-2024-43177,0,0,8b0b35d5d6991691783cdf8a0eab90dfd9795fad78b616442a1d6b5530beee1e,2024-10-22T15:15:07.020000
CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000
CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000
CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000
@ -259755,7 +259757,7 @@ CVE-2024-43294,0,0,115da993f44036adfff3784c8efce939e5d53bb4f7ab07ebab66e86a98521
CVE-2024-43295,0,0,4c992084e199b514575e8ec2d873a4ef1cccca3f4f5df0b2e67e418aab98a634,2024-09-12T21:20:43.847000
CVE-2024-43299,0,0,519d081700ab3294f398a4287727657f1b1d3ae45286cab56afe1bc9702f1fca,2024-09-12T21:23:30.647000
CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000
CVE-2024-43300,0,1,0e255468708543d303383e85dfb9e37cc538bb4005cde3896a7b317de3630d96,2024-10-22T15:35:24.050000
CVE-2024-43300,0,0,0e255468708543d303383e85dfb9e37cc538bb4005cde3896a7b317de3630d96,2024-10-22T15:35:24.050000
CVE-2024-43301,0,0,36517c64264e25162f6a8960592c6f8ac4f28ee2609d1e9f07cf9e006ea49e2a,2024-09-12T21:24:20.563000
CVE-2024-43303,0,0,11d9501682f62a268ea8fd6f03971205e43f433af8e58b9f115735076a0f4308,2024-08-19T12:59:59.177000
CVE-2024-43304,0,0,0198c9c448bd60be5feef590d21005c81d3809f24efdc4b5ed5165051bdc5338,2024-08-19T12:59:59.177000
@ -260015,7 +260017,7 @@ CVE-2024-43608,0,0,d778a741c452756f08141283b44511b35f848f925ff9e901d81fdc04d7ed6
CVE-2024-43609,0,0,b51bc951febae72cfbab824fd5dae1956187d25f6e42e962d7d237590a3266d0,2024-10-17T21:18:58.113000
CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88ea,2024-05-21T12:37:59.687000
CVE-2024-43610,0,0,e05bc7d7fba9921ddb28639aa2d807e02a712368195686314d74c31cc0c1b1bd,2024-10-10T12:51:56.987000
CVE-2024-43611,0,0,e71bb37110cf57f4ebc98f5c779227b1c5e9d69f96a05916c17f38187ef51de9,2024-10-10T12:56:30.817000
CVE-2024-43611,0,1,4cc7faddbc4a0042c9b0d18e623cdb2e65033905714d4e2435ea5507fb9866e2,2024-10-22T16:01:19.373000
CVE-2024-43612,0,0,2d63857a7410863939630233bd3c57b8a869ef6d82a1dc4e625bbf528ee43c0a,2024-10-21T20:48:02.050000
CVE-2024-43614,0,0,37f86979c4c4ec96d0dd61c1d9daa59ec511d8fd5452834efe232d695cc74469,2024-10-21T20:50:38.370000
CVE-2024-43615,0,0,841e5833e1934c639d3a9a11a43505704ba14c449fb8c86b43a2c5341378c86b,2024-10-21T21:00:34.967000
@ -260130,7 +260132,7 @@ CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd
CVE-2024-43842,0,0,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000
CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000
CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000
CVE-2024-43845,0,1,d80433b94567f7553ba59d5578ff0ab177cc617e43797bbfe0b461c6dff68752,2024-10-22T15:15:07.240000
CVE-2024-43845,0,0,d80433b94567f7553ba59d5578ff0ab177cc617e43797bbfe0b461c6dff68752,2024-10-22T15:15:07.240000
CVE-2024-43846,0,0,336ca6ce5d381bc8197cb8ae52aec5d82cb25fe9302c78389787b6ba92216525,2024-08-19T12:59:59.177000
CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075a6e,2024-08-19T12:59:59.177000
CVE-2024-43848,0,0,f1a2b4dd4e81d797bfb09af1eb3c38201e05560605d293e2d1b82a973cb40d73,2024-08-19T12:59:59.177000
@ -261076,6 +261078,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
CVE-2024-45518,1,1,85e0e8d0490ef458e34c3cb4cab880d0e6443a5b3376eb82b1a1170ed808b4e1,2024-10-22T17:15:03.837000
CVE-2024-45519,0,0,1314fc46f1c0fd544c41bcc772f8e9adc71c225c5b1014a689dc2f992c782655,2024-10-15T14:32:13.520000
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
@ -261340,6 +261343,7 @@ CVE-2024-46237,0,0,e9a03598fb64b05ba8882f6b5b526c713a555a3e7fdae15963deddf3bd8ce
CVE-2024-46238,0,0,e04df7a8502d302f172444f965d1fa00612ca87792c631612b16a6e649750ad1,2024-10-21T21:35:03.580000
CVE-2024-46239,0,0,926566aaeaac1cf6bfa054ea714a4093c287c3bf6826d025bfc5db3fb3092da4,2024-10-21T21:35:04.510000
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
CVE-2024-46240,1,1,7095785d06ffd789b291cf674b04480cc2015e975f36b62912f4d71adb122b9a,2024-10-22T16:15:07.407000
CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000
CVE-2024-46257,0,0,9ea0ad0f2e6865da2b0362a090cb21ce2a440cd52edf95f9a53e87e2d7fb967d,2024-10-03T16:35:05.240000
@ -261429,6 +261433,7 @@ CVE-2024-46528,0,0,a31b8dad674e1792ba2e3480eb54bd9167b5430c2cf6a9cfdcaa08814b4f5
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000
CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000
CVE-2024-46538,1,1,cefa2e21b5bd2ee89cbf40d952628918d4a31d55c6fbe92a038df0e0a23ebcbc,2024-10-22T17:15:03.950000
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
@ -261730,7 +261735,7 @@ CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257
CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000
CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
CVE-2024-46897,0,1,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000
CVE-2024-46897,0,0,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000
CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000
CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000
CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000
@ -261897,7 +261902,7 @@ CVE-2024-47226,0,0,67acd1dda98161941683c1ecdf3fb2829a8afb2cdb12d796e19b0a64631c8
CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000
CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15bbe,2024-06-04T19:20:47.717000
CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb63,2024-06-04T19:20:47.830000
CVE-2024-47240,0,1,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000
CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000
CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000
@ -262001,7 +262006,7 @@ CVE-2024-47386,0,0,8cb1861aa24862dc38fce1bb1f3d0d3efef1813cc377d83faa4f21f06229f
CVE-2024-47387,0,0,08a3b98e23e8185d509837019c1ef3a9c139ede5ad875ee88b25d1df1e39d80b,2024-10-07T17:47:48.410000
CVE-2024-47388,0,0,dc31869c2fc889c08896c96961f94aea423bc557ea63d4c8cae8b1b120c02193,2024-10-07T17:47:48.410000
CVE-2024-47389,0,0,1d36b4f30f3636f2e5fbc982d1d69e8709dc3961752cb7621f1d6a2dcf8cb49d,2024-10-07T17:47:48.410000
CVE-2024-4739,0,1,b1786ca24e141f44a22c18ecb9dbd095560a71bf7433b97a19b051761dc105de,2024-10-22T14:07:02.023000
CVE-2024-4739,0,0,b1786ca24e141f44a22c18ecb9dbd095560a71bf7433b97a19b051761dc105de,2024-10-22T14:07:02.023000
CVE-2024-47390,0,0,609899d039b2d1f3f491074ef439bed613cbd5e5aeb5a6390f43ce3caca59f92,2024-10-07T17:47:48.410000
CVE-2024-47391,0,0,0ec9a4f4449faf31f9cfbe6055bdfe88e4acf6b8a151d36abdb7471992d61099,2024-10-07T17:47:48.410000
CVE-2024-47392,0,0,c1e57d415365b830226dbe3f308a9b5009db4e502bc21e205a9f212a29a477c4,2024-10-07T17:47:48.410000
@ -262034,9 +262039,9 @@ CVE-2024-47459,0,0,0b1d286cc18504287dd532d658d2383a7255013ccc216b35a3e0d03bccac4
CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
CVE-2024-47485,0,0,ad983ecf2d27a8882140a86c2b8f76909d923038932c9e4c487291a554eaf4cc,2024-10-18T12:52:33.507000
CVE-2024-47486,0,0,ebb52a6e58b7502e54c2d96f1f22f907d8d887fc6268cf25a428f304ce5cdeb2,2024-10-18T12:52:33.507000
CVE-2024-47487,0,0,ce7934a5efbdf258c84a38c313f294ce5a0f986aa218002120ff84beedef1ca9,2024-10-18T12:52:33.507000
CVE-2024-47485,0,1,70c31bc26651c666f1f81bb314c02989bd53a835a51d6fdce38b5fab47a41c05,2024-10-22T16:23:22.890000
CVE-2024-47486,0,1,d0e2cdb063c29469a8d3896035823ed37b083b056a6c7ff12d1a7f59bad20ea5,2024-10-22T16:11:07.547000
CVE-2024-47487,0,1,89e5f946b42ae69712fe53b468ea8b777288a7068d88dd6a3031473d76e487d6,2024-10-22T16:10:08.027000
CVE-2024-47489,0,0,b60e5447ef49080d8bcb541a004c5061338369ecebcb53ef8b0c02387b615511,2024-10-15T12:58:51.050000
CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000
CVE-2024-47490,0,0,e3601f25126ea5528355c875251d16d0b06252aacf2c95cdc691bd121e53f290,2024-10-15T12:58:51.050000
@ -262164,16 +262169,16 @@ CVE-2024-47672,0,0,208c9363d63200a0f87e54b2ecaa4588cdcb8ebe0fa60448ea15f5f621cd4
CVE-2024-47673,0,0,2317135deeb5a2ba1be6a2e702cd3dee3239bc7e08807d40785f15a0d93329d9,2024-10-17T14:15:13.853000
CVE-2024-47674,0,0,9273dcf5991b9b8c8433130a4938740f9721051fe1fcb6d45b5c4bc4625153d6,2024-10-21T18:15:05.993000
CVE-2024-47675,0,0,fff2226e2e91403974930f662f226a29696936c529972a0662f08267575cdd8e,2024-10-21T17:09:45.417000
CVE-2024-47676,0,0,647f2a3a1d3c30594b68c3c4e4b627dfaf40a57c2604da0b88353cfb7110d574,2024-10-21T17:09:45.417000
CVE-2024-47677,0,1,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000
CVE-2024-47676,0,1,d31d6f56ccab7b160561fa0b3c682aa5c75e9dbbe155592bcb66f3a4628abbed,2024-10-22T16:12:39.830000
CVE-2024-47677,0,0,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000
CVE-2024-47678,0,0,0599171199c0933ac90dc22e0c718002df8dc875ff64d0f6cfd466c664eca6eb,2024-10-21T17:09:45.417000
CVE-2024-47679,0,0,307939d2ecd8d5c95d936c71f851827dbf3076f2cbcbbaee79f0d0403d820535,2024-10-21T17:09:45.417000
CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000
CVE-2024-47680,0,0,779185d87101541924dc45d047ca1b9e685cb152836bf7742a8884724035e45e,2024-10-21T17:09:45.417000
CVE-2024-47681,0,1,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000
CVE-2024-47681,0,0,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000
CVE-2024-47682,0,0,6c96643a2a20d61e5631dad60147e65d29328d6a7f713c97d1e3e384bd3d2097,2024-10-21T17:09:45.417000
CVE-2024-47683,0,0,29df637f255ef6790fa4d5a6cef4a640ffa0c80b3f317910e368f8552b5ce5c0,2024-10-21T17:09:45.417000
CVE-2024-47684,0,1,c39612721e855a6bfd73c21cef099cc4455986cccfb2ea78b2c09a72e7deb582,2024-10-22T14:59:31.340000
CVE-2024-47684,0,0,c39612721e855a6bfd73c21cef099cc4455986cccfb2ea78b2c09a72e7deb582,2024-10-22T14:59:31.340000
CVE-2024-47685,0,0,45dca83ceec4838c760fe3a933b300812ff7df633870d5c25a6d36368c1c1374,2024-10-21T17:09:45.417000
CVE-2024-47686,0,0,002328641bf73f5c7fdd0cb5a2e29f6ab710bee941d944f9154eb587c6d547fc,2024-10-21T17:09:45.417000
CVE-2024-47687,0,0,94419916fe94ff70fceea8c9848ea1313fd4f7e2844cd750b51c3c2895ce18a2,2024-10-21T17:09:45.417000
@ -262238,22 +262243,22 @@ CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f7
CVE-2024-47740,0,0,768c60cc2aa6353990ba6be4a715ba73240d08f7aa920e59da8dba820cceb126,2024-10-21T17:09:45.417000
CVE-2024-47741,0,0,16de1929b973495fab2b76c1e0c3aec13d1144f771036e4c19ce75034196e012,2024-10-21T17:09:45.417000
CVE-2024-47742,0,0,d4bdf050ad676b843a45f07aa46808bebd66cb4930bdf4a3846418b0470ff5e9,2024-10-21T17:09:45.417000
CVE-2024-47743,0,1,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000
CVE-2024-47744,0,1,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000
CVE-2024-47743,0,0,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000
CVE-2024-47744,0,0,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000
CVE-2024-47745,0,0,bf9d70a37cd5327dcc2d07c3fdd8b5c36de5c72622dd6659e050773378799961,2024-10-21T17:09:45.417000
CVE-2024-47746,0,0,a9cdeb753844bd87216637cd741d47b47d4ce9e70871099d1588c10e4fb363bf,2024-10-21T17:09:45.417000
CVE-2024-47747,0,1,9d5a586f218eaaf78bda9441d4b5d07240456a6b32924dfbcbb0b265d0d3292b,2024-10-22T15:09:13.173000
CVE-2024-47746,0,1,bd1d3998772b7b97367eddbd4c0f1f3e8c206783f1078083a98d6f055ddbde21,2024-10-22T16:00:35.703000
CVE-2024-47747,0,1,bf426d12e6fede872474432e7d03578fd050f7aed12c854ab7dc6720315913fd,2024-10-22T16:11:40.627000
CVE-2024-47748,0,0,647817335e913f39ba0f188b7f0dda0acdc5eefa8874404f39f4072aced2a2c5,2024-10-21T17:09:45.417000
CVE-2024-47749,0,1,c9441faf5e1defc6bde7c31bc17b95faf99e99f284f50e4f6ca541b2e00c5472,2024-10-22T15:00:29.497000
CVE-2024-47749,0,1,6fb6c09686d727b440ebbd021d0a7a92d2bb1c2a12c6f5547a255465abc8b3b4,2024-10-22T16:08:31.637000
CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000
CVE-2024-47750,0,0,fcb30e866c3d64f885fc63b0fbe18064c59e15239984a0057b4922de3e3cda47,2024-10-21T17:09:45.417000
CVE-2024-47751,0,0,dbbb46f679c8ef6d582034b10e0fc5133e1862d2b7e7523462d867f3e651a7ba,2024-10-21T17:09:45.417000
CVE-2024-47752,0,1,240161d7fe703e400c9d3fcfe3ca9a9a5bc29b42b931a326328c832bd997b559,2024-10-22T15:04:46.523000
CVE-2024-47753,0,1,1dddd12c73af43ebb0904de1dc5d29129f502d57bab82119fa1cf293a4ba7b53,2024-10-22T15:04:18.277000
CVE-2024-47754,0,1,8fefecc35f5ee5d8b148978b8b468c4a0826a3164fbc5c07c8ceec41094f8e9b,2024-10-22T15:03:31.147000
CVE-2024-47755,0,1,6cb13a363c1927340d57e298ac76078d7c78d1527e04987bda7bb702169c10cb,2024-10-22T15:46:38.027000
CVE-2024-47756,0,1,234d0c24ccb56a3602dbfe56e1b7f8eb887c075685f95cde9baebc46ad5cc3a2,2024-10-22T15:02:11.467000
CVE-2024-47757,0,1,500f4ed7f4cebe77f095eabe903396578ed13baff1d5a05afdbb14496b4b2006,2024-10-22T15:54:48.830000
CVE-2024-47752,0,1,65039c78bb19b3ece8928a956e9db0ee7719b3f114bcfd57c0c3ced74f237a1e,2024-10-22T16:11:09.037000
CVE-2024-47753,0,1,b4bdc9a1d337353d37d865ac5f0c508d5e95f57a71156b3e1f6703729b56c2ad,2024-10-22T16:10:40.380000
CVE-2024-47754,0,1,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdcd47,2024-10-22T16:10:21.907000
CVE-2024-47755,0,0,6cb13a363c1927340d57e298ac76078d7c78d1527e04987bda7bb702169c10cb,2024-10-22T15:46:38.027000
CVE-2024-47756,0,1,eb155bc0ec662a964b2c66ddbb8cf663bac19d4776af4da61c75acb4f1c74b8d,2024-10-22T16:09:56.570000
CVE-2024-47757,0,0,500f4ed7f4cebe77f095eabe903396578ed13baff1d5a05afdbb14496b4b2006,2024-10-22T15:54:48.830000
CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000
CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000
CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000
@ -262290,6 +262295,7 @@ CVE-2024-47815,0,0,843559a4031eaee974816014150940c4f18b7f6d93739de5a1866ac2ce670
CVE-2024-47816,0,0,c0bf0d33ec35192d4154926a2f4d5d81b042bde4dbbd41d5e4618f5e20416892,2024-10-10T12:51:56.987000
CVE-2024-47817,0,0,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000
CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000
CVE-2024-47819,1,1,c727e536f3a624a59e67b95481c62382de08269a5f55f9d425d3effd214f1eb2,2024-10-22T16:15:07.500000
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000
CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000
@ -262467,10 +262473,12 @@ CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d
CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
CVE-2024-48570,1,1,e565422dfa55e4b25b9efb30e59633745c3fab275e41215e02468494293003fa,2024-10-22T17:15:04.087000
CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000
CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000
CVE-2024-48597,0,0,d418873f3e9303c59419cda288a50538e497ca866e7b1cfaef7313951a15ddbe,2024-10-21T20:35:13.860000
CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000
CVE-2024-48605,1,1,f360f36ad27e8b971ca3313a232e92dc65547d1905cd6f8b04ad824f27bf2cf1,2024-10-22T16:15:07.757000
CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000
CVE-2024-48622,0,0,4cd7a4b67551e1c7266b414b834e1956aa3a51a75d895e45be98bc89b06ddf81,2024-10-16T16:38:43.170000
CVE-2024-48623,0,0,d049076f927dcf309023eb7c4a1c5680d5c48a2a4bd2097c596ebfe8af0f8628,2024-10-16T16:38:43.170000
@ -262493,6 +262501,9 @@ CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e
CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000
CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
CVE-2024-48706,1,1,f6ed33b88a2a4cf79c6d1eae635780005dc95575e969d386a62204c211cae31c,2024-10-22T17:15:04.180000
CVE-2024-48707,1,1,597fa9e5ec0742c8ccc62ed6d8aa1a1f509191f27a5d9d00c7621c443fe434b2,2024-10-22T17:15:04.273000
CVE-2024-48708,1,1,82b37b547a43c5d13832cda6a763b6b0d073da2c9cedfa21cb674f5a350bfaa3,2024-10-22T17:15:04.370000
CVE-2024-48709,0,0,a2f1048f43a5ff6c83482412ed457499b4f82b0c444a20075955708fd04c880e,2024-10-21T19:35:07.443000
CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba41b8,2024-10-16T17:35:03.423000
@ -262563,6 +262574,10 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000
CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000
CVE-2024-48925,1,1,17ad6fa4547f2ce7b16f4da89e9b101cb04c2294b06cc702cb3983c1e1a94ab1,2024-10-22T16:15:07.853000
CVE-2024-48926,1,1,85b04bcd589f9426bacb388b76883147a3307f836fd8fd417156eccdaeb86ba1,2024-10-22T16:15:08.090000
CVE-2024-48927,1,1,703fccd925f1f3af0bb4d7bdb71de5226e00f5f5ac4de4592eb47b115aedc481,2024-10-22T16:15:08.360000
CVE-2024-48929,1,1,66787fd57ce09c453329b762aeb961f8826f0e3b696b20681b1d74930ccbbfca,2024-10-22T16:15:08.617000
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000
CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000
@ -262605,7 +262620,11 @@ CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d8
CVE-2024-49193,0,0,4817bc5a524f8686c9c390cc6499f217005a03a967baaa28cc06a1d405a85c45,2024-10-16T20:35:16.380000
CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714d45,2024-10-17T18:35:13.253000
CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000
CVE-2024-49208,1,1,8f2e6c1e86f64af5e9881e3f7358f063e855448026ab47a0489d80c8a2fe32b3,2024-10-22T17:15:04.503000
CVE-2024-49209,1,1,63bc036493de6c1ed83f722bcd4747b3b03d632c72fe17005e827b6f6284d1e9,2024-10-22T17:15:05.763000
CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000
CVE-2024-49210,1,1,6e53b8aa574f1a38b7aa78fd56066f3a919773a1d515d8c8b36c1cf9f646d98b,2024-10-22T17:15:05.970000
CVE-2024-49211,1,1,639835fa2342b8dba7122e14997d5aa1fec6ab36565dab9c04b435fe88b7768d,2024-10-22T17:15:06.193000
CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000
CVE-2024-49215,0,0,9d23e97fd9538d4ddaefdbee98c9f991902afb90430384e62ea6427018c87235,2024-10-21T17:09:45.417000
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
@ -262739,6 +262758,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810
CVE-2024-49366,0,0,dba23a6a5d899dfc1dd93480431c60e66516ce3fea9b6f89406c417953de1770,2024-10-21T17:15:03.567000
CVE-2024-49367,0,0,9cdea4233abdf31e5711ba3faae763fba0a540ae42a436f6b5d5034f60f32d59,2024-10-21T17:15:03.783000
CVE-2024-49368,0,0,4323388038598adba9c2e6f2533f5d2b25d45af0a630786c844ee55a0bab465d,2024-10-21T17:15:03.960000
CVE-2024-49373,1,1,0572794ffa0a562b1feec1afbfc4282a4c956dbda0b30d27fc085e44ad9f38f6,2024-10-22T16:15:08.860000
CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000
CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000
CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000
@ -262784,12 +262804,12 @@ CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a1
CVE-2024-49610,0,0,4f883c779c7b80912a16a7cdc0e52ccc8dd24129efdfa293f6a1ccc1bf1526fe,2024-10-21T17:09:45.417000
CVE-2024-49611,0,0,c7f7e09d8f83b62743396c3bd4904fddaab94d00a5cf5a5c7129906b3bdbdafc,2024-10-21T17:09:45.417000
CVE-2024-49612,0,0,acd6c0707ff81a9cd91d7e43f1e50373957b69b17c638b1ca230b26e66d303b8,2024-10-21T17:09:45.417000
CVE-2024-49613,0,1,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000
CVE-2024-49614,0,1,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000
CVE-2024-49615,0,0,ba81ea33ad44e9028a5a08fbc9b26c419164367943e113f8f0ddf78b9b8c69b0,2024-10-21T17:09:45.417000
CVE-2024-49616,0,0,9a594ac2e99bd2ea3d04b4336df6a62b74a73cba884d04e5a4c50b731f2c0fcc,2024-10-21T17:09:45.417000
CVE-2024-49617,0,0,fc3bc12b8230aeed8fe5e270ffff12b76ff2c45b03602b48cb05ca2b01bcb351,2024-10-21T17:09:45.417000
CVE-2024-49618,0,0,b259022a82a9786efc0f4b97a99bb745863f5ea5c29985d8c38260ee2752bd41,2024-10-21T17:09:45.417000
CVE-2024-49613,0,0,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000
CVE-2024-49614,0,0,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000
CVE-2024-49615,0,1,130d0356784581205e5e46cf3362c72fc7aa63cdf23c2209a80a7b2698730ac0,2024-10-22T16:43:14.190000
CVE-2024-49616,0,1,5b88766e762e6343817ed4b072fa559035aa10e15052258529a01845d89d6e9d,2024-10-22T16:41:58.513000
CVE-2024-49617,0,1,273326047d3e6de5c637f9bb2298d7d33d462172d179296cb89214e45a7a6ea1,2024-10-22T16:51:35.353000
CVE-2024-49618,0,1,4bf989c333be7a79b8e837d5c1bc3d3690e7ab118b29552d86d9a2559ce5377c,2024-10-22T16:50:18.527000
CVE-2024-49619,0,0,e8500ad2f662c42eb5cefcb54e6583c1e771076814e70ad1ad1341515be5295a,2024-10-21T17:09:45.417000
CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54
CVE-2024-49620,0,0,03cc08ebcdb9c3da220e8f96b59d9d80dae0359c2d758e8d050a48cf9a60b6aa,2024-10-21T17:09:45.417000
@ -262824,16 +262844,16 @@ CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506
CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000
CVE-2024-4984,0,0,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000
CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000
CVE-2024-49850,0,0,8fb2208ed48bdb26222d1dc252f610fc96b2529a3c2127408e4890cb805ccb01,2024-10-21T17:09:45.417000
CVE-2024-49850,0,1,2b33649e908446d8844acedbede0997555f012b73f46f17eddbc04e11a5ff156,2024-10-22T16:12:14.193000
CVE-2024-49851,0,0,3d484e6abda4a4ce29d99f10316c857626eb63bf2eefc7621c465c7b13c23949,2024-10-21T17:09:45.417000
CVE-2024-49852,0,0,262ffe2d9e462bcad9f414c5114ff048fe0027922ed23ed53a0208a484284b67,2024-10-21T17:09:45.417000
CVE-2024-49853,0,0,c217dd9272b2cd4fab6ae4f4c0fffed7f5095340c59c640aa7cae9145dfe0c13,2024-10-21T17:09:45.417000
CVE-2024-49854,0,0,94138472b5f74b096a6e54fd3e7d9e10ac0cdb3bdf0c5b3ece24fbd6184cc9bd,2024-10-21T17:09:45.417000
CVE-2024-49855,0,1,b08dc86ebf2d1773422e8bece84884893e7c26fc05c4bac9762abe3418e3e42d,2024-10-22T15:17:29.283000
CVE-2024-49855,0,1,1c10554d37ca1638fe05ddaa09d6ac939fe9e21d5da77a220a4fa3ba8205886d,2024-10-22T16:12:27.030000
CVE-2024-49856,0,0,69c6d5b77115b2740f272ad46ab48ff11264f8cb25014c56c24110ee5f0eca13,2024-10-21T17:09:45.417000
CVE-2024-49857,0,1,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000
CVE-2024-49857,0,0,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000
CVE-2024-49858,0,0,189a38e2e1729e4f650f5ed2d9949d8780bddccdc0a5c8eca5c522d45db87500,2024-10-21T17:09:45.417000
CVE-2024-49859,0,1,5d84e21d84afa869d2d12c89058663c672035a9c51324863a468cd9ea096c485,2024-10-22T15:24:57.640000
CVE-2024-49859,0,1,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99aaa1,2024-10-22T16:13:03.267000
CVE-2024-49860,0,0,f5150f7cf3bb2d2d0ca50e9d424c876fd9c84254fcf7bd6f2627024294f5ef2f,2024-10-21T17:09:45.417000
CVE-2024-49861,0,0,f8d823d453896bd63aeb95297d35b7ca2209aad13429ece51e5e583706dfbad3,2024-10-21T17:09:45.417000
CVE-2024-49862,0,0,0c94aa307fd6d2aeab9692641051191e71a94c4443ed0051d87097b98891acf2,2024-10-21T17:09:45.417000
@ -263068,8 +263088,8 @@ CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76
CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
CVE-2024-50311,1,1,673baaa29832ec29e40ef2e3d47df34dc1d10d7389d03beb5f8c46a2e87a0ff0,2024-10-22T14:15:19.450000
CVE-2024-50312,1,1,c64596e697a11e7fbe1b0878c7d8da7e4a1b9ec94a567221a61a57e09b010e21,2024-10-22T14:15:19.973000
CVE-2024-50311,0,0,673baaa29832ec29e40ef2e3d47df34dc1d10d7389d03beb5f8c46a2e87a0ff0,2024-10-22T14:15:19.450000
CVE-2024-50312,0,0,c64596e697a11e7fbe1b0878c7d8da7e4a1b9ec94a567221a61a57e09b010e21,2024-10-22T14:15:19.973000
CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000
CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
@ -264737,7 +264757,7 @@ CVE-2024-6955,0,0,a26f625ecf124adff42bb43bc9f1e0c8d32b78d7fbf99f165aa453f32a4235
CVE-2024-6956,0,0,402b3b90bc0ef6eea6fea2da2c73e896560064f50f2a4d52cad793cf96bb3277,2024-08-21T17:35:59.550000
CVE-2024-6957,0,0,b4f44e4de7831c46c7995591b032592b6aa63f3442f007561464731699c5213c,2024-08-21T17:33:42.753000
CVE-2024-6958,0,0,815ebcc0d5fc84aab6c67001f06fe76ce9152d116a343e60ea5524ee95f4434e,2024-08-21T17:42:29.697000
CVE-2024-6959,0,1,2979894cb6a452e0b42932dad0034ff9396cd2b285ee4d2288644288267536cd,2024-10-22T14:02:57.660000
CVE-2024-6959,0,0,2979894cb6a452e0b42932dad0034ff9396cd2b285ee4d2288644288267536cd,2024-10-22T14:02:57.660000
CVE-2024-6960,0,0,932ef4036cbd886ee22297597ffd985e884d3c0cad50613ff0bd32ecdcd39a17,2024-08-01T14:00:50.973000
CVE-2024-6961,0,0,c26f41db6b5c6e22104567980ea901ebcdc3d0c6ac8c59905ee37ac020ae3afe,2024-08-01T14:00:51.710000
CVE-2024-6962,0,0,b8054e2d59ceccdcd4628c1dbc900d3f0c22ab58e2eaf33700d9d63f648dd237,2024-07-25T15:47:18.363000
@ -265473,8 +265493,8 @@ CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000
CVE-2024-7888,0,0,57ff3b28678f008c2bdd72bf81b6e5b1bbb449b0748e8292d87b9d1342b8d17e,2024-09-27T13:45:33.030000
CVE-2024-7889,0,1,8f4cdef609827730a9cb2f8ad45b312addf6698f361e0182fcc41d26379da297,2024-10-22T14:50:55.187000
CVE-2024-7890,0,1,a6a2cdaf8fa24b7c70bfeed12ed4dadb214245a77f1cdad93eee0ad6e9de59e7,2024-10-22T14:53:32.763000
CVE-2024-7889,0,0,8f4cdef609827730a9cb2f8ad45b312addf6698f361e0182fcc41d26379da297,2024-10-22T14:50:55.187000
CVE-2024-7890,0,0,a6a2cdaf8fa24b7c70bfeed12ed4dadb214245a77f1cdad93eee0ad6e9de59e7,2024-10-22T14:53:32.763000
CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000
CVE-2024-7892,0,0,2c771bb8577e200bacd6c43e315ff1bcb3900b37f1489eacc31e5f9c96a3f146,2024-10-07T17:26:49.607000
CVE-2024-7895,0,0,5d06451cedf9987fa35d6bed95786130c1c32b54d5cc7bebb800749e8d9738bd,2024-09-19T22:13:37.097000
@ -266195,7 +266215,7 @@ CVE-2024-8970,0,0,ac6a340d484c123a9130b7a8da1b91e0090b1836f7865857c5a2324dbb60a4
CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000
CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae149149381,2024-10-16T17:10:13.220000
CVE-2024-8980,1,1,ab8ec6030d8159f710ee21cdfc696408d9afd11cf59f459033246e03d1a15983,2024-10-22T15:15:07.337000
CVE-2024-8980,0,0,ab8ec6030d8159f710ee21cdfc696408d9afd11cf59f459033246e03d1a15983,2024-10-22T15:15:07.337000
CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000
CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
@ -266242,7 +266262,7 @@ CVE-2024-9046,0,0,8656f1201ca0039377fd822b96252cedb47d7d532a98f822fda06fa6ad4421
CVE-2024-9047,0,0,4ea7d0b1b11f6de8ec31e11947f5e76892006c92ffae382a37fca981e56bba3b,2024-10-15T12:57:46.880000
CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000
CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000
CVE-2024-9050,0,0,14129a5f05505d4e465f96c2bc8c9664e1202efe095f7995c49d65466ad68f7d,2024-10-22T13:15:02.410000
CVE-2024-9050,0,1,60723fac2bf439bb1adcc7283747d4d8d7e0afa3e6de58e8a91bfd3f499e46a9,2024-10-22T17:15:06.420000
CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000
CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
@ -266295,6 +266315,7 @@ CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c6
CVE-2024-9124,0,0,ed784b79f60c57333454c5582ccee1e6855416a99a054b161105f40c65181fb5,2024-10-10T12:56:30.817000
CVE-2024-9125,0,0,178fee32dc964661b9c65fa72adfd723833bc712092eacf5141ac942799ac520,2024-10-01T14:00:52.460000
CVE-2024-9127,0,0,2a57398f5cef1966c50482248e5fdb86e0eae0bed7d0a3c554fbb9c182ab0a8a,2024-10-01T14:09:26.017000
CVE-2024-9129,1,1,134f7ece5b3cefa919b3f6de8c2759de84aa703b1114c3e9b5f02710bae06ae5,2024-10-22T17:15:06.557000
CVE-2024-9130,0,0,c55ec493e0918bdc6346df7de1c7b50119b1912e830881716d5b60020f91e1cd,2024-10-04T17:18:59.130000
CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a1f,2024-10-01T14:28:31.027000
CVE-2024-9137,0,0,264d67370ab0f50b8c3f1048814084fcd11d0d542a946dd3f8623532739c7355,2024-10-15T12:57:46.880000
@ -266331,7 +266352,7 @@ CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab2191
CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000
CVE-2024-9204,0,0,f5f991f4ad7621e1bd7fe1b28f2260110bc4f49be8b0fb440d3c802fe287a27c,2024-10-16T14:26:41.423000
CVE-2024-9205,0,0,f51eb73f6ff5e878b874b1fc87e2002dcbff618e0eb4a751eb85e6ba7e0830aa,2024-10-15T14:16:53.337000
CVE-2024-9206,0,1,f2744d9088cb2b46074d22abdd833bb28847b84eac15877357583dce73a10136,2024-10-22T15:27:08.847000
CVE-2024-9206,0,0,f2744d9088cb2b46074d22abdd833bb28847b84eac15877357583dce73a10136,2024-10-22T15:27:08.847000
CVE-2024-9207,0,0,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000
CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000
CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000
@ -266375,6 +266396,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f
CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000
CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000
CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000
CVE-2024-9287,1,1,3de2c43f5b9341b2c2d4d558e92dd45b9e29b5a5149d5bb65c4e8390fe8f56dd,2024-10-22T17:15:06.697000
CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000
CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000
CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000
@ -266420,24 +266442,24 @@ CVE-2024-9350,0,0,290e64557c531b1051792213fe1cd034817a07f758e3a220c124933ec4bc84
CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000
CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000
CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000
CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000
CVE-2024-9355,0,1,9fd824909ba068088861a875cafcc5135d14a5e660ace6b963f9d0d130917184,2024-10-22T17:15:06.853000
CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000
CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000
CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a7446,2024-10-04T18:53:58.020000
CVE-2024-9361,0,0,4693288d6f9b770f354b271d3230619579a50994dbc41bcafd3fa00ed196033b,2024-10-18T12:52:33.507000
CVE-2024-9364,0,1,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000
CVE-2024-9366,0,1,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000
CVE-2024-9364,0,0,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000
CVE-2024-9366,0,0,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000
CVE-2024-9368,0,0,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000
CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000
CVE-2024-9373,0,1,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000
CVE-2024-9373,0,0,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000
CVE-2024-9375,0,0,232ace92ca49be5c1a33c93abd9a6f17ed5ee21ca74aacf34cd6b513a369ea2a,2024-10-10T20:44:02.900000
CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5eaf,2024-10-15T14:18:12.483000
CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000
CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000
CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000
CVE-2024-9381,0,0,b7ffa8189ba636e7b223831995cd87655bb323db0a8ce57a0037b68bd6c82df8,2024-10-16T13:30:34.740000
CVE-2024-9382,0,1,9974cbae3b65aba95d0b7e51ea5485cc9f96ba1c03eee8eb0122ba4567d68e55,2024-10-22T14:31:49.097000
CVE-2024-9383,0,1,bcbb779641918c0449c8c1e715b100b70d4ebd612997069770f4fe494807a125,2024-10-22T14:27:13.377000
CVE-2024-9382,0,0,9974cbae3b65aba95d0b7e51ea5485cc9f96ba1c03eee8eb0122ba4567d68e55,2024-10-22T14:31:49.097000
CVE-2024-9383,0,0,bcbb779641918c0449c8c1e715b100b70d4ebd612997069770f4fe494807a125,2024-10-22T14:27:13.377000
CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000
CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000
CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000
@ -266472,7 +266494,7 @@ CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836
CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000
CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000
CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000
CVE-2024-9452,0,0,611328d50c3715494f831c5942738c614750e5d97f90d9d50fc04089aa82bed2,2024-10-18T12:52:33.507000
CVE-2024-9452,0,1,7eb2217e5eb4f5560cd9b75a09c78b5c11eea85f09a819264a7f744adf0ba17a,2024-10-22T16:23:59.420000
CVE-2024-9455,0,0,70bc73495623b6fab8931499505a6be70a8937392cffccc260a57663b280a262,2024-10-07T17:48:28.117000
CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8eeb,2024-10-15T14:23:57.307000
CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000
@ -266508,7 +266530,7 @@ CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca7
CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000
CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
CVE-2024-9537,0,0,452190c6664f6422cc10e3635c7e8aae7087139e3819c6b70da7292d35f00d48,2024-10-22T01:00:02.043000
CVE-2024-9537,0,1,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794abf,2024-10-22T17:33:23.837000
CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000
CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000
CVE-2024-9540,0,0,155792833f2c3d33a8c6cc679a0bdb6a5ac3f76d67aede19f5592875c2f877b6,2024-10-16T16:38:14.557000
@ -266574,7 +266596,7 @@ CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
CVE-2024-9674,0,1,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000
CVE-2024-9676,0,0,d31717e3bcb8586d94edf5a821882c847af5c510cf5d1e8e5ea8ab53ee1286ab,2024-10-16T16:38:43.170000
CVE-2024-9677,0,0,7cf8d43d57c2900d9443e482797783848d861069497504cccb5159525ba63cae,2024-10-22T02:15:04.380000
@ -266583,7 +266605,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
CVE-2024-9703,0,1,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000
CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000
CVE-2024-9704,0,0,44ebf677ae69495b92126e2eb8d9d17c07544c8235e40f4412f83b24b48e2f3a,2024-10-15T12:57:46.880000
CVE-2024-9707,0,0,cde0816a76e7682ea9f7dc3a69f12238a4d95599cfec418d205198361a6879cf,2024-10-15T12:58:51.050000
CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da6473,2024-10-15T12:57:46.880000
@ -266630,7 +266652,7 @@ CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c
CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000
CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000
CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000
CVE-2024-9848,0,0,c9c868f8b4dfcb8a16c343ca24b48f00207606de4438d4f715e98402b24e1592,2024-10-18T12:52:33.507000
CVE-2024-9848,0,1,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000
CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000
CVE-2024-9858,0,0,bef02c0d9ed07a4afa527340189d49e60d5c238f08809a01d4eade734c583a54,2024-10-16T17:35:08.130000
@ -266644,7 +266666,7 @@ CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c4
CVE-2024-9888,0,0,de5de1e3177c72ea1d0a5d19aa48b1693390bd1baf1f85524c962ffa2c18433f,2024-10-16T16:38:14.557000
CVE-2024-9889,0,0,ae2d8b3ae5ea45b7bf6ef4fc45ab8d1cf63876d506d81aa02cc186300793ec67,2024-10-21T17:10:22.857000
CVE-2024-9891,0,0,53ec4da3ba927732190105b9993cdfaefd46788f3c82dc582d229482b0eb1fcc,2024-10-16T16:38:14.557000
CVE-2024-9892,0,1,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714ba,2024-10-22T15:46:17.880000
CVE-2024-9892,0,0,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714ba,2024-10-22T15:46:17.880000
CVE-2024-9893,0,0,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000
CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000
CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000

Can't render this file because it is too large.