diff --git a/CVE-2013/CVE-2013-59xx/CVE-2013-5919.json b/CVE-2013/CVE-2013-59xx/CVE-2013-5919.json index f255b2f1d21..eb42ddbf2a8 100644 --- a/CVE-2013/CVE-2013-59xx/CVE-2013-5919.json +++ b/CVE-2013/CVE-2013-59xx/CVE-2013-5919.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5919", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-30T14:55:08.397", - "lastModified": "2018-10-30T16:27:53.280", + "lastModified": "2024-10-22T17:11:30.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -61,6 +61,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6FE08247-BC07-4968-BFE0-491D761BD438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E768D8A2-18A9-4CA7-96E2-FF3393A380A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3EE65908-798A-4872-BD17-F42CA1C33898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BBFF0E62-6B39-4562-A261-1C3E3A587977" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "0BEFC8EC-9C9C-49D9-93DE-D5D091709E32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD31DFD-F92C-4535-88AE-41E3AA402FD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2AB6FA42-3CAF-4EAD-8A00-6CC1C41B91F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "DD7AAB17-29B5-4423-ACCB-6C8A06B0F641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7068B8FB-5689-4A9D-ABFC-D7BE19A0BEFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:1.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "8396101C-CC57-4692-A505-47F30F12647C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:openinfosecfoundation:suricata:*:*:*:*:*:*:*:*", @@ -106,56 +156,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.4:rc_1:*:*:*:*:*:*", "matchCriteriaId": "CB6535F9-8DB6-475A-AE93-65BDD9E3E9A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B8FED9C4-46FA-4EA2-B7D3-2F28620AD8A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "701BED72-481E-45AE-A949-BF6C71C932AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5C376E8F-783E-47E8-B078-251297C02964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FEA1821C-4DE1-4DBA-B557-8BF863EB2AFF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "14C3C311-C719-43EE-A1D6-C4B7A7D96156" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7824CF78-D5F7-4FC0-98FD-D639CAA2A7BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1448D780-F020-40C9-B3EC-D3DC909CC056" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C646DF6D-8EA3-4560-B220-F5A72EA37C3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "16296DF4-8A23-4459-B98C-4A500573812B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "18A20846-B612-4839-B693-6E8E7F632415" } ] } diff --git a/CVE-2018/CVE-2018-102xx/CVE-2018-10242.json b/CVE-2018/CVE-2018-102xx/CVE-2018-10242.json index 4fd722fb7f9..4356c269e94 100644 --- a/CVE-2018/CVE-2018-102xx/CVE-2018-10242.json +++ b/CVE-2018/CVE-2018-102xx/CVE-2018-10242.json @@ -2,7 +2,7 @@ "id": "CVE-2018-10242", "sourceIdentifier": "cve@mitre.org", "published": "2019-04-04T15:29:00.377", - "lastModified": "2019-05-06T17:00:24.877", + "lastModified": "2024-10-22T17:11:30.463", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:4.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "05DD0327-9366-44E6-A979-A62A8BD5CCDB" + "criteria": "cpe:2.3:a:oisf:suricata:4.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E70E3C16-A589-4B73-8B36-F3924DDF5F31" } ] } diff --git a/CVE-2018/CVE-2018-102xx/CVE-2018-10244.json b/CVE-2018/CVE-2018-102xx/CVE-2018-10244.json index 973d7f3f393..7209dcc2127 100644 --- a/CVE-2018/CVE-2018-102xx/CVE-2018-10244.json +++ b/CVE-2018/CVE-2018-102xx/CVE-2018-10244.json @@ -2,7 +2,7 @@ "id": "CVE-2018-10244", "sourceIdentifier": "cve@mitre.org", "published": "2019-04-04T16:29:00.273", - "lastModified": "2019-04-07T01:24:48.190", + "lastModified": "2024-10-22T17:11:30.463", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:4.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "05DD0327-9366-44E6-A979-A62A8BD5CCDB" + "criteria": "cpe:2.3:a:oisf:suricata:4.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E70E3C16-A589-4B73-8B36-F3924DDF5F31" } ] } diff --git a/CVE-2019/CVE-2019-186xx/CVE-2019-18625.json b/CVE-2019/CVE-2019-186xx/CVE-2019-18625.json index 7c147e7be41..d8ffb55ee69 100644 --- a/CVE-2019/CVE-2019-186xx/CVE-2019-18625.json +++ b/CVE-2019/CVE-2019-186xx/CVE-2019-18625.json @@ -2,7 +2,7 @@ "id": "CVE-2019-18625", "sourceIdentifier": "cve@mitre.org", "published": "2020-01-06T21:15:11.427", - "lastModified": "2023-02-01T19:24:01.150", + "lastModified": "2024-10-22T17:11:30.463", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -86,8 +86,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:5.0.0:-:*:*:*:*:*:*", - "matchCriteriaId": "E53901EA-04BF-41AB-BE28-841F040F2C2A" + "criteria": "cpe:2.3:a:oisf:suricata:5.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "43F8D25A-DA90-4CD5-BC77-E0B151372D3F" } ] }, diff --git a/CVE-2019/CVE-2019-187xx/CVE-2019-18792.json b/CVE-2019/CVE-2019-187xx/CVE-2019-18792.json index 62fab9f9302..5fa2e80e18d 100644 --- a/CVE-2019/CVE-2019-187xx/CVE-2019-18792.json +++ b/CVE-2019/CVE-2019-187xx/CVE-2019-18792.json @@ -2,7 +2,7 @@ "id": "CVE-2019-18792", "sourceIdentifier": "cve@mitre.org", "published": "2020-01-06T18:15:23.183", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-10-22T17:11:30.463", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,15 +85,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.1.5", "versionEndExcluding": "4.1.6", - "matchCriteriaId": "E9F969C0-A5A7-47C5-ACF1-6A01D9CE0CE4" + "matchCriteriaId": "FE67AEB2-4237-48F9-97F5-D80071AD27F2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:suricata-ids:suricata:5.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9E393ADB-16B5-4ED1-AB51-7D853FA8FD57" + "criteria": "cpe:2.3:a:oisf:suricata:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91532ED8-EDCD-4220-9E0F-552B3D3C8AB4" } ] } diff --git a/CVE-2022/CVE-2022-238xx/CVE-2022-23861.json b/CVE-2022/CVE-2022-238xx/CVE-2022-23861.json new file mode 100644 index 00000000000..98b414f0d2b --- /dev/null +++ b/CVE-2022/CVE-2022-238xx/CVE-2022-23861.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2022-23861", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T16:15:04.897", + "lastModified": "2024-10-22T16:15:04.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/mbadanoiu/CVE-2022-23861", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://ysoft.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-238xx/CVE-2022-23862.json b/CVE-2022/CVE-2022-238xx/CVE-2022-23862.json new file mode 100644 index 00000000000..3e08b352f1c --- /dev/null +++ b/CVE-2022/CVE-2022-238xx/CVE-2022-23862.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2022-23862", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T16:15:05.443", + "lastModified": "2024-10-22T16:15:05.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the \"NT Authority\\System\" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/mbadanoiu/CVE-2022-23862", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mbadanoiu/CVE-2022-23862/blob/main/SafeQ%20-%20CVE-2022-23862.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://ysoft.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-27xx/CVE-2022-2742.json b/CVE-2022/CVE-2022-27xx/CVE-2022-2742.json index f30443bdee0..118ef1f8cd5 100644 --- a/CVE-2022/CVE-2022-27xx/CVE-2022-2742.json +++ b/CVE-2022/CVE-2022-27xx/CVE-2022-2742.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2742", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-01-02T23:15:10.567", - "lastModified": "2023-08-08T14:22:24.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T17:35:00.793", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-27xx/CVE-2022-2743.json b/CVE-2022/CVE-2022-27xx/CVE-2022-2743.json index 9c798073f2c..c98cb5eaa51 100644 --- a/CVE-2022/CVE-2022-27xx/CVE-2022-2743.json +++ b/CVE-2022/CVE-2022-27xx/CVE-2022-2743.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2743", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-01-02T23:15:10.620", - "lastModified": "2023-01-09T19:15:51.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:01.157", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3842.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3842.json index b479be0819d..914b4cc9851 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3842.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3842.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3842", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-01-02T23:15:10.677", - "lastModified": "2023-01-09T19:15:21.247", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:03.307", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0471.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0471.json index 6edd0880448..b3904c0e0c6 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0471.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0471.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0471", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-01-30T09:15:08.790", - "lastModified": "2023-02-06T21:42:57.417", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:06.327", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20803.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20803.json index 17ea290ac35..f9f24fb2492 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20803.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20803.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20803", "sourceIdentifier": "security@mediatek.com", "published": "2023-08-07T04:15:13.867", - "lastModified": "2023-08-09T17:50:30.643", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:07.320", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20804.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20804.json index 5b75f53a34e..4422085d9b0 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20804.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20804.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20804", "sourceIdentifier": "security@mediatek.com", "published": "2023-08-07T04:15:13.930", - "lastModified": "2023-08-09T17:53:15.283", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:08.190", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20805.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20805.json index 2104b32d7cc..defb4c65300 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20805.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20805.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20805", "sourceIdentifier": "security@mediatek.com", "published": "2023-08-07T04:15:13.993", - "lastModified": "2023-08-09T17:53:38.957", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:08.963", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27602.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27602.json index d870e8114c5..001f7ef89ab 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27602.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27602.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27602", "sourceIdentifier": "security@apache.org", "published": "2023-04-10T08:15:06.967", - "lastModified": "2023-04-19T12:15:08.170", + "lastModified": "2024-10-22T16:35:09.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27603.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27603.json index 60e2d95ce41..b44ec551aa5 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27603.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27603.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27603", "sourceIdentifier": "security@apache.org", "published": "2023-04-10T08:15:07.133", - "lastModified": "2023-04-14T19:45:47.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:10.000", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28706.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28706.json index ca9960c8d0a..f3c6770c186 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28706.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28706.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28706", "sourceIdentifier": "security@apache.org", "published": "2023-04-07T15:15:08.017", - "lastModified": "2023-04-14T14:23:05.247", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:10.210", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28710.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28710.json index 60b9a7c19eb..f762c5762e8 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28710.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28710.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28710", "sourceIdentifier": "security@apache.org", "published": "2023-04-07T15:15:08.113", - "lastModified": "2023-05-22T14:27:01.200", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:10.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29215.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29215.json index 4bbb39ae97c..43cecb3c611 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29215.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29215.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29215", "sourceIdentifier": "security@apache.org", "published": "2023-04-10T08:15:07.237", - "lastModified": "2023-04-13T18:16:08.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:10.597", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29216.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29216.json index cc4544f960b..6b0f8c56d3f 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29216.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29216.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29216", "sourceIdentifier": "security@apache.org", "published": "2023-04-10T08:15:07.290", - "lastModified": "2023-04-13T18:16:11.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:10.780", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30465.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30465.json index 2ea057894ba..57ee680e06b 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30465.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30465.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30465", "sourceIdentifier": "security@apache.org", "published": "2023-04-11T15:15:10.673", - "lastModified": "2023-04-18T19:30:08.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:10.960", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json index 741177b775c..47beb7b86af 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4046", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.847", - "lastModified": "2024-10-21T19:24:02.230", + "lastModified": "2024-10-22T16:35:14.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json index 1b970dc69ea..1fb40e30d8c 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4047", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.903", - "lastModified": "2024-10-21T19:24:02.230", + "lastModified": "2024-10-22T16:35:15.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json index d917dfc32e9..47f8f3618b2 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45230", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:11.727", - "lastModified": "2024-03-13T02:15:50.157", + "lastModified": "2024-10-22T16:35:13.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json index ce60282a21e..1bec63f275b 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json @@ -2,13 +2,17 @@ "id": "CVE-2023-49567", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.143", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-22T16:39:16.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in the Bitdefender Total Security HTTPS scanning functionality where the product incorrectly checks the site's certificate, which allows an attacker to make MITM SSL connections to an arbitrary site. The product trusts certificates that are issued using the MD5 and SHA1 collision hash functions which allow attackers to create rogue certificates that appear legitimate." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en la funci\u00f3n de an\u00e1lisis HTTPS de Bitdefender Total Security, en la que el producto comprueba incorrectamente el certificado del sitio, lo que permite a un atacante realizar conexiones SSL MITM a un sitio arbitrario. El producto conf\u00eda en los certificados emitidos mediante las funciones hash de colisi\u00f3n MD5 y SHA1, lo que permite a los atacantes crear certificados falsos que parecen leg\u00edtimos." } ], "metrics": { @@ -55,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -69,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*", + "versionEndExcluding": "27.0.25.115", + "matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-certificates-using-collision-hash-functions-in-bitdefender-total-security-https-scanning-va-11239/", - "source": "cve-requests@bitdefender.com" + "source": "cve-requests@bitdefender.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49570.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49570.json index 9e95f862b1f..6edc2f8dd4d 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49570.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49570.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49570", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T09:15:02.770", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:26:47.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*", + "versionEndExcluding": "27.0.25.115", + "matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-basic-constraints-certificate-in-bitdefender-total-security-https-scanning-va-11210/", - "source": "cve-requests@bitdefender.com" + "source": "cve-requests@bitdefender.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json index c2e0277c908..48c3b0367cc 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6055", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.387", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-22T16:39:00.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*", + "versionEndExcluding": "27.0.25.115", + "matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93" + } + ] + } + ] + } + ], "references": [ { "url": "https://bitdefender.com/support/security-advisories/improper-certificate-validation-in-bitdefender-total-security-https-scanning-va-11158/", - "source": "cve-requests@bitdefender.com" + "source": "cve-requests@bitdefender.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json index 59ce96b2695..d8f02e6f9f4 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6056", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.500", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-22T16:38:43.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*", + "versionEndExcluding": "27.0.25.115", + "matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-self-signed-certificates-in-bitdefender-total-security-https-scanning-va-11164/", - "source": "cve-requests@bitdefender.com" + "source": "cve-requests@bitdefender.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json index 08b1b73c034..aecfb692de9 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6057", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.627", - "lastModified": "2024-10-22T16:00:07.397", + "lastModified": "2024-10-22T16:38:29.767", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -66,19 +66,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", - "baseScore": 6.8, - "baseSeverity": "MEDIUM" + "baseScore": 7.4, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 2.2, "impactScore": 5.2 }, { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6824.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6824.json index 9abb0d351e8..cd307661132 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6824.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6824.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6824", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-16T16:15:13.920", - "lastModified": "2024-01-23T15:35:27.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-22T16:35:16.083", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10055.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10055.json index e0a46f06cad..060aafaead0 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10055.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10055", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T08:15:03.843", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:28:59.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,18 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:click_to_chat:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.4", + "matchCriteriaId": "64C989BB-93E2-4412-B1EF-74FAEC7844A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3169768/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/support-chat/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b4c13600-0791-4ade-9c28-f43f164aedae?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10078.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10078.json index b088d429899..5e42d723ac9 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10078.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10078.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10078", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T08:15:04.060", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:28:26.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -51,106 +71,199 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.4", + "matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L111", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L112", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L113", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L114", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L115", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L116", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L117", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L118", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L119", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L120", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L121", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L122", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L123", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L124", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L125", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L126", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L127", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L128", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L129", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L130", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L131", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L132", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L133", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L134", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d12c4b1c-23d0-430f-a6ea-0a3ab487ed10?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10079.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10079.json index 7576b215454..c31c2ca70dd 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10079.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10079", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T08:15:04.300", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:27:54.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.4", + "matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L1318", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d038f1a2-4755-417f-965d-508b57c05738?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10080.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10080.json index 99f33e8a9f2..c903f9f8a45 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10080.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10080", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T08:15:04.507", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:27:38.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.4", + "matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L1622", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1bee1eeb-5354-47c9-9ae1-b1608d87d7bb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10131.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10131.json index e53a1c4acbf..87046687a9c 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10131.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10131.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10131", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-19T04:15:05.300", - "lastModified": "2024-10-21T17:10:22.857", + "lastModified": "2024-10-22T17:15:03.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,19 +22,19 @@ "type": "Secondary", "cvssData": { "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ] diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10173.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10173.json index d0161742903..260878e48d4 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10173.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10173", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T05:15:02.830", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-22T17:05:13.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,26 +150,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:didiglobal:ddmq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AA66207A-D4D3-4B53-9922-7C3769E241F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/didi/DDMQ/issues/37", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/didi/DDMQ/issues/37#issue-2577905007", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280957", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280957", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.421516", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json index 2b99e1b21b9..083b11b1089 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20421", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.193", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-22T17:51:08.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,99 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.0.2", + "matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*", + "matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.2.5", + "matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*", + "matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.2.5", + "matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*", + "matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40083.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40083.json index 51642cba8bd..647e5102b23 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40083.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40083.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40083", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.703", - "lastModified": "2024-10-21T21:15:05.703", + "lastModified": "2024-10-22T17:35:03.297", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Buffer Overflow vulnerabilty in the local_app_set_router_token function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via sscanf reading the token and timezone JSON fields into a fixed-length buffer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://vilo.com", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40084.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40084.json index c457108af99..44a1f92efbe 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40084.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40084.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40084", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.770", - "lastModified": "2024-10-21T21:15:05.770", + "lastModified": "2024-10-22T17:35:04.057", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Buffer Overflow in the Boa webserver of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via exceptionally long HTTP methods or paths." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://vilo.com", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40085.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40085.json index c4c7c424d5c..2cc5f1e498a 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40085.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40085.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40085", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.853", - "lastModified": "2024-10-21T21:15:05.853", + "lastModified": "2024-10-22T17:35:04.843", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Buffer Overflow vulnerability in the local_app_set_router_wan function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via pppoe_username and pppoe_password fields being larger than 128 bytes in length." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://vilo.com", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40086.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40086.json index 2532ce194d7..50d11a6d7e7 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40086.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40086.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40086", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.923", - "lastModified": "2024-10-21T21:15:05.923", + "lastModified": "2024-10-22T17:35:05.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Buffer Overflow vulnerability in the local_app_set_router_wifi_SSID_PWD function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via a password field larger than 64 bytes in length." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://vilo.com", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40087.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40087.json index ac49e175900..09ffb2b70e0 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40087.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40087.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40087", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:06.003", - "lastModified": "2024-10-21T21:15:06.003", + "lastModified": "2024-10-22T17:35:06.420", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Insecure Permissions. Lack of authentication in the custom TCP service on port 5432 allows remote, unauthenticated attackers to gain administrative access over the router." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://vilo.com", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40089.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40089.json index f02f6784f5b..238a7797dbd 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40089.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40089.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40089", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:06.150", - "lastModified": "2024-10-21T21:15:06.150", + "lastModified": "2024-10-22T17:35:07.167", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Command Injection vulnerability in Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, authenticated attackers to execute arbitrary code by injecting shell commands into the name of the Vilo device." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://vilo.com", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40090.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40090.json index 1e4755aadbd..9e20eaa43ed 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40090.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40090.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40090", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:06.223", - "lastModified": "2024-10-21T21:15:06.223", + "lastModified": "2024-10-22T17:35:07.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Information Disclosure. An information leak in the Boa webserver allows remote, unauthenticated attackers to leak memory addresses of uClibc and the stack via sending a GET request to the index page." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "http://vilo.com", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40091.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40091.json index 7f15100e6a1..0253d7e42a7 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40091.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40091.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40091", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:06.313", - "lastModified": "2024-10-21T21:15:06.313", + "lastModified": "2024-10-22T17:35:08.760", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 lacks authentication in the Boa webserver, which allows remote, unauthenticated attackers to retrieve logs with sensitive system." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://vilo.com", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json index 84cf3b4935d..84f46d1d180 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43611", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.240", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-22T16:01:19.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,10 +65,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43611", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45518.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45518.json new file mode 100644 index 00000000000..9ec03c1ecd7 --- /dev/null +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45518.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-45518", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:03.837", + "lastModified": "2024-10-22T17:15:03.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wiki.zimbra.com/wiki/Security_Center", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json new file mode 100644 index 00000000000..f8afe84bfcc --- /dev/null +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46240", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T16:15:07.407", + "lastModified": "2024-10-22T16:15:07.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under action=system and the company/contact parameters under action=addcust within admin.php file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46538.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46538.json new file mode 100644 index 00000000000..a3e35ce4d94 --- /dev/null +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46538.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46538", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:03.950", + "lastModified": "2024-10-22T17:15:03.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in pfsense v2.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $pconfig variable at interfaces_groups_edit.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/physicszq/web_issue/blob/main/pfsense/interfaces_groups_edit_file.md_xss.md", + "source": "cve@mitre.org" + }, + { + "url": "https://redmine.pfsense.org/issues/15778", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47485.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47485.json index 95d35f045fc..2b801c72ae1 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47485.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47485", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-10-18T09:15:03.093", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:23:22.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,68 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hikvision:hikcentral_master:*:*:*:*:lite:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "126DB70D-715D-4BC7-8038-0316BA2890DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/", - "source": "hsrc@hikvision.com" + "source": "hsrc@hikvision.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json index 849b04949a7..77646c09b7e 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47486", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-10-18T09:15:03.217", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:11:07.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,67 @@ "baseSeverity": "LOW" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hikvision:hikcentral_master:*:*:*:*:lite:*:*:*", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "9BC8FAE8-57D7-4D5C-A6CA-97AE26FCBC65" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/", - "source": "hsrc@hikvision.com" + "source": "hsrc@hikvision.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47487.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47487.json index 389c0b097d9..c3c2b0c03e1 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47487.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47487", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-10-18T09:15:03.400", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:10:08.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,68 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hikvision:hikcentral_professional:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.6.1", + "matchCriteriaId": "569288FC-D541-4CF0-AC58-30048842B620" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/", - "source": "hsrc@hikvision.com" + "source": "hsrc@hikvision.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json index 976856a75f4..8c782ac8266 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47676", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:04.687", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:12:39.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -11,19 +11,89 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb.c: fix UAF of vma in hugetlb fault pathway\n\nSyzbot reports a UAF in hugetlb_fault(). This happens because\nvmf_anon_prepare() could drop the per-VMA lock and allow the current VMA\nto be freed before hugetlb_vma_unlock_read() is called.\n\nWe can fix this by using a modified version of vmf_anon_prepare() that\ndoesn't release the VMA lock on failure, and then release it ourselves\nafter hugetlb_vma_unlock_read()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "451C50ED-169E-4E8C-BFD9-95D0C8C3231C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/98b74bb4d7e96b4da5ef3126511febe55b76b807", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d59ebc99dee0a2687a26df94b901eb8216dbf876", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e897d184a8dd4a4e1f39c8c495598e4d9472776c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json index ce9e8dba524..f9290a970e4 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json @@ -2,28 +2,102 @@ "id": "CVE-2024-47746", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.667", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:00:35.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set\n\nThis may be a typo. The comment has said shared locks are\nnot allowed when this bit is set. If using shared lock, the\nwait in `fuse_file_cached_io_open` may be forever." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fuse: use un bloqueo exclusivo cuando FUSE_I_CACHE_IO_MODE est\u00e1 configurado. Esto puede ser un error tipogr\u00e1fico. El comentario dec\u00eda que no se permiten bloqueos compartidos cuando este bit est\u00e1 configurado. Si se usa un bloqueo compartido, la espera en `fuse_file_cached_io_open` puede ser eterna." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "451C50ED-169E-4E8C-BFD9-95D0C8C3231C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/2f3d8ff457982f4055fe8f7bf19d3821ba22c376", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4e181761ffec67307157a7e8a78d58ee4130cf00", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa4890bd8237e5a1e7428acd7328729db2703b23", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json index 2d035197947..6dd8540708c 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47747", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.753", - "lastModified": "2024-10-22T15:09:13.173", + "lastModified": "2024-10-22T16:11:40.627", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.0, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 1.0, "impactScore": 5.9 } ] diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json index 0999b7d8753..9ff9ba1db54 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47749", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.950", - "lastModified": "2024-10-22T15:00:29.497", + "lastModified": "2024-10-22T16:08:31.637", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 6.5, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json index 4ab3f6ac064..b2111f3f984 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47752", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.203", - "lastModified": "2024-10-22T15:04:46.523", + "lastModified": "2024-10-22T16:11:09.037", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 6.5, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json index 3aca83335ad..9086d925422 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47753", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.283", - "lastModified": "2024-10-22T15:04:18.277", + "lastModified": "2024-10-22T16:10:40.380", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 6.5, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json index 5fdf59685f4..adeff6674fa 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47754", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.377", - "lastModified": "2024-10-22T15:03:31.147", + "lastModified": "2024-10-22T16:10:21.907", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 6.5, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json index 7091e105763..359b88d809c 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47756", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.550", - "lastModified": "2024-10-22T15:02:11.467", + "lastModified": "2024-10-22T16:09:56.570", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 6.5, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47819.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47819.json new file mode 100644 index 00000000000..c3f583fc0cc --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47819.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47819", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-22T16:15:07.500", + "lastModified": "2024-10-22T16:15:07.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Umbraco, a free and open source .NET content management system, has a cross-site scripting vulnerability starting in version 14.0.0 and prior to versions 14.3.1 and 15.0.0. This can be leveraged to gain access to higher-privilege endpoints, e.g. if you get a user with admin privileges to run the code, you can potentially elevate all users and grant them admin privileges or access protected content. Versions 14.3.1 and 15.0.0 contain a patch. As a workaround, ensure that access to the Dictionary section is only granted to trusted users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-c5g6-6xf7-qxp3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json new file mode 100644 index 00000000000..9d66a678e8c --- /dev/null +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48570", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:04.087", + "lastModified": "2024-10-22T17:15:04.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Client Management System 1.0 was discovered to contain a SQL injection vulnerability via the Between Dates Reports parameter at /admin/bwdates-reports-ds.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Luc1f3r066/Client-Management-System-v1.0-", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48605.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48605.json new file mode 100644 index 00000000000..5f96807a6d0 --- /dev/null +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48605.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-48605", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T16:15:07.757", + "lastModified": "2024-10-22T16:15:07.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Helakuru Desktop Application v1.1 allows a local attacker to execute arbitrary code via the lack of proper validation of the wow64log.dll file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://clement.notin.org/blog/2020/09/12/CVE-2020-7315-McAfee-Agent-DLL-injection/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/surajhacx/HelakuruV.1.1-DLLHijack", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/%40xNEED/dll-hijacking-jagexlauncher-819599165822", + "source": "cve@mitre.org" + }, + { + "url": "https://www.exploit-db.com/exploits/51461", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json new file mode 100644 index 00000000000..a06fdc8c94b --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48706", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:04.180", + "lastModified": "2024-10-22T17:15:04.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the title parameter with action=add or action=editform within the (a) managemessage.php file and (b) managetask.php file respectively." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json new file mode 100644 index 00000000000..a7b99b958c8 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48707", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:04.273", + "lastModified": "2024-10-22T17:15:04.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under (a) action=add or action=edit within managemilestone.php file and (b) action=addpro within admin.php file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS3.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json new file mode 100644 index 00000000000..cac0b4138c8 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48708", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:04.370", + "lastModified": "2024-10-22T17:15:04.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Collabtive 3.1 is vulnerable to Cross-Site Scripting (XSS) via the name parameter in (a) file tasklist.php under action = add/edit and in (b) file admin.php under action = adduser/edituser." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS4.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48925.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48925.json new file mode 100644 index 00000000000..3f2dc38ed3c --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48925.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-48925", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-22T16:15:07.853", + "lastModified": "2024-10-22T16:15:07.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Umbraco, a free and open source .NET content management system, has an improper access control issue starting in version 14.0.0 and prior to version 14.3.0. The issue allows low-privilege users to access the webhook API and retrieve information that should be restricted to users with access to the settings section. Version 14.3.0 contains a patch." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-4gp9-ff99-j6vj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48926.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48926.json new file mode 100644 index 00000000000..347df65e238 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48926.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48926", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-22T16:15:08.090", + "lastModified": "2024-10-22T16:15:08.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Umbraco, a free and open source .NET content management system, has an insufficient session expiration issue in versions on the 13.x branch prior to 13.5.2, 10.x prior to 10.8.7, and 8.x prior to 8.18.15. The Backoffice displays the logout page with a session timeout message before the server session has fully expired, causing users to believe they have been logged out approximately 30 seconds before they actually are. Versions 13.5.2, 10.8,7, and 8.18.15 contain a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-fp6q-gccw-7qqm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48927.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48927.json new file mode 100644 index 00000000000..71570e2a9b5 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48927.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48927", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-22T16:15:08.360", + "lastModified": "2024-10-22T16:15:08.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Umbraco, a free and open source .NET content management system, has a remote code execution issue in versions on the 13.x branch prior to 13.5.2, 10.x prior to 10.8.7, and 8.x prior to 8.18.15. There is a potential risk of code execution for Backoffice users when they \u201cpreview\u201d SVG files in full screen mode. Versions 13.5.2, 10.8,7, and 8.18.15 contain a patch for the issue. As a workaround, derver-side file validation is available to strip script tags from file's content during the file upload process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-5955-cwv4-h7qh", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48929.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48929.json new file mode 100644 index 00000000000..546910ef9fb --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48929.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48929", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-22T16:15:08.617", + "lastModified": "2024-10-22T16:15:08.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Umbraco is a free and open source .NET content management system. In versions on the 13.x branch prior to 13.5.2 and versions on the 10.x branch prior to 10.8.7, during an explicit sign-out, the server session is not fully terminated. Versions 13.5.2 and 10.8.7 contain a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wxw9-6pv9-c3xc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49208.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49208.json new file mode 100644 index 00000000000..5dc9b80bced --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49208.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-49208", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:04.503", + "lastModified": "2024-10-22T17:15:04.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Archer Platform 2024.03 before version 2024.08 is affected by an authorization bypass vulnerability related to supporting application files. A remote unprivileged attacker could potentially exploit this vulnerability to elevate their privileges and delete system icons." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545", + "source": "cve@mitre.org" + }, + { + "url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49209.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49209.json new file mode 100644 index 00000000000..36a65be4757 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49209.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-49209", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:05.763", + "lastModified": "2024-10-22T17:15:05.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Archer Platform 2024.03 before version 2024.09 is affected by an API authorization bypass vulnerability related to supporting application files. A remote unprivileged attacker could potentially exploit this vulnerability to elevate their privileges and upload additional system icons." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545", + "source": "cve@mitre.org" + }, + { + "url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49210.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49210.json new file mode 100644 index 00000000000..876859c860f --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49210.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-49210", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:05.970", + "lastModified": "2024-10-22T17:15:05.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Reflected XSS was discovered in an iView List Archer Platform UX page in Archer Platform 6.x before version 2024.09. A remote unauthenticated attacker could potentially exploit this by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and executed by the web browser in the context of the vulnerable web application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545", + "source": "cve@mitre.org" + }, + { + "url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49211.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49211.json new file mode 100644 index 00000000000..816483e714e --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49211.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-49211", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-22T17:15:06.193", + "lastModified": "2024-10-22T17:15:06.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Reflected XSS was discovered in a Dashboard Listing Archer Platform UX page in Archer Platform 6.x before version 2024.08. A remote unauthenticated attacker could potentially exploit this by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and executed by the web browser in the context of the vulnerable web application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545", + "source": "cve@mitre.org" + }, + { + "url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49373.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49373.json new file mode 100644 index 00000000000..93140081e13 --- /dev/null +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49373.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-49373", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-22T16:15:08.860", + "lastModified": "2024-10-22T16:15:08.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "No Fuss Computing Centurion ERP is open source enterprise resource planning (ERP) software. Prior to version 1.2.1, an authenticated user can view projects within organizations they are not apart of. Version 1.2.1 fixes the problem." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nofusscomputing/centurion_erp/commit/c3a4685200faa060167d4fde86e806dc91eddcae", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nofusscomputing/centurion_erp/pull/358", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nofusscomputing/centurion_erp/security/advisories/GHSA-5qmx-pr2f-qhj5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49615.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49615.json index 01aff22a860..bd6d3a5aba6 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49615.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49615.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49615", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:04.690", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:43:14.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:henriquerodrigues:safetyforms:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "B2B347EB-4A6A-4D4C-821E-18B688A74A5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/safetymails-forms/wordpress-safetyforms-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49616.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49616.json index 0a14c92ead4..dcfa75f5d87 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49616.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49616.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49616", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:04.903", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:41:58.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nyasro:rate_own_post:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "25EB6F93-D409-49FF-B598-0CC78E15AAFD" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/rate-own-post/wordpress-rate-own-post-plugin-1-0-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49617.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49617.json index 9a4b92f5029..5488aaa6f7c 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49617.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49617.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49617", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:05.130", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:51:35.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bhaskardhote:back_link_tracker:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "DD111F5C-5BB5-4770-B263-3727C61EB314" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/back-link-tracker/wordpress-back-link-tracker-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49618.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49618.json index 5061718f883..20e55222b7d 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49618.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49618.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49618", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:05.347", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:50:18.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jordanlyall:mytweetlinks:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.1", + "matchCriteriaId": "748A3C09-C3A5-4B9B-8BDD-3AF5016A4905" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mytweetlinks/wordpress-mytweetlinks-plugin-1-1-1-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json index 1c7d4220c40..5586b58baa6 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json @@ -2,36 +2,130 @@ "id": "CVE-2024-49850", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.797", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:12:14.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos\n\nIn case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL\nreferencing a non-existing BTF type, function bpf_core_calc_relo_insn\nwould cause a null pointer deference.\n\nFix this by adding a proper check upper in call stack, as malformed\nrelocation records could be passed from user space.\n\nSimplest reproducer is a program:\n\n r0 = 0\n exit\n\nWith a single relocation record:\n\n .insn_off = 0, /* patch first instruction */\n .type_id = 100500, /* this type id does not exist */\n .access_str_off = 6, /* offset of string \"0\" */\n .kind = BPF_CORE_TYPE_ID_LOCAL,\n\nSee the link for original reproducer or next commit for a test case." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: maneja correctamente reubicaciones BPF_CORE_TYPE_ID_LOCAL malformadas En caso de un registro de reubicaci\u00f3n malformado del tipo BPF_CORE_TYPE_ID_LOCAL que haga referencia a un tipo BTF inexistente, la funci\u00f3n bpf_core_calc_relo_insn causar\u00eda una desreferencia de puntero nulo. Solucione esto agregando una verificaci\u00f3n superior adecuada en la pila de llamadas, ya que los registros de reubicaci\u00f3n malformados podr\u00edan pasarse desde el espacio de usuario. El reproductor m\u00e1s simple es un programa: r0 = 0 exit Con un solo registro de reubicaci\u00f3n: .insn_off = 0, /* parchear la primera instrucci\u00f3n */ .type_id = 100500, /* este id de tipo no existe */ .access_str_off = 6, /* desplazamiento de la cadena \"0\" */ .kind = BPF_CORE_TYPE_ID_LOCAL, Consulte el enlace para el reproductor original o la pr\u00f3xima confirmaci\u00f3n para un caso de prueba." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "09358D68-A717-469E-B900-8002A642E29A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/2288b54b96dcb55bedebcef3572bb8821fc5e708", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d2786d65aaa954ebd3fcc033ada433e10da21c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/584cd3ff792e1edbea20b2a7df55897159b0be3e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc7ce14f00bcd50641f2110b7a32aa6552e0780f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7e9c5b2dda29067332df2a85b0141a92b41f218", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json index 99993438de2..513dfc483a4 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49855", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.270", - "lastModified": "2024-10-22T15:17:29.283", + "lastModified": "2024-10-22T16:12:27.030", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.0, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 1.0, "impactScore": 5.9 } ] diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json index ec06e52453d..550c50cb7e0 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49859", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.627", - "lastModified": "2024-10-22T15:24:57.640", + "lastModified": "2024-10-22T16:13:03.267", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 5.3, + "baseScore": 4.7, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 1.0, "impactScore": 3.6 } ] @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-362" } ] } diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9050.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9050.json index 923fb463e86..70d8388259f 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9050.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9050.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9050", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-22T13:15:02.410", - "lastModified": "2024-10-22T13:15:02.410", + "lastModified": "2024-10-22T17:15:06.420", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -36,6 +36,10 @@ ] }, "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:8312", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9050", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9129.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9129.json new file mode 100644 index 00000000000..2edd2857103 --- /dev/null +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9129.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9129", + "sourceIdentifier": "security@puppet.com", + "published": "2024-10-22T17:15:06.557", + "lastModified": "2024-10-22T17:15:06.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In versions of Zend Server 8.5 and prior to version 9.2 a format string injection was discovered. \n\nReported by Dylan Marino" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@puppet.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@puppet.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-134" + } + ] + } + ], + "references": [ + { + "url": "https://portal.perforce.com/s/detail/a91PA000001SYZFYA4", + "source": "security@puppet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json new file mode 100644 index 00000000000..7b1c38a2433 --- /dev/null +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-9287", + "sourceIdentifier": "cna@python.org", + "published": "2024-10-22T17:15:06.697", + "lastModified": "2024-10-22T17:15:06.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@python.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "GREEN", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "cna@python.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/python/cpython/issues/124651", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/pull/124712", + "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/", + "source": "cna@python.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9355.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9355.json index 94b7436e8eb..445de33ed11 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9355.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9355.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9355", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-01T19:15:09.793", - "lastModified": "2024-10-04T13:51:25.567", + "lastModified": "2024-10-22T17:15:06.853", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -60,6 +60,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:7550", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:8327", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9355", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9452.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9452.json index 0c29f1d01ce..6565d431254 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9452.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9452.json @@ -2,20 +2,44 @@ "id": "CVE-2024-9452", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:07.607", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:23:59.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Branding para WordPress es vulnerable a Cross-Site Scripting almacenado mediante cargas de archivos SVG en todas las versiones hasta la 1.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -47,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gurieveugen\\&vitaliyshebela:branding:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "F579BE43-2D93-4F36-A54D-3D8EE16054AA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/branding/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8736cf81-3fb8-4c81-a878-7d73a3e68fc2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9537.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9537.json index 025a554d1bd..646a863fdaf 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9537.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9537", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-10-18T15:15:04.170", - "lastModified": "2024-10-22T01:00:02.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T17:33:23.837", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-10-21", "cisaActionDue": "2024-11-11", @@ -65,6 +65,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "type": "Secondary", @@ -87,42 +107,108 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "12.1.3", + "matchCriteriaId": "4BFE7072-C420-4186-8441-AD5A531382EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.0", + "versionEndExcluding": "12.2.3", + "matchCriteriaId": "BE089841-BC12-4DF6-86A3-71AF46CC2345" + } + ] + } + ] + } + ], "references": [ { "url": "https://arcticwolf.com/resources/blog/rackspace-breach-linked-to-zero-day-vulnerability-sciencelogic-sl1s-third-party-utility/", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Press/Media Coverage" + ] }, { "url": "https://community.sciencelogic.com/blog/latest-kb-articles-and-known-issues-blog-board/week-of-september-30-2024---latest-kb-articles-and-known-issues-part-1-of-2/1690", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://rackspace.service-now.com/system_status?id=detailed_status&service=4dafca5a87f41610568b206f8bbb35a6", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.sciencelogic.com/s/article/15465", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Permissions Required" + ] }, { "url": "https://support.sciencelogic.com/s/article/15527", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Permissions Required" + ] }, { "url": "https://twitter.com/ynezzor/status/1839931641172467907", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.bleepingcomputer.com/news/security/rackspace-monitoring-data-stolen-in-sciencelogic-zero-day-attack/", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Press/Media Coverage" + ] }, { "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9537", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.theregister.com/2024/09/30/rackspace_zero_day_attack/", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Press/Media Coverage" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9848.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9848.json index 2c5c212329b..55ac2b48fc4 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9848.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9848.json @@ -2,20 +2,44 @@ "id": "CVE-2024-9848", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:07.807", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-22T16:42:25.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Product Customizer Light plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Product Customizer Light para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.0.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -47,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:k2-service:product_customizer_light:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "6D4CD46E-314B-44E3-AEB7-C4489853D8A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/product-customizer-light/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18d1feee-347c-4f43-a01b-67b3d0a5b2d6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 5c890d7d9b9..1cb64271a09 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-22T16:00:52.758050+00:00 +2024-10-22T18:00:41.619481+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-22T16:00:07.397000+00:00 +2024-10-22T17:51:08.113000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -266711 +266733 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `22` -- [CVE-2024-10234](CVE-2024/CVE-2024-102xx/CVE-2024-10234.json) (`2024-10-22T14:15:14.573`) -- [CVE-2024-26271](CVE-2024/CVE-2024-262xx/CVE-2024-26271.json) (`2024-10-22T15:15:05.523`) -- [CVE-2024-26272](CVE-2024/CVE-2024-262xx/CVE-2024-26272.json) (`2024-10-22T15:15:05.740`) -- [CVE-2024-26273](CVE-2024/CVE-2024-262xx/CVE-2024-26273.json) (`2024-10-22T15:15:05.937`) -- [CVE-2024-38002](CVE-2024/CVE-2024-380xx/CVE-2024-38002.json) (`2024-10-22T15:15:06.277`) -- [CVE-2024-43173](CVE-2024/CVE-2024-431xx/CVE-2024-43173.json) (`2024-10-22T15:15:06.800`) -- [CVE-2024-43177](CVE-2024/CVE-2024-431xx/CVE-2024-43177.json) (`2024-10-22T15:15:07.020`) -- [CVE-2024-50311](CVE-2024/CVE-2024-503xx/CVE-2024-50311.json) (`2024-10-22T14:15:19.450`) -- [CVE-2024-50312](CVE-2024/CVE-2024-503xx/CVE-2024-50312.json) (`2024-10-22T14:15:19.973`) -- [CVE-2024-8980](CVE-2024/CVE-2024-89xx/CVE-2024-8980.json) (`2024-10-22T15:15:07.337`) +- [CVE-2022-23861](CVE-2022/CVE-2022-238xx/CVE-2022-23861.json) (`2024-10-22T16:15:04.897`) +- [CVE-2022-23862](CVE-2022/CVE-2022-238xx/CVE-2022-23862.json) (`2024-10-22T16:15:05.443`) +- [CVE-2024-45518](CVE-2024/CVE-2024-455xx/CVE-2024-45518.json) (`2024-10-22T17:15:03.837`) +- [CVE-2024-46240](CVE-2024/CVE-2024-462xx/CVE-2024-46240.json) (`2024-10-22T16:15:07.407`) +- [CVE-2024-46538](CVE-2024/CVE-2024-465xx/CVE-2024-46538.json) (`2024-10-22T17:15:03.950`) +- [CVE-2024-47819](CVE-2024/CVE-2024-478xx/CVE-2024-47819.json) (`2024-10-22T16:15:07.500`) +- [CVE-2024-48570](CVE-2024/CVE-2024-485xx/CVE-2024-48570.json) (`2024-10-22T17:15:04.087`) +- [CVE-2024-48605](CVE-2024/CVE-2024-486xx/CVE-2024-48605.json) (`2024-10-22T16:15:07.757`) +- [CVE-2024-48706](CVE-2024/CVE-2024-487xx/CVE-2024-48706.json) (`2024-10-22T17:15:04.180`) +- [CVE-2024-48707](CVE-2024/CVE-2024-487xx/CVE-2024-48707.json) (`2024-10-22T17:15:04.273`) +- [CVE-2024-48708](CVE-2024/CVE-2024-487xx/CVE-2024-48708.json) (`2024-10-22T17:15:04.370`) +- [CVE-2024-48925](CVE-2024/CVE-2024-489xx/CVE-2024-48925.json) (`2024-10-22T16:15:07.853`) +- [CVE-2024-48926](CVE-2024/CVE-2024-489xx/CVE-2024-48926.json) (`2024-10-22T16:15:08.090`) +- [CVE-2024-48927](CVE-2024/CVE-2024-489xx/CVE-2024-48927.json) (`2024-10-22T16:15:08.360`) +- [CVE-2024-48929](CVE-2024/CVE-2024-489xx/CVE-2024-48929.json) (`2024-10-22T16:15:08.617`) +- [CVE-2024-49208](CVE-2024/CVE-2024-492xx/CVE-2024-49208.json) (`2024-10-22T17:15:04.503`) +- [CVE-2024-49209](CVE-2024/CVE-2024-492xx/CVE-2024-49209.json) (`2024-10-22T17:15:05.763`) +- [CVE-2024-49210](CVE-2024/CVE-2024-492xx/CVE-2024-49210.json) (`2024-10-22T17:15:05.970`) +- [CVE-2024-49211](CVE-2024/CVE-2024-492xx/CVE-2024-49211.json) (`2024-10-22T17:15:06.193`) +- [CVE-2024-49373](CVE-2024/CVE-2024-493xx/CVE-2024-49373.json) (`2024-10-22T16:15:08.860`) +- [CVE-2024-9129](CVE-2024/CVE-2024-91xx/CVE-2024-9129.json) (`2024-10-22T17:15:06.557`) +- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-10-22T17:15:06.697`) ### CVEs modified in the last Commit -Recently modified CVEs: `82` +Recently modified CVEs: `67` -- [CVE-2024-47747](CVE-2024/CVE-2024-477xx/CVE-2024-47747.json) (`2024-10-22T15:09:13.173`) -- [CVE-2024-47749](CVE-2024/CVE-2024-477xx/CVE-2024-47749.json) (`2024-10-22T15:00:29.497`) -- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-22T15:04:46.523`) -- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-22T15:04:18.277`) -- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-22T15:03:31.147`) -- [CVE-2024-47755](CVE-2024/CVE-2024-477xx/CVE-2024-47755.json) (`2024-10-22T15:46:38.027`) -- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-22T15:02:11.467`) -- [CVE-2024-47757](CVE-2024/CVE-2024-477xx/CVE-2024-47757.json) (`2024-10-22T15:54:48.830`) -- [CVE-2024-49613](CVE-2024/CVE-2024-496xx/CVE-2024-49613.json) (`2024-10-22T15:29:55.203`) -- [CVE-2024-49614](CVE-2024/CVE-2024-496xx/CVE-2024-49614.json) (`2024-10-22T15:34:09.190`) -- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-22T15:17:29.283`) -- [CVE-2024-49857](CVE-2024/CVE-2024-498xx/CVE-2024-49857.json) (`2024-10-22T15:48:42.347`) -- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-22T15:24:57.640`) -- [CVE-2024-6959](CVE-2024/CVE-2024-69xx/CVE-2024-6959.json) (`2024-10-22T14:02:57.660`) -- [CVE-2024-7889](CVE-2024/CVE-2024-78xx/CVE-2024-7889.json) (`2024-10-22T14:50:55.187`) -- [CVE-2024-7890](CVE-2024/CVE-2024-78xx/CVE-2024-7890.json) (`2024-10-22T14:53:32.763`) -- [CVE-2024-9206](CVE-2024/CVE-2024-92xx/CVE-2024-9206.json) (`2024-10-22T15:27:08.847`) -- [CVE-2024-9364](CVE-2024/CVE-2024-93xx/CVE-2024-9364.json) (`2024-10-22T15:26:10.673`) -- [CVE-2024-9366](CVE-2024/CVE-2024-93xx/CVE-2024-9366.json) (`2024-10-22T15:09:48.177`) -- [CVE-2024-9373](CVE-2024/CVE-2024-93xx/CVE-2024-9373.json) (`2024-10-22T15:07:23.907`) -- [CVE-2024-9382](CVE-2024/CVE-2024-93xx/CVE-2024-9382.json) (`2024-10-22T14:31:49.097`) -- [CVE-2024-9383](CVE-2024/CVE-2024-93xx/CVE-2024-9383.json) (`2024-10-22T14:27:13.377`) -- [CVE-2024-9674](CVE-2024/CVE-2024-96xx/CVE-2024-9674.json) (`2024-10-22T14:02:50.473`) -- [CVE-2024-9703](CVE-2024/CVE-2024-97xx/CVE-2024-9703.json) (`2024-10-22T15:25:27.887`) -- [CVE-2024-9892](CVE-2024/CVE-2024-98xx/CVE-2024-9892.json) (`2024-10-22T15:46:17.880`) +- [CVE-2024-40091](CVE-2024/CVE-2024-400xx/CVE-2024-40091.json) (`2024-10-22T17:35:08.760`) +- [CVE-2024-43611](CVE-2024/CVE-2024-436xx/CVE-2024-43611.json) (`2024-10-22T16:01:19.373`) +- [CVE-2024-47485](CVE-2024/CVE-2024-474xx/CVE-2024-47485.json) (`2024-10-22T16:23:22.890`) +- [CVE-2024-47486](CVE-2024/CVE-2024-474xx/CVE-2024-47486.json) (`2024-10-22T16:11:07.547`) +- [CVE-2024-47487](CVE-2024/CVE-2024-474xx/CVE-2024-47487.json) (`2024-10-22T16:10:08.027`) +- [CVE-2024-47676](CVE-2024/CVE-2024-476xx/CVE-2024-47676.json) (`2024-10-22T16:12:39.830`) +- [CVE-2024-47746](CVE-2024/CVE-2024-477xx/CVE-2024-47746.json) (`2024-10-22T16:00:35.703`) +- [CVE-2024-47747](CVE-2024/CVE-2024-477xx/CVE-2024-47747.json) (`2024-10-22T16:11:40.627`) +- [CVE-2024-47749](CVE-2024/CVE-2024-477xx/CVE-2024-47749.json) (`2024-10-22T16:08:31.637`) +- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-22T16:11:09.037`) +- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-22T16:10:40.380`) +- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-22T16:10:21.907`) +- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-22T16:09:56.570`) +- [CVE-2024-49615](CVE-2024/CVE-2024-496xx/CVE-2024-49615.json) (`2024-10-22T16:43:14.190`) +- [CVE-2024-49616](CVE-2024/CVE-2024-496xx/CVE-2024-49616.json) (`2024-10-22T16:41:58.513`) +- [CVE-2024-49617](CVE-2024/CVE-2024-496xx/CVE-2024-49617.json) (`2024-10-22T16:51:35.353`) +- [CVE-2024-49618](CVE-2024/CVE-2024-496xx/CVE-2024-49618.json) (`2024-10-22T16:50:18.527`) +- [CVE-2024-49850](CVE-2024/CVE-2024-498xx/CVE-2024-49850.json) (`2024-10-22T16:12:14.193`) +- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-22T16:12:27.030`) +- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-22T16:13:03.267`) +- [CVE-2024-9050](CVE-2024/CVE-2024-90xx/CVE-2024-9050.json) (`2024-10-22T17:15:06.420`) +- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-10-22T17:15:06.853`) +- [CVE-2024-9452](CVE-2024/CVE-2024-94xx/CVE-2024-9452.json) (`2024-10-22T16:23:59.420`) +- [CVE-2024-9537](CVE-2024/CVE-2024-95xx/CVE-2024-9537.json) (`2024-10-22T17:33:23.837`) +- [CVE-2024-9848](CVE-2024/CVE-2024-98xx/CVE-2024-9848.json) (`2024-10-22T16:42:25.867`) ## Download and Usage diff --git a/_state.csv b/_state.csv index dc2d9a5d72b..68c6cddb11e 100644 --- a/_state.csv +++ b/_state.csv @@ -63138,7 +63138,7 @@ CVE-2013-5915,0,0,368d20521458dfd67f96a5930cda6772edd7252de200104ef31ef51939f90d CVE-2013-5916,0,0,b0d284bafa3ac6246187547ee2d43684ad1236bff154114e61e3a3cf31f28810,2014-05-09T17:42:40.380000 CVE-2013-5917,0,0,638bc89fbb16450da932db01256312e62affb65f570814a57e05659a3af11b92,2013-09-23T19:23:45.877000 CVE-2013-5918,0,0,6126663f639f7e21c569c9ea85ac23b75cd9e059660132fae7fd8284aef28e2b,2013-09-23T22:29:07.197000 -CVE-2013-5919,0,0,30699efb71c093b0e58f24544bf6df97538bcae149af62bf024902b9dff43824,2018-10-30T16:27:53.280000 +CVE-2013-5919,0,1,0adc17bb11f2ed9913c73cca5c613c7fea4d3c599f1f6f5eb6d738930fd51ded,2024-10-22T17:11:30.463000 CVE-2013-5930,0,0,58f14391c3ad819c611b2142260d6a3525ec3ab4e3dcd27e90aedb68e5c54d13,2017-08-29T01:33:53.340000 CVE-2013-5931,0,0,7e3f79c8d8dbe38950577fa1ce89a252dd9f139e65131fb691e22345ef4f0c31,2013-10-15T18:03:40.417000 CVE-2013-5932,0,0,c7fa0da30fdd1df0a4bb0e5d331120001e0abaab1eb852698805535985dd763f,2013-10-03T18:35:43.510000 @@ -111407,9 +111407,9 @@ CVE-2018-10238,0,0,5ce73cfdf6c911ff33f92d929345a4f196b913aa547a8ce47a1937c167cf2 CVE-2018-10239,0,0,b413a71aadf645ae4e886f0aa705ec52a2de7806a1f09a861d8dce143f02edad,2019-06-20T17:17:33.690000 CVE-2018-10240,0,0,502d71f1fe0738d6cd63f255ca904d3701317895a3d0d52edad3a0c6d08616be,2018-06-25T17:04:30.363000 CVE-2018-10241,0,0,e96a43e60e432a1531f502eabdd83306afa8aa26926945ca2aaa1a6a36637314,2018-06-20T14:17:18.543000 -CVE-2018-10242,0,0,f39e96444e074913df132f95302e1e4da40b4d31a29c66625f2e557da5245295,2019-05-06T17:00:24.877000 +CVE-2018-10242,0,1,6239bb33c05dfa81a63f17b2e9a1fdc8e16d715b4d7e738f2a88de6db03f5eff,2024-10-22T17:11:30.463000 CVE-2018-10243,0,0,b53749bcaaacf564e23f6a7a8d50a34723505f0b1455fd458f02a46a1fc4083c,2019-04-08T23:29:00.323000 -CVE-2018-10244,0,0,87b877f1834f7e6e54019a805d6b5dc0c4f4374021737fa7ae57be5e904d4fef,2019-04-07T01:24:48.190000 +CVE-2018-10244,0,1,4bb60ec008f032343bd62792cf96edfdce93226bbd029d819e1e37d8d0b2850f,2024-10-22T17:11:30.463000 CVE-2018-10245,0,0,8bae6774155e92f5cb720f0e2f763f381e2a1565088ccfec93c7ee7b948fd8e6,2018-05-18T17:06:54.793000 CVE-2018-10248,0,0,d20f22e2cafcc987233870942fc0f94f1531ddf23af0119f749ea3fa2683e488,2018-05-21T16:40:00.863000 CVE-2018-10249,0,0,b29ed9b3250171b089061b1f6a968f53655a0949f17ffaf296a30927c193d744,2018-05-22T15:00:55.567000 @@ -135737,7 +135737,7 @@ CVE-2019-1862,0,0,73be23ed6169d16a07019413510f2ff1d6d9d5b23423727dad7c525ab7de7b CVE-2019-18622,0,0,1df28778183d6abbb1e44ad7d65ccd139dbfd35d9b86ceb6618f6fa7cbf94666,2023-11-07T03:06:52.997000 CVE-2019-18623,0,0,2d88c594bd920a45844903bf885464713b1665aba2a35a43a772a8a355951563,2019-11-12T18:34:11.033000 CVE-2019-18624,0,0,96b8c4a6d8d884d1986dee07622e67462b6f07d15de4bee67bd69ed2ef6303d4,2023-11-07T03:06:53.063000 -CVE-2019-18625,0,0,37126c8a682671b0ee96b0d7b511e31af3fab89b6d78665f184d4f9a2851de8e,2023-02-01T19:24:01.150000 +CVE-2019-18625,0,1,2602f7b35c60fc7154aef534c6cf964c071202fef48802bb5fcae6f9f3c77eb1,2024-10-22T17:11:30.463000 CVE-2019-18626,0,0,2bcdd33e07732415d4f8d9d13f77081c7fae106c686a2a9db5ec78003bd95c89,2021-07-21T11:39:23.747000 CVE-2019-18628,0,0,0a6571bdb0039cb6bb9b503480f5259e0aae045b719f98155f82586e98649463,2021-03-05T19:25:03.187000 CVE-2019-18629,0,0,979ee48d22f2a4d7bf8f765069349736f6d5e8195e1cb3f2fca8dd5f2767917e,2021-03-11T16:21:42.453000 @@ -135904,7 +135904,7 @@ CVE-2019-18786,0,0,f7b30acdbe06e41ba214eef680ff681b69fd3c81ecd62d74c7d2e45107f6b CVE-2019-1879,0,0,b69bf614f656b8f53aaf6933887d8ce9a93223b5fcdc56f559ea8db64c4607f8,2019-10-09T23:48:25.037000 CVE-2019-18790,0,0,f3ae15afe951af3264c1f39856a167edc0b0d5f4bfd44be838869db02c5b4617,2022-05-13T20:56:27.693000 CVE-2019-18791,0,0,55a8db09b5493780b14bfe0dfd0cd0d7df9ca2af1963058224ac92556a1e1ee6,2020-02-20T21:24:25.883000 -CVE-2019-18792,0,0,46f32578340cee54d6fe0b51c16149b3e6bb38c788ae10f87a59b61256799f01,2021-07-21T11:39:23.747000 +CVE-2019-18792,0,1,b197a0f768336ae7cef9f470042e0204d0d7eb61a7e5ae1a80b5cefbb7b0ff06,2024-10-22T17:11:30.463000 CVE-2019-18793,0,0,388e575fd403449ea4ad2c57a93e31debdd0488e80101e71fbd65a8206a1cdae,2019-11-14T21:14:09.950000 CVE-2019-18794,0,0,ec2d73b58d3f046e284f4910595f05dff351ee3caddd343e457f2053f0491b1d,2020-10-27T15:28:24.953000 CVE-2019-18795,0,0,27f7ec1fb5dab54447ec2b6b844407921f47e51c0d432d565a938f6792e32e2b,2020-10-27T15:28:09.483000 @@ -193038,6 +193038,8 @@ CVE-2022-23856,0,0,ee2cbc2426322388ff1afe7a44f2d91a7a9d83fba9914f637e37fe8ae0521 CVE-2022-23857,0,0,132a872c07af8d8c70261b35abca8d6a153a1859a711a2ed034df1a2f2ae9139,2022-01-27T16:14:04.917000 CVE-2022-23858,0,0,62f1f606d4b9efbf1631daba2d503d290be6f481e4bba2a8ebf7e52bf48393a1,2022-12-09T16:23:45.117000 CVE-2022-2386,0,0,09f49d4259c6ee996cc850650c207ec22add260b3b84ba16b896c572ed7d3292,2022-08-12T14:17:49.413000 +CVE-2022-23861,1,1,749026e9e7284e0036f11dafc4b8939d74e8bac8ff9ef70ec728150a0c070436,2024-10-22T16:15:04.897000 +CVE-2022-23862,1,1,474bfd48b6baee74958d3f1c9028db1fb9db25971396e5181791000be4d0e6c6,2024-10-22T16:15:05.443000 CVE-2022-23863,0,0,718dca3b438e5f32d08c79cae192ff7673ae1521722bf5bc5fb8ef6492a0b31b,2023-08-08T14:22:24.967000 CVE-2022-23865,0,0,34050304e0195f46e2f5ca23d58f867b7e2ee63ec6639e974e762ba109c518b8,2022-04-22T14:12:24.920000 CVE-2022-23868,0,0,c4621856d933568f66278364ad9aeb56e74477fa3255560a959f3a6c8b310a91,2022-04-04T19:47:02.100000 @@ -196004,7 +196006,7 @@ CVE-2022-27413,0,0,1bf73e093b8cb62f8a3eea7413c4a9e4840f866988d4a524423fac3db666a CVE-2022-27416,0,0,a4cd74f6cc29d3b41356401ea2184243259ce93cf3d00d4f6aa912918b191dca,2022-10-28T20:41:07.257000 CVE-2022-27418,0,0,0a070b71ad967ccfd186c4717efb3bff18a60fdc9c3ecc5dfda25532c46f2106,2022-10-28T20:41:04.007000 CVE-2022-27419,0,0,994eb171df1c6d10a249b0df989544ffdff3f15dd8299ac39a5cf0580d7a49a5,2022-04-20T16:56:24.287000 -CVE-2022-2742,0,0,5fc39a3c7ce5b2f7a59724905065558dbd2c69828d2049d6cc525aedf20b8654,2023-08-08T14:22:24.967000 +CVE-2022-2742,0,1,a932d6570b56bf449a11204706597e2b66019b2ee9d75e8e490fdabf3af66f97,2024-10-22T17:35:00.793000 CVE-2022-27420,0,0,a1aa723fc92f893c24e887fab41dfbb10b8f11940622b8f050ec7bc1279b9153,2022-05-11T17:21:57.457000 CVE-2022-27421,0,0,5b85d8359fc7d6211c1b9d8e72de55fe6685172d0646d9efa4d2e51f1d2107f5,2023-08-08T14:21:49.707000 CVE-2022-27422,0,0,fa18bf8ab1e0503ba3808aee3c3c27897296bc3ab8ac65353ffe66abaf3b7c2a,2022-04-25T13:47:36.867000 @@ -196014,7 +196016,7 @@ CVE-2022-27426,0,0,0548985f0e764d200b000bacf7f46d2ba299dcbe47c9accfe9547c1a94db5 CVE-2022-27427,0,0,1414131cea9dc91f1d4275356915d7d04ce3229fc70cc9f37ee59bf12dd491f0,2023-11-07T03:45:19.823000 CVE-2022-27428,0,0,58081a02131b8ff72388ea2009b53ad9b1621e4927caed88d3d8c075db01789e,2022-05-05T15:57:55.750000 CVE-2022-27429,0,0,8526d66670571e284e4a1ab73cb4843dc69fcc0a9e7bcf356fa0c52ba68e1100,2022-05-05T16:27:20.627000 -CVE-2022-2743,0,0,9142752b0c96fb10fbd0217ec3245362a5754f1b937e032c6bd20f233ad63a00,2023-01-09T19:15:51.240000 +CVE-2022-2743,0,1,f5d5bbfe8868cb1452d5eb9dfc018b36b4b74554517421c5f361102aaa4892c1,2024-10-22T16:35:01.157000 CVE-2022-27431,0,0,154579f7591d92b17349e90e315fc1122ad1d1b36589287fbb93e13fad5c6a63,2022-05-11T17:22:52.137000 CVE-2022-27432,0,0,de8f1f5eca7a6676948cac20e35002ea53b59e39eda02c7765812169c7289366,2022-04-05T18:43:08.160000 CVE-2022-27434,0,0,f1d1791ccc358d257a78bfdc203bf6b4bfe96782793f84a355baa0d8ef9023f9,2022-07-25T17:03:12.943000 @@ -204861,7 +204863,7 @@ CVE-2022-38416,0,0,4c73e953a11225a24c20f9776a984ed42b961ec60234b6e4a0cb1561e867d CVE-2022-38417,0,0,840176ac21c9c444344f0342ce4bc4e880d17c981d0888310d9f150288c84d6b,2022-09-20T15:19:48.157000 CVE-2022-38418,0,0,00a17c017bdd87d314e60d0fc7e4c3f09124f453fe2417884ba9ba87f933ac97,2022-10-20T05:43:31.677000 CVE-2022-38419,0,0,5d77f6aa3cf64d420eb5281a0bc12c700e77e20f5118a72ec200f5f1b12fe8d0,2022-10-28T21:14:10.887000 -CVE-2022-3842,0,0,7221468ae704f176204bc6cc11d92b87502254766612140d84194e7f10e672b1,2023-01-09T19:15:21.247000 +CVE-2022-3842,0,1,7cbdb47dde7d69e968b83b2503f5bf65e4910ebe701998b5c810f3de325814c8,2024-10-22T16:35:03.307000 CVE-2022-38420,0,0,e5b829242cd03b9e2375aa26fea21efef5cec261d214c56c088be68999ef45ee,2022-10-20T05:43:52.483000 CVE-2022-38421,0,0,60078496dba3efc7b43c73646ee5f2777a706c1b4add7f448c40a16f0de2ea4a,2022-10-20T05:45:56.967000 CVE-2022-38422,0,0,89736a3c0b28118a69c809c62461820ed3ead456f40b0d4ad535e58644bdbe7c,2022-10-18T19:33:02.870000 @@ -213176,7 +213178,7 @@ CVE-2023-0467,0,0,5293db8836d5f1db0e1f5096a27bcb1433113df02b237566a0e27a20f867bb CVE-2023-0468,0,0,fc23fe7b9211a11b623bdbb98704e621a86f8b2f0533ceb11cc727e0c4cd8436,2023-02-01T15:59:27.927000 CVE-2023-0469,0,0,6431f6fc7e2739ba25419615ad75c75cd9e98861472093ca20181b196405f1eb,2023-02-01T15:58:49.477000 CVE-2023-0470,0,0,4372e365da241629623031d052bfbee0d3928a26394a28ee205196dbe80cd25b,2023-02-02T15:06:12.383000 -CVE-2023-0471,0,0,60f2b40b3a409315e7e46b9dd1e93710adbb9ede6612853879ddbaa4345228fb,2023-02-06T21:42:57.417000 +CVE-2023-0471,0,1,fe31042cd7a9895782885b55eee589dbac971a3346d8dd56bff42e357601f821,2024-10-22T16:35:06.327000 CVE-2023-0472,0,0,64dd50a5ea2446fcb9d9189b51a3c00d794a4e789c557bb0b545792ee3e7c83c,2024-10-17T18:35:03.323000 CVE-2023-0473,0,0,5d1af04a31dd707260ecab2c9353768ceb21646123f7b3879cf47f75e1e91417,2024-10-17T18:35:04.293000 CVE-2023-0474,0,0,ece696f628e220dfc0baf179fd456c53afb38a72b986a7e64878b873cda652ab,2024-10-17T19:35:08.023000 @@ -214966,7 +214968,7 @@ CVE-2023-2056,0,0,54b0ae4fc04ec0efd7229c103683c2930ff5f831061e8f8ceca8837fbf3791 CVE-2023-20560,0,0,4456c42604e8d84ae78603bf586789653bea0524ed4db66bcab5e10c02482283,2023-08-23T16:40:28.757000 CVE-2023-20561,0,0,adb2c260938b34a6cde8cee152fee169eecac2ba79dc3b9a71cd7b36e9d93e73,2023-11-07T04:06:30.730000 CVE-2023-20562,0,0,9eeee6d306bcb80d680502ad0784b113531a741c9dcccd30c407f3009c019e87,2023-08-14T13:34:06.770000 -CVE-2023-20563,0,1,dd4b2ef80961e24e6e0c52afc98605747bd7c93c54acc4af6034289012a21d6f,2024-10-22T14:35:09.970000 +CVE-2023-20563,0,0,dd4b2ef80961e24e6e0c52afc98605747bd7c93c54acc4af6034289012a21d6f,2024-10-22T14:35:09.970000 CVE-2023-20564,0,0,f0eed53fdd20fbad0905e108323c57455e9bb8366a13da5465965e9996efc536,2023-08-23T16:40:10.780000 CVE-2023-20565,0,0,38e6dc11684c0b87d9a62fcc76a2d2c6c5d432536160483f1306ce67c812cd5e,2024-02-13T20:15:52.367000 CVE-2023-20566,0,0,3515285bb0a69e8d7ec99825e5edd97b207c54e2b670ad7975fd3e59b6698a90,2024-06-18T19:15:58.623000 @@ -215188,9 +215190,9 @@ CVE-2023-2080,0,0,e157d4e828722bb0499442360051b052d8336e3a66b9f3d98184689a9dd2e7 CVE-2023-20800,0,0,84eb76953561aeedc870a53eb3e5c810f161a8e2002a06a8689cb690bddbdd65,2023-08-09T13:25:26.837000 CVE-2023-20801,0,0,3f54217e44d01e396e4e56936d1401bc5570f2f6ab2c31efd20c7ef5f222325f,2023-08-09T15:07:45.820000 CVE-2023-20802,0,0,b9dc75b05e578e1b1fdb4b7c06bf0ae88c71275a533562261263d991ebf95f25,2023-08-09T18:07:36.453000 -CVE-2023-20803,0,0,0d39bcd6be5dabad2e56697a68c7e3070efd2b462171a0fedaa711175489ec24,2023-08-09T17:50:30.643000 -CVE-2023-20804,0,0,695c81708d8ae757e2a5e603924e196473f450b47752bba9743fd3f220501f7f,2023-08-09T17:53:15.283000 -CVE-2023-20805,0,0,0441a9b963b7630e6da3ad5f9177fe7390a9c99a0ddd358f8735bc89d884b020,2023-08-09T17:53:38.957000 +CVE-2023-20803,0,1,812495a0c33694b1008949aaef6370c3b57e0d58b87accd7edcbbc20ee96ee97,2024-10-22T16:35:07.320000 +CVE-2023-20804,0,1,8bba2d0119db4a30a7fc0cb32c01afb7e3897eb94df51aab93d98f3fc4e9468e,2024-10-22T16:35:08.190000 +CVE-2023-20805,0,1,35002f2ad8a808fe8601a014ab5af840658aebf9423d776d785e03736f3a6eec,2024-10-22T16:35:08.963000 CVE-2023-20806,0,0,e1212d18c0511e7e8cfd4291bfa0ef21149391f80e70fb9ff2e09af2eb5b38b9,2023-08-09T17:37:27.713000 CVE-2023-20807,0,0,8fa020bbbe74f0a7562bc7d504b6ca273b75d7a6cfd0136f67da777af0db86d9,2023-08-09T17:27:57.637000 CVE-2023-20808,0,0,d3374bef82c5ae7d3411ac49d0b7398ed2ad5002fed4b42ae83978aa59a91864,2023-08-09T17:28:11.923000 @@ -215199,9 +215201,9 @@ CVE-2023-20810,0,0,9014ffac7457887b984cb3fe9f4c15f8a4e5a4854f58d2ea4ec512300d59c CVE-2023-20811,0,0,b7903ce0824ce66840540ea530849a85a5feb909ed92ce382f939556ece9d056,2023-08-09T17:51:24.253000 CVE-2023-20812,0,0,997b0dfa377e83e293eb8d659991d33a06fcae812808f0542463b5c449f0fe56,2023-08-09T17:50:43.650000 CVE-2023-20813,0,0,c2ea6a3a70781d7dbccf1526412ecec6c8f2b8be302634f666f379539f3700d6,2023-08-09T17:50:12.463000 -CVE-2023-20814,0,1,6dcd7add0dff59884de8d97fc80f79cc2b080d1067c869103b251bdb5c0dd602,2024-10-22T15:35:01.240000 -CVE-2023-20815,0,1,6d692414e91394080b5680d8d86c875846bd3ff0b72992a007a21ff563cf950d,2024-10-22T15:35:03.147000 -CVE-2023-20816,0,1,1131530cf748ec967a8d5cafdb57ba7a8ec9f43133a3b610c26506688bc02973,2024-10-22T15:35:04.463000 +CVE-2023-20814,0,0,6dcd7add0dff59884de8d97fc80f79cc2b080d1067c869103b251bdb5c0dd602,2024-10-22T15:35:01.240000 +CVE-2023-20815,0,0,6d692414e91394080b5680d8d86c875846bd3ff0b72992a007a21ff563cf950d,2024-10-22T15:35:03.147000 +CVE-2023-20816,0,0,1131530cf748ec967a8d5cafdb57ba7a8ec9f43133a3b610c26506688bc02973,2024-10-22T15:35:04.463000 CVE-2023-20817,0,0,58f94f12dbbd27ecff4c9c45f02bb5c66ca030778a1e43a6c1041583e7476d0a,2024-10-16T21:35:01.640000 CVE-2023-20818,0,0,45ae32b47377e91ea351a73468b41994cd1d3b4ec51c18c8865d863ed741c606,2023-08-09T17:49:30.607000 CVE-2023-20819,0,0,c056b87b2ebed256b5107aaf5ce311d220de95b3b3db7b11c4effe7a4eed0352,2024-09-21T16:35:01.573000 @@ -220850,8 +220852,8 @@ CVE-2023-27599,0,0,a6d493ce8131b697a60ae09913019e12914de5421c806a4015a87c94c254e CVE-2023-2760,0,0,6c074bf21b2267cd8b569941c67b08360124783f809d3989660a823d47cbf8cc,2023-08-09T11:15:10.280000 CVE-2023-27600,0,0,87e67c606dcb11cbbd6ceba8eb248743b1a9a333ff1372c202bb946110f83bab,2023-11-07T04:10:01.763000 CVE-2023-27601,0,0,3159e0a53214d6adf345915c747947d8090757989992077eaa4e4c5257b56321,2023-11-07T04:10:01.887000 -CVE-2023-27602,0,0,a80eb5b45c9f4866e932d81fc2716a823c094986ad855f7d67ed615e5137a95d,2023-04-19T12:15:08.170000 -CVE-2023-27603,0,0,377363bd944721b07ea3da5dcb27d355b62defd8ba2523bcd4d0bea48c169f2a,2023-04-14T19:45:47.010000 +CVE-2023-27602,0,1,7f58c60ee3e1d01b2a0a080305043c4d403e5bc65d7e63a6526fb0172f83382f,2024-10-22T16:35:09.767000 +CVE-2023-27603,0,1,4f0435dc38032ab417293eac3e5fff2c23f0739a53b3285705d573a4f3084368,2024-10-22T16:35:10 CVE-2023-27604,0,0,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000 CVE-2023-27605,0,0,3c9bd67e7bbc5a970176fa36f2ef3e0bf73a6762632ef035cc42d3a510e378f7,2023-11-10T04:20:00.893000 CVE-2023-27606,0,0,df5a64e8dccf8b9593928c54f55b0be768a1ad798eb4d0e828b503915ddf62a6,2023-07-26T01:18:52.087000 @@ -221852,12 +221854,12 @@ CVE-2023-28702,0,0,322458dc5ce1af990637dfdbb194b4657a53e64709918a6959ad0e26b5d90 CVE-2023-28703,0,0,0f0cebf3a82254d0f256f8ee7ad05786e89f280679305fc77b9a10a202724da0,2024-10-14T04:15:03.210000 CVE-2023-28704,0,0,0ea96abeac4099eb6f8aeff445b717c3ff853eb5b66e71b0c3097300ad8383c5,2024-10-14T04:15:04.400000 CVE-2023-28705,0,0,875ee5eeedcbaf87184e53272462439379c1e8baf901ebbbb714e99fd79f0ba9,2023-06-09T18:14:13.487000 -CVE-2023-28706,0,0,dc130697d6700e0efa045bdf171c1153dcc9ec2ee4acf2311f07dc982e547c07,2023-04-14T14:23:05.247000 +CVE-2023-28706,0,1,50e6020734b1331e0a1f6818c44fa8ed0422882143ec83bad7c87bb811eda5e9,2024-10-22T16:35:10.210000 CVE-2023-28707,0,0,32d4d4aa6f7aca5e473a1393c06496a21c3a1ef5446c39d4c4403f8b4eeb5898,2023-05-22T14:25:13.693000 CVE-2023-28708,0,0,3676b37bd572d293623b1d4d6062d80511a32f4ec94735432036b13d40cac96c,2023-11-07T04:10:49.370000 CVE-2023-28709,0,0,4a374603268a75183fc4d8867975e646438b75b17cc4c5fec221f049409c16f9,2024-02-16T18:20:07.610000 CVE-2023-2871,0,0,c547a7e85685136989871db883e9d8714fc66f889d110c2bfa95d6061d7e85d5,2024-05-17T02:23:19.727000 -CVE-2023-28710,0,0,2f4b323b169897caec0db40f0c6a1cf0096b492a8b3486a44a95ac5973ca18ef,2023-05-22T14:27:01.200000 +CVE-2023-28710,0,1,dcae631d3021e39c45fade16b16079aaa2ed37dd596cab7edaa89a5e7ae291a1,2024-10-22T16:35:10.403000 CVE-2023-28711,0,0,9a7e4692df4128407920abfd535c6e1e6ea2e2404eb6b544486446f8035d5a81,2023-11-07T04:10:49.447000 CVE-2023-28712,0,0,48cede95267e940bcf25c0c4d4718d225f1a658760a29a9cf30284758c8924a6,2023-11-07T04:10:49.617000 CVE-2023-28713,0,0,2fb09d63fae7527d1926c34ea4251376e037b7841aef4deb35a0f81acbe0ed9f,2023-06-08T13:48:05.117000 @@ -222299,8 +222301,8 @@ CVE-2023-29211,0,0,2f68aae87949c796385b01b5a1828d70058a84385271f8341622722895713 CVE-2023-29212,0,0,d1d948d2138c9038dd86dcfdab359a9afdc8b5b5d4ffdcdddb4e37c09c70c30a,2023-04-26T17:12:14.490000 CVE-2023-29213,0,0,a25e4927a17f1e3b6df251fc7f8769e82929bf598e6fcab652dcd30076d4cdee,2023-05-01T14:02:43.807000 CVE-2023-29214,0,0,aa2db31df8e86921819cb9df437c39aa49cc88918aafea9d75db6fa572adfc11,2023-04-26T17:15:26.733000 -CVE-2023-29215,0,0,113754a56d453439fcebbf0d0595ee494fc1b07e85a146a8ee877fb1d01314af,2023-04-13T18:16:08.277000 -CVE-2023-29216,0,0,f5704f274fc731df73cbc78eafa55d0050624eea034d6f99ba0964a551f20424,2023-04-13T18:16:11.797000 +CVE-2023-29215,0,1,5590d54e81ae1c83de926af549ae4ac3ee0f39fa9770392675cd5db1fda940c1,2024-10-22T16:35:10.597000 +CVE-2023-29216,0,1,ad17386fe196604182cfbf47617270a55c1cd069baf7ebbbdd2007698983ae9f,2024-10-22T16:35:10.780000 CVE-2023-29218,0,0,f0282ad8b79cf1bdf860a3575a9a1f598b5604e413bb0608665168800ec76fcc,2024-08-02T14:15:36.417000 CVE-2023-2922,0,0,dc553e71f409f86d2a4e6ca968907fb5462b18e5250b3d03aaf8c3ecb44348a3,2024-05-17T02:23:21.983000 CVE-2023-2923,0,0,55b078298b1195eec01fa938b8be7af85cb16ffb5c08d0c140893148b20a51e4,2024-05-17T02:23:22.090000 @@ -223068,7 +223070,7 @@ CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05 CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000 CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31 CVE-2023-30464,0,0,2219fe2a351a90ed5b4baf0c5b582d478e2ecc8c75596249eb60867c38157102,2024-09-20T12:30:17.483000 -CVE-2023-30465,0,0,03cb642b9d155b8fc540b2b5aab3b36429c8caf9db77ee091c34798766c54d43,2023-04-18T19:30:08.003000 +CVE-2023-30465,0,1,bbb66a417528962547f13dd5a5d32638f3c72abdeaabce4152de7f7162625c60,2024-10-22T16:35:10.960000 CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000 CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000 CVE-2023-30469,0,0,fa32fed5bcf318ec6dc93737679b329fee275c0b22116985f699a53971c9b865,2023-05-30T16:56:04.817000 @@ -230767,7 +230769,7 @@ CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000 CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000 CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000 -CVE-2023-4046,0,0,64889660c90ed96dffb36b392dad990b52f684e74bc2a30c683852e7a3354c73,2024-10-21T19:24:02.230000 +CVE-2023-4046,0,1,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000 CVE-2023-40460,0,0,cb8d4a4b518509c4362ccb8f0afbc3d4ba81059d0c319d00ce1a78f314f5df45,2023-12-08T15:47:41.403000 CVE-2023-40461,0,0,2ca71e2d74941f7db08d3ae15972c35f65a7a1c0b913d4173afa994ddac5a43a,2023-12-08T15:47:23.163000 CVE-2023-40462,0,0,ffd7cbc54880373ae62e24016d5dd35693f5e2718a1f76f9f7406aa53c66dcee,2024-02-02T03:12:25.617000 @@ -230776,7 +230778,7 @@ CVE-2023-40464,0,0,8231b0c451d5b4c35d027e1b67bba80c7df83e1e1ad17ab04a2494355e768 CVE-2023-40465,0,0,c70021b90b2721ff443a40c1111bf31fef348ab6ba2a7cf6bbcd8bc7822299fa,2023-12-08T15:44:51.933000 CVE-2023-40468,0,0,7d84164a8bc2564940a981b796397726ff721c6aa0efdcb2152db15cd7184661,2024-05-03T12:50:12.213000 CVE-2023-40469,0,0,0ed69cdce8225d95cfae6682abc1ebaf65719f0b970e047791ac57fa9c47f189,2024-05-03T12:50:12.213000 -CVE-2023-4047,0,0,53121fc9835c528f43f4e27d812b5d6ec5056bccf0b3eefdb432f2299f21732b,2024-10-21T19:24:02.230000 +CVE-2023-4047,0,1,f5052efbca7ab9c1a8858a3fd8dd92e74171735df43efce1d062d82505d9c615,2024-10-22T16:35:15.043000 CVE-2023-40470,0,0,afada78b6007b2ba33bbf78e11be4d28f3cd22e160c8e61f962a7cebd7f52155,2024-05-03T12:50:12.213000 CVE-2023-40471,0,0,becbb43c9e1a564fe69963a88bb1087ad0f2669a388b9f3e94466c56f3f010c0,2024-05-03T12:50:12.213000 CVE-2023-40472,0,0,63bad795c4e37646c5a06e5ac3ca24cbaa679ad10a3550f3f51a2397791e5a38,2024-05-03T12:50:12.213000 @@ -230855,7 +230857,7 @@ CVE-2023-40546,0,0,6ddbdc19841f6cb290ec2b905e60bc26911fc88c11de04bc8a7d662cb4831 CVE-2023-40547,0,0,aa8c5d2793a75f3ad9a6a915b845d7aafd35608216f0b3f68592a1e5df2bf1b7,2024-09-16T19:16:05.947000 CVE-2023-40548,0,0,dac643ade65c1a191d65ee168a845e302723e7116b47e0d5a4611a62d6447ec0,2024-10-01T14:15:04.700000 CVE-2023-40549,0,0,409bbcdd4cb8887d85ad6922d10081d4ffe6d9a4dd03532a76d9c9a92dc5fdfe,2024-09-16T19:16:06.287000 -CVE-2023-4055,0,1,b9a4e2db898bc031a0ef53e359c900d9555e4306b85b3b351cd9251ac09e8ea9,2024-10-22T15:35:10.980000 +CVE-2023-4055,0,0,b9a4e2db898bc031a0ef53e359c900d9555e4306b85b3b351cd9251ac09e8ea9,2024-10-22T15:35:10.980000 CVE-2023-40550,0,0,7e315e619d697d87543604bbff3ef14f7418177adad4c5f0a7f3c6da81e8e2d8,2024-09-16T19:16:06.450000 CVE-2023-40551,0,0,6015c82d4677150430822f1faf7d1f0c96ba6952a50dbabd6ada6225e4354973,2024-09-16T19:16:06.617000 CVE-2023-40552,0,0,7fe5ec65193750dbc75f8e72724337bc87d791c5b7214d5dca88292f9d38f754,2023-09-08T21:27:56.877000 @@ -234067,7 +234069,7 @@ CVE-2023-45227,0,0,7c7fed76f5d6f3f983df94e726ce31f0b6abeb62d3e6e5afe70912aaeb076 CVE-2023-45228,0,0,f02fdcfce96931a7d3db28875f2dc518b6b7078552506dc86bdb01d18b405427,2023-11-07T19:55:08.333000 CVE-2023-45229,0,0,cfaecc5ce62d696bb446e9b9bba91809f04e1c9f10c9dafb0c3a45094e4067fc,2024-03-07T17:15:10 CVE-2023-4523,0,0,fee4617c65a2bd08463915b79320fa3a3d5417de90db274caa3a49dbf29f46ee,2023-09-29T15:39:05.767000 -CVE-2023-45230,0,0,a73057134b61994748454c25fbd687353eb456bbb28ed90a55327c6e09f91765,2024-03-13T02:15:50.157000 +CVE-2023-45230,0,1,bbc1e53c454be3b8c6530fef54817baece3c9aa241f0307f93c1b246c2ce29d7,2024-10-22T16:35:13.497000 CVE-2023-45231,0,0,c61d6f99e6b778ffd053ed865b56d4aa4b5f162b3b6cc8b456aa5c715886fd2f,2024-03-13T02:15:50.267000 CVE-2023-45232,0,0,ba5e4efd7c8898ba0a2188a57de8bee02b9050addc3e17693fe94e84c3cdd92c,2024-03-13T02:15:50.347000 CVE-2023-45233,0,0,5568807a60c17e2c0ea160a468109a8a204b479c5ab85e97fd6742059d0f249a,2024-03-13T02:15:50.430000 @@ -237206,11 +237208,11 @@ CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000 CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000 CVE-2023-49566,0,0,5d41a2822babeb9ec619211692e91f45235cebac1ffc90794234a82a955c5d4a,2024-07-16T18:06:05.347000 -CVE-2023-49567,0,0,ff5ffedfcb0ff47ec9991291d86d1977abfb466c3e4224ac1c244bb7fa00587b,2024-10-18T12:52:33.507000 +CVE-2023-49567,0,1,193003fcd251d5cde9b049285c29ecf9c4d7248fd85a0cdba0232bb4efc2a37b,2024-10-22T16:39:16.370000 CVE-2023-49568,0,0,e295bf606e29529c11cbbb43abed02bc4423081c2a4c69be87e7b9161aed1898,2024-01-22T17:57:41.193000 CVE-2023-49569,0,0,d61d891c4a84c41eb74d9a85c11d68d30d185ae64e4fcddc4c6e7a3912a15d45,2024-01-22T18:57:03.500000 CVE-2023-4957,0,0,78bb0460b3b0f290da79e035e030dce6be4d514bdd0094dcadf90329259b779e,2023-10-16T14:08:22.900000 -CVE-2023-49570,0,0,fea19fe915958a084bac97051d0a9ebf8bdcfca1a5036a510423c9e45bb2b03a,2024-10-18T12:52:33.507000 +CVE-2023-49570,0,1,f9c7afa434c2b7ac368bce0c36b013ee7d74936062ec20ef84b72c339b1cff41,2024-10-22T16:26:47.317000 CVE-2023-49572,0,0,887de86a687a05ec36d54a2019258a2d8d5e1fc1dbf8ea3bc3a57b5c0467ed12,2024-05-24T18:09:20.027000 CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb7a7,2024-05-24T18:09:20.027000 CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000 @@ -239195,7 +239197,7 @@ CVE-2023-52527,0,0,69feac5279ad296f8c62382461ed563ed5c37ec9a4e9995105c7b03fe18dc CVE-2023-52528,0,0,939a0919c11a416fb09ccd94fbb4242c3c2cc2c0f74810e24bf07ad99dd62190,2024-03-04T13:58:23.447000 CVE-2023-52529,0,0,6fb710ab675e24c4b60b90f8d390bdf0e7583f3fe7abc5ad6111bd5320ab77c9,2024-03-04T13:58:23.447000 CVE-2023-5253,0,0,c4802b58efe25a55292e2d6161746d1a3fe4c3cf13d24e9ae30c1e6051f46d20,2024-09-20T12:15:04.893000 -CVE-2023-52530,0,1,5dfdd9ed8b100e234def8ab6e010dd78e03325be3a4ad9ebc534334c0163f6c2,2024-10-22T15:15:04.720000 +CVE-2023-52530,0,0,5dfdd9ed8b100e234def8ab6e010dd78e03325be3a4ad9ebc534334c0163f6c2,2024-10-22T15:15:04.720000 CVE-2023-52531,0,0,139c545d33ba10eb3343fe2ebed8bb6f85f222cd821926b67d690a1cf30ff498,2024-03-04T13:58:23.447000 CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbfcfe,2024-03-04T13:58:23.447000 CVE-2023-52533,0,0,87288d9acffdcc3f04e0528abc716d93f9a78d72735b2ac13e2dfefa20c9889c,2024-08-26T18:35:02.780000 @@ -239838,7 +239840,7 @@ CVE-2023-5512,0,0,8f255f7600c876ac3f257539ecd63ba70ffd31d409fa952e6e1e6acca138ee CVE-2023-5514,0,0,10af8b6b0b626b561055de6189ef81fc4a75e29fab24339af80cb860ca2be855,2023-11-08T19:36:35.017000 CVE-2023-5515,0,0,91a527d8a3473e517c634177c09d7c6152b47b2cca5db6d0f913eaea36a318d5,2023-11-08T19:28:26.543000 CVE-2023-5516,0,0,ae73e4c23390248a1b340b12bd6e20a04e577dbe67f7bc8cbdc1d9c665aad45e,2023-11-08T19:40:16.980000 -CVE-2023-5517,0,1,07678d2620e60845134465e7e5fab8c3a80cca0b955caa42a72c363e07e4029c,2024-10-22T14:09:02.430000 +CVE-2023-5517,0,0,07678d2620e60845134465e7e5fab8c3a80cca0b955caa42a72c363e07e4029c,2024-10-22T14:09:02.430000 CVE-2023-5519,0,0,37aee9a1129923dc93077477efa909f5ba6fdcb7802f73bac61f5648f04e8d65,2023-11-08T18:43:21.643000 CVE-2023-5520,0,0,844f3dfeec17b0f2ef7eb23244c5ae362e4682ab16bd653f8e0d489e8a8f6789,2023-10-13T15:13:36.757000 CVE-2023-5521,0,0,b63acfc129aa3310a98a296c6b047b557f6d4d113cf2debba604fa2d54e6d526,2023-10-13T18:07:46.757000 @@ -240341,10 +240343,10 @@ CVE-2023-6051,0,0,65166b01dd71515312d91f9d8071d445b248393f92fbfdc73dd7007d9755f5 CVE-2023-6052,0,0,aade2b22db5b4363b4735382f3bc2b9b7b67324ff9b0a0e43ebe15be0d76ef4d,2024-05-17T02:33:29.807000 CVE-2023-6053,0,0,884dd7c884b65418d1acc2ea8b654cbf552035c51290cebacf8d437558597e99,2024-05-17T02:33:29.920000 CVE-2023-6054,0,0,7c33b8bac31ea414624bbc9ce8995053ec355ffc65ef3213af66e1a1cc5d7096,2024-05-17T02:33:30.020000 -CVE-2023-6055,0,0,503fb1072d5a69bee0e88b6ae09189645d07260e6713968dc7d0b8a2bcedf0e4,2024-10-18T12:52:33.507000 -CVE-2023-6056,0,0,35d839e4b514b3336d1caecfe0eacb81ca28eb93db0edbbeacdf9c775d9824ca,2024-10-18T12:52:33.507000 -CVE-2023-6057,0,1,1aba22158a7c27687aeda258fc29ab23338195d15e7a82e758cfc8a4d5d0deed,2024-10-22T16:00:07.397000 -CVE-2023-6058,0,1,80b121b51cef55262f44ff47427075372eaef5bede566f19f4a29d78d39ee80e,2024-10-22T16:00:05.110000 +CVE-2023-6055,0,1,6970d6e1cef11b5752b3c4584db2d30f4d434e7f6ccb260e2dbefee021b56d87,2024-10-22T16:39:00.817000 +CVE-2023-6056,0,1,5d12957ae6e26dc96870feff725dddb10442b06c2d23031fc39cc9503665774e,2024-10-22T16:38:43.993000 +CVE-2023-6057,0,1,bbbddfe2749236535590b210661fb2a64529bd853ca807d86fb37af1e80984cf,2024-10-22T16:38:29.767000 +CVE-2023-6058,0,0,80b121b51cef55262f44ff47427075372eaef5bede566f19f4a29d78d39ee80e,2024-10-22T16:00:05.110000 CVE-2023-6061,0,0,3668adbae0969cfab0fed96f2f0cd588b0f30acaede83213c351da7fed813869,2023-12-12T22:24:14.313000 CVE-2023-6062,0,0,9acfdc2e379d5c765b916ddaf4e9e4b9e3e002ce20adb1082d4167d6fe0776c5,2023-11-29T18:01:56.163000 CVE-2023-6063,0,0,6829cec6327e2b0ca6394f26a21b2458a09f31b0b2f6c2afeecc6087b47b68d1,2023-12-08T14:39:22.200000 @@ -241001,7 +241003,7 @@ CVE-2023-6815,0,0,fc9ec2453f06f961274a47b9ea9b7407d5368b76455379c9e0fea030732b21 CVE-2023-6816,0,0,c3a19bc55b4b85fddd22fe1085c1d2a08de0931d91570a7c34012695db8c4bb7,2024-09-16T16:15:11.937000 CVE-2023-6817,0,0,cc201b8683c94f706ae74ea5adc28642e020b44ac49d90e4b25ea49578f8bc79,2024-02-08T16:15:47.270000 CVE-2023-6821,0,0,1ecc3c576162236f32f9f64a56f7295ad830704c5fedf9bc87d6ba759b1f7e3e,2024-08-30T08:15:04.520000 -CVE-2023-6824,0,0,317fcb7097041988b3396911807cb287d8657125154b4a375fa0829093889531,2024-01-23T15:35:27.123000 +CVE-2023-6824,0,1,76df22784ddc4346f4c678b2af0f6a7ab56f1620c7e41a3d47c4be80e64c0eb6,2024-10-22T16:35:16.083000 CVE-2023-6825,0,0,5f2a6b8900d2ecb14567d0b430ce60a11b72adf0d920af3176450139cc927b08,2024-03-13T18:16:18.563000 CVE-2023-6826,0,0,0b04535adf04b35ffa25089a607bb4494dc5795922b9225750066cd0ade8775d,2023-12-21T04:49:03.117000 CVE-2023-6827,0,0,4fbb204335c244872e27df049bcd8cac30f890d15a7027d76fef2150fca5baaf,2023-12-21T04:48:37.823000 @@ -242333,20 +242335,20 @@ CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02 CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000 CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 -CVE-2024-10055,0,0,6d434f327f323d1d4e7933b0f8db3edb29a6b4c6a11d2f352406cae112cfb5b5,2024-10-18T12:52:33.507000 +CVE-2024-10055,0,1,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000 CVE-2024-10057,0,0,d8a525e53057703eafafe41b97e25f6595177cb8b862a21217c338a0239a3d3c,2024-10-21T20:53:22.813000 CVE-2024-1006,0,0,fe82f3d0065ffa9f2a59eb5b63e144d9442dc24b73dc23626043d548cf903e88,2024-05-17T02:35:09.467000 CVE-2024-10068,0,0,d30a41a047eea99fec87733a3e9cf71e01923d623f7bff84eb08ba80a39dc81d,2024-10-18T12:52:33.507000 -CVE-2024-10069,0,1,5308eb4b652321f9c21627eaa2c30eba36d3e9bdb3c6dfdf40bec48a4f82c2f3,2024-10-22T14:19:58.970000 +CVE-2024-10069,0,0,5308eb4b652321f9c21627eaa2c30eba36d3e9bdb3c6dfdf40bec48a4f82c2f3,2024-10-22T14:19:58.970000 CVE-2024-1007,0,0,bb97efced7fb486712fbb95488bae5086c8742bff2dc7feb7593b966188b1cd7,2024-05-17T02:35:09.577000 -CVE-2024-10070,0,1,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552301,2024-10-22T14:19:40.597000 -CVE-2024-10071,0,1,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000 -CVE-2024-10072,0,1,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000 +CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552301,2024-10-22T14:19:40.597000 +CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000 +CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000 CVE-2024-10073,0,0,36e7a75e8440250867ac4ab2920540c9c319ac3650023a2029f396b9acec7ea2,2024-10-18T12:52:33.507000 -CVE-2024-10078,0,0,0aa7dd836d17776d3cafdf2b21a76b868a43535c39ebfa97d22b166c12681f1e,2024-10-18T12:52:33.507000 -CVE-2024-10079,0,0,16baef55e86d7a7bb7c75a8d8bda456345b338a1ddd8fc352492983721ca02a2,2024-10-18T12:52:33.507000 +CVE-2024-10078,0,1,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000 +CVE-2024-10079,0,1,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000 CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000 -CVE-2024-10080,0,0,7dee1bdb0654db1839e6846f51c6c9699dc09bcdb5e7141706a72d57a008f278,2024-10-18T12:52:33.507000 +CVE-2024-10080,0,1,e70a3cc8d8ca25d9e3db818c04f9b2eeee833bf342884de7579048a734fce30e,2024-10-22T16:27:38.840000 CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000 CVE-2024-10093,0,0,655dbc008c9c21b76c775eaa92108777c983716e956bf10f0085a4f9c49fc737,2024-10-18T12:52:33.507000 CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000 @@ -242367,31 +242369,31 @@ CVE-2024-10128,0,0,88b9e310a7215917b3c3eb4a7cebbad5131b0eb240c8e3b152a59db372aef CVE-2024-10129,0,0,ec801a1f21eba257d935123cd915f870568d53f742fe5aad47c455a4df207feb,2024-10-21T17:10:22.857000 CVE-2024-1013,0,0,0ecf415fc1e3c9674ce36da20d6e67872f02747822a72b780ad0899083ff5765,2024-03-18T12:38:25.490000 CVE-2024-10130,0,0,f6abde51c0a658ac0c1fc5543e76399ba5cf9030b2bf4a0d9258eaf9b51a8cfc,2024-10-21T17:10:22.857000 -CVE-2024-10131,0,0,cb9bf9653b1a7751e7f0fa889c2a9d1f6f68f80fbc6fe883721d1af8aab5c345,2024-10-21T17:10:22.857000 +CVE-2024-10131,0,1,f20c36c39f167240341b3ceff4ad8596e0ac95c8a6ba4794f233acebd21cebe5,2024-10-22T17:15:03.203000 CVE-2024-10133,0,0,6ac712da64da44a34e6fd349fcf3c834370a70c72d69b9a548fcaa7d1fe57ffa,2024-10-21T17:10:22.857000 CVE-2024-10134,0,0,6267065d9c293b3c2366b6219e1002e933ab90f824c948f3e215158bad3a34cd,2024-10-21T17:10:22.857000 CVE-2024-10135,0,0,51210d7ceeda6ad57adce141fb0fe5d97f34f2c51cfc509b6b738e19f13616dc,2024-10-21T17:09:45.417000 -CVE-2024-10136,0,1,17790ffc426ba3f464e327ab05c0c6d36879047b0c8e0a5cf0c1c4a40c857210,2024-10-22T14:15:48.770000 -CVE-2024-10137,0,1,bf8dc737c8c1bd8d279f07a2951d8a27fe63f941562664fe26ac2d8ba987f2ed,2024-10-22T14:17:31.527000 -CVE-2024-10138,0,1,96b8afb0bc9d868623cd6816cbcb5468c3586235a65dd6af646eb37bb10ccc7b,2024-10-22T14:16:51.547000 -CVE-2024-10139,0,1,11c32ddb1edfb399f29c4753543b82ea66d92ffc686e3d29b4d68af5ac18b5a1,2024-10-22T14:18:12.087000 +CVE-2024-10136,0,0,17790ffc426ba3f464e327ab05c0c6d36879047b0c8e0a5cf0c1c4a40c857210,2024-10-22T14:15:48.770000 +CVE-2024-10137,0,0,bf8dc737c8c1bd8d279f07a2951d8a27fe63f941562664fe26ac2d8ba987f2ed,2024-10-22T14:17:31.527000 +CVE-2024-10138,0,0,96b8afb0bc9d868623cd6816cbcb5468c3586235a65dd6af646eb37bb10ccc7b,2024-10-22T14:16:51.547000 +CVE-2024-10139,0,0,11c32ddb1edfb399f29c4753543b82ea66d92ffc686e3d29b4d68af5ac18b5a1,2024-10-22T14:18:12.087000 CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f3d,2024-02-02T02:05:39.277000 -CVE-2024-10140,0,1,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000 +CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000 CVE-2024-10141,0,0,17ce1823f9e1032ce4106436ffa20ca67724ebc3ab8b7874ba66330fada06176,2024-10-21T17:09:45.417000 CVE-2024-10142,0,0,20f3ea99900130160c805394b66019c49272761905b5ea7376caa328a388d2ce,2024-10-21T17:09:45.417000 CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000 -CVE-2024-10153,0,1,d622b7ea723b18e6ddfc603f2d4acbb1cff3ff02ebe01257835c2e3461165bac,2024-10-22T14:45:04.670000 -CVE-2024-10154,0,1,616a267b44cd60e0ee1735747cba3df9611277c523e780e0ba795002232a909b,2024-10-22T14:44:47.807000 -CVE-2024-10155,0,1,d9565565ebd915b9f68cad2dcd8279d89c17488c917f6907534ebb29d04e2fbe,2024-10-22T14:43:42.607000 -CVE-2024-10156,0,1,e7f7dbdd558e322e118e7fbce1ba5a75a62d9fa9230b1cef9eb640b274347653,2024-10-22T14:43:00.543000 -CVE-2024-10157,0,1,41d9478b3d49e83e6a480f35d8b281656c1266c3ead7379556d3206c6aee4532,2024-10-22T14:42:50.303000 -CVE-2024-10158,0,1,4420764b4d9615ea34b62e6a53bef5880d7c140640aa851325cc7eb63df30b43,2024-10-22T14:42:26.727000 -CVE-2024-10159,0,1,915dc857f17f9d43c3b78ff8b89ebd3822f1a0e5595f8c164f6b910ba78894d6,2024-10-22T14:41:34.370000 +CVE-2024-10153,0,0,d622b7ea723b18e6ddfc603f2d4acbb1cff3ff02ebe01257835c2e3461165bac,2024-10-22T14:45:04.670000 +CVE-2024-10154,0,0,616a267b44cd60e0ee1735747cba3df9611277c523e780e0ba795002232a909b,2024-10-22T14:44:47.807000 +CVE-2024-10155,0,0,d9565565ebd915b9f68cad2dcd8279d89c17488c917f6907534ebb29d04e2fbe,2024-10-22T14:43:42.607000 +CVE-2024-10156,0,0,e7f7dbdd558e322e118e7fbce1ba5a75a62d9fa9230b1cef9eb640b274347653,2024-10-22T14:43:00.543000 +CVE-2024-10157,0,0,41d9478b3d49e83e6a480f35d8b281656c1266c3ead7379556d3206c6aee4532,2024-10-22T14:42:50.303000 +CVE-2024-10158,0,0,4420764b4d9615ea34b62e6a53bef5880d7c140640aa851325cc7eb63df30b43,2024-10-22T14:42:26.727000 +CVE-2024-10159,0,0,915dc857f17f9d43c3b78ff8b89ebd3822f1a0e5595f8c164f6b910ba78894d6,2024-10-22T14:41:34.370000 CVE-2024-1016,0,0,71cf76ab1a6b276906d8ecf764cf0be1d15a9c7c60543569d9e172588701616f,2024-05-17T02:35:10.520000 -CVE-2024-10160,0,1,4bd6666e6debc93b42554314b916c7e4a6c32f93acbe48afa502cc48d2414808,2024-10-22T14:40:46.790000 +CVE-2024-10160,0,0,4bd6666e6debc93b42554314b916c7e4a6c32f93acbe48afa502cc48d2414808,2024-10-22T14:40:46.790000 CVE-2024-10161,0,0,84bc31c1f8b9c1424a33f38beb007afd12cef556097f836456e7db6854141f50,2024-10-21T21:35:33.377000 CVE-2024-10162,0,0,9586e193571470cd409c779979783fe30cf8798f29cade742d2c6e6b9b66240c,2024-10-21T21:36:10.470000 -CVE-2024-10163,0,1,26289a38ca28d6fbf3697cebc7b8e78d717fbaa250d69c3062759b06a1925c3b,2024-10-22T14:28:06.173000 +CVE-2024-10163,0,0,26289a38ca28d6fbf3697cebc7b8e78d717fbaa250d69c3062759b06a1925c3b,2024-10-22T14:28:06.173000 CVE-2024-10165,0,0,5e96b8bac045d76007a8a1ccaf66b23094bbe577806718f5c39b95850bfcb648,2024-10-21T21:35:06.987000 CVE-2024-10166,0,0,d38e0eaedffd343f532bd4c1abf13dec4f7eece79809104c00c35d23c5bd77f6,2024-10-21T21:34:52.430000 CVE-2024-10167,0,0,e7ee4350c0d87b98f4009c350ce488d1222a8473f5eed0163be4fcf02375526f,2024-10-21T21:34:25.810000 @@ -242399,19 +242401,19 @@ CVE-2024-10169,0,0,e8e6c9fb9383945c3d410fc4f008280f899970c875613eff84d409b4d2eaf CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc058119760,2024-05-17T02:35:10.627000 CVE-2024-10170,0,0,43858dc94e553ea996e2f62171c2a07580bf4384f9d10283ecd355d244289e84,2024-10-21T21:33:49.663000 CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5aea60,2024-10-21T21:33:26.937000 -CVE-2024-10173,0,0,f6c48dfe45f526ea19e91b20ef708b171d9e0a76591dad105e56c584bb12efdc,2024-10-21T17:09:45.417000 +CVE-2024-10173,0,1,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000 CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000 CVE-2024-10189,0,0,ffc755e96982501f804ab166cd12d0605832a17249527107c82c3cd65a58ebf1,2024-10-22T10:15:03.610000 CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000 -CVE-2024-10191,0,1,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000 -CVE-2024-10192,0,1,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000 +CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000 +CVE-2024-10192,0,0,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000 CVE-2024-10193,0,0,1edc42ac3209c75585ec8c6b26eafba6b0b9f2d61f9e6b3760f20c0ded29aa99,2024-10-21T17:09:45.417000 CVE-2024-10194,0,0,2306506683b8321312c529c12d5538fdae946fec3d958eb6a86af3539ec3be4d,2024-10-21T17:09:45.417000 CVE-2024-10195,0,0,433002dc4be76148bf0f1e8e85e5de7bd9f18de30e21fefcd1f30061067a4930,2024-10-21T17:09:45.417000 CVE-2024-10196,0,0,0b052761dda527c9d578bdd237c16d6bdaa0a843794729a716c520574b82f796,2024-10-21T17:09:45.417000 CVE-2024-10197,0,0,6fe37138acc52d09938e9bcb1e310dbdb2ac9977a35ddc0fec14852ea89360e5,2024-10-21T17:09:45.417000 -CVE-2024-10198,0,1,58468dbe56a875fce487b2c24efa66d706cd94ef799a0ad9490149b003e5442b,2024-10-22T15:39:37.217000 -CVE-2024-10199,0,1,18eedf0aaa14f9eae78c4d887bc668d26c7f01ea3ac2e8913ea363a18a98b2b0,2024-10-22T15:40:56.637000 +CVE-2024-10198,0,0,58468dbe56a875fce487b2c24efa66d706cd94ef799a0ad9490149b003e5442b,2024-10-22T15:39:37.217000 +CVE-2024-10199,0,0,18eedf0aaa14f9eae78c4d887bc668d26c7f01ea3ac2e8913ea363a18a98b2b0,2024-10-22T15:40:56.637000 CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000 CVE-2024-10200,0,0,490aa25fdf12ccb46c8a818662c15261aecf127ca00516740d200e5fc0c849a5,2024-10-21T17:09:45.417000 CVE-2024-10201,0,0,fdd706f65f7aa0e194f575c5a7304653f1f8e37bb0097e52a009edadbfcb9ca7,2024-10-21T17:09:45.417000 @@ -242419,7 +242421,7 @@ CVE-2024-10202,0,0,3a01bc3efcbe4e17c6fdc2e9102f4cbe8dd4afeaccd594b0d2eceea29302f CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 -CVE-2024-10234,1,1,d8689a914e8d9ea543ec1d317c32c7c59c868d4764bd7aca5d600362d697f0db,2024-10-22T14:15:14.573000 +CVE-2024-10234,0,0,d8689a914e8d9ea543ec1d317c32c7c59c868d4764bd7aca5d600362d697f0db,2024-10-22T14:15:14.573000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 @@ -243488,8 +243490,8 @@ CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558f CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000 CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000 CVE-2024-20284,0,0,9b3b99721324d4818410a9544df663e05957416b29cfc7a893b6407ac8b10f3b,2024-10-17T15:03:07.253000 -CVE-2024-20285,0,1,f3155d3c8a00277d376702ed52a6bc6aca121da6e27a6fa17f8e7224f2a87919,2024-10-22T14:37:01.363000 -CVE-2024-20286,0,1,bdf0757c01bcb457b976c7541d58d87497b7ceecaac7964112fd5b04260633e6,2024-10-22T14:44:16.063000 +CVE-2024-20285,0,0,f3155d3c8a00277d376702ed52a6bc6aca121da6e27a6fa17f8e7224f2a87919,2024-10-22T14:37:01.363000 +CVE-2024-20286,0,0,bdf0757c01bcb457b976c7541d58d87497b7ceecaac7964112fd5b04260633e6,2024-10-22T14:44:16.063000 CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000 CVE-2024-20289,0,0,67b207e27b4f7addc83d99ce2a16d9a68d81f19bcf8b318a5e667a8a27d96ef2,2024-08-29T13:25:27.537000 CVE-2024-2029,0,0,a382b56e2d9764efda4b6d7c3b8e20dd18832e26c02b52a8a572702baca53793,2024-04-10T19:49:51.183000 @@ -243598,8 +243600,8 @@ CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750 CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000 -CVE-2024-20420,0,1,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000 -CVE-2024-20421,0,0,aebc346e8d223b2a92de579f5e301f997bbd63d2963e092f52511786b8a1dbc2,2024-10-18T12:53:04.627000 +CVE-2024-20420,0,0,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000 +CVE-2024-20421,0,1,b8d90bf4638dbe0c37023b3ff1bd11c5ac7ded44281786691979af6c9dbb0983,2024-10-22T17:51:08.113000 CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000 @@ -247876,9 +247878,9 @@ CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93c CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000 CVE-2024-2627,0,0,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000 CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000 -CVE-2024-26271,1,1,24083e398b43cc7550a39a9a20e629649df704da96b50eed5b54764533cdffb2,2024-10-22T15:15:05.523000 -CVE-2024-26272,1,1,c1800722847a57902614b956d55e36f898d5c7885aaf7183308a4058cb973641,2024-10-22T15:15:05.740000 -CVE-2024-26273,1,1,bc1bde3b4567b7a81ccdd3b768fac87158cd8e39fba32ce35cfb2d7facaa2765,2024-10-22T15:15:05.937000 +CVE-2024-26271,0,0,24083e398b43cc7550a39a9a20e629649df704da96b50eed5b54764533cdffb2,2024-10-22T15:15:05.523000 +CVE-2024-26272,0,0,c1800722847a57902614b956d55e36f898d5c7885aaf7183308a4058cb973641,2024-10-22T15:15:05.740000 +CVE-2024-26273,0,0,bc1bde3b4567b7a81ccdd3b768fac87158cd8e39fba32ce35cfb2d7facaa2765,2024-10-22T15:15:05.937000 CVE-2024-26275,0,0,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000 CVE-2024-26276,0,0,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000 CVE-2024-26277,0,0,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000 @@ -248155,7 +248157,7 @@ CVE-2024-26714,0,0,faa331038fc0a5fbf6f72afaa0a7a8bc95357cfb4083cadd79fcc35354838 CVE-2024-26715,0,0,d743b3d21d5816879e3fd96c31c716696399c03e5a1820cc912de3208fbdf6bb,2024-04-03T17:24:18.150000 CVE-2024-26716,0,0,8caf2f33da96957d0a51361dc6c5b07c63980f425a5f489233e62c63611c86e1,2024-04-03T17:24:18.150000 CVE-2024-26717,0,0,9387e326266c2102c4397017c366213925cfb5b5dbbd15b59d1dedfc41a59a9f,2024-04-03T17:24:18.150000 -CVE-2024-26718,0,1,c1fb45de7431b250ab2c14c243fdd27efba040a79388a9c5b41104be96d26eb8,2024-10-22T15:15:06.130000 +CVE-2024-26718,0,0,c1fb45de7431b250ab2c14c243fdd27efba040a79388a9c5b41104be96d26eb8,2024-10-22T15:15:06.130000 CVE-2024-26719,0,0,bf095c5ec40e5021963ef58a4045186e372261f83c48e13510021b065ebea2f2,2024-04-03T17:24:18.150000 CVE-2024-2672,0,0,c8d64f7b93993488ba5215c3b2eb1c5f7ca0e18711968330934c30769d9d1de3,2024-06-05T20:15:12.810000 CVE-2024-26720,0,0,0796d3f03354db4b881b215435b033867db943942fb95ad422104cdb227db34a,2024-07-18T12:15:02.847000 @@ -250714,7 +250716,7 @@ CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000 CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000 CVE-2024-30157,0,0,b4413e2e5263fd764d22ffa6255e560222ce447dceec65fcb4225e2b11135a83,2024-10-21T21:15:04.620000 -CVE-2024-30158,0,1,7aa2072367c304ef15068853d42c7cfc42d686d1c6236aed0361c418da255cee,2024-10-22T14:35:11.397000 +CVE-2024-30158,0,0,7aa2072367c304ef15068853d42c7cfc42d686d1c6236aed0361c418da255cee,2024-10-22T14:35:11.397000 CVE-2024-30159,0,0,b905413140e33de6a3d93be87dd7cad7a2e92a94fa8fca3348535d1caf49c569,2024-10-21T21:15:05.073000 CVE-2024-3016,0,0,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000 CVE-2024-30160,0,0,47aa9aaeaf0d9d3169383db35f7389cfd4e3ae26d2060339142e175448806635,2024-10-21T21:15:05.190000 @@ -251368,7 +251370,7 @@ CVE-2024-31010,0,0,50d72a628a998ce24996b17a1abb2ea140f353a3cac2e0be5c534b2a597a6 CVE-2024-31011,0,0,0c33284f804930c14c50cb008bf7c23c7b47af354b75abc23cf3e146495b5db3,2024-08-20T15:35:06.517000 CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000 CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000 -CVE-2024-3102,0,1,9ab659046e55d9ecd56e44281bca18746bc15afba53539e701a3b46145b5c936,2024-10-22T14:26:30.447000 +CVE-2024-3102,0,0,9ab659046e55d9ecd56e44281bca18746bc15afba53539e701a3b46145b5c936,2024-10-22T14:26:30.447000 CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000 CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000 CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000 @@ -254424,9 +254426,9 @@ CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7d CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000 CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000 CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000 -CVE-2024-35285,0,1,03b080751de6ba1e65ad3cd896c5321e5c4a73a43e7091a7187257683278015d,2024-10-22T14:35:12.820000 -CVE-2024-35286,0,1,35410cd3d18af675e9066896bb72f344aeed35a82c0887bbcc42ece7bdbf8fbc,2024-10-22T14:35:13.583000 -CVE-2024-35287,0,1,38643b7462a0d947033f7b2ca609231321a2a14371b7b37b5f4c9c752052cce9,2024-10-22T14:35:14.367000 +CVE-2024-35285,0,0,03b080751de6ba1e65ad3cd896c5321e5c4a73a43e7091a7187257683278015d,2024-10-22T14:35:12.820000 +CVE-2024-35286,0,0,35410cd3d18af675e9066896bb72f344aeed35a82c0887bbcc42ece7bdbf8fbc,2024-10-22T14:35:13.583000 +CVE-2024-35287,0,0,38643b7462a0d947033f7b2ca609231321a2a14371b7b37b5f4c9c752052cce9,2024-10-22T14:35:14.367000 CVE-2024-35288,0,0,5a7e419c5723f5855a10246582e4e92910b876efa85bd2048c10c45e071584c8,2024-10-10T12:51:56.987000 CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000 CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000 @@ -254451,7 +254453,7 @@ CVE-2024-3531,0,0,a342a9958ba8d00c279b1676525284c1cab302a477225f05f9d97b5deb0711 CVE-2024-35311,0,0,94751a7e140c2a3ff83ee374530e5919b0823edf97b2e344646a9709229c503b,2024-05-29T19:50:25.303000 CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b3e3,2024-05-20T13:00:34.807000 CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000 -CVE-2024-35314,0,1,8b00fc627c3e1c6ff34cbb4708c278713efd499b74ad54064c188a8a66c45f52,2024-10-22T14:35:15.233000 +CVE-2024-35314,0,0,8b00fc627c3e1c6ff34cbb4708c278713efd499b74ad54064c188a8a66c45f52,2024-10-22T14:35:15.233000 CVE-2024-35315,0,0,84efd35bd289a945021a9c7dd1849ff64be9b144534b4418f264cb0672980105,2024-10-21T21:15:05.613000 CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000 CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000 @@ -256336,7 +256338,7 @@ CVE-2024-37997,0,0,10214765491aa29b8c34faf22f5e8238fda623005890c9342516743753b6c CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000 CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 -CVE-2024-38002,1,1,4428864e3adf5d2b2e1699accfaeac253b1059be29e13e1cad19ffb714fdfcb2,2024-10-22T15:15:06.277000 +CVE-2024-38002,0,0,4428864e3adf5d2b2e1699accfaeac253b1059be29e13e1cad19ffb714fdfcb2,2024-10-22T15:15:06.277000 CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000 CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000 @@ -257045,7 +257047,7 @@ CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269 CVE-2024-38817,0,0,09723b24db0d6a084c268e07b58c10ca202cbe9290f0f8fec2db45f626cd7af3,2024-10-10T12:51:56.987000 CVE-2024-38818,0,0,622849f8ff4dfc75febef96b69e498222845497635b94ea6c1bb47520700e61d,2024-10-10T12:51:56.987000 CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 -CVE-2024-38820,0,1,a5b616e0d9bc58c5d9f58ca8cd3d5a01be45dc2cf2e2573532c8a51afcf4ca4c,2024-10-22T15:42:22.633000 +CVE-2024-38820,0,0,a5b616e0d9bc58c5d9f58ca8cd3d5a01be45dc2cf2e2573532c8a51afcf4ca4c,2024-10-22T15:42:22.633000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000 CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000 @@ -257422,7 +257424,7 @@ CVE-2024-39493,0,0,1e9db7e81ec34cee90fac11925a12057887fa787e4909a68e8233bca0ebf8 CVE-2024-39494,0,0,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210e13,2024-07-24T19:17:25.057000 CVE-2024-39495,0,0,882ab91a71cdaa0b14beca48f2b2546ecf350f5bc761609487e97f811c1f052c,2024-08-20T15:35:19.527000 CVE-2024-39496,0,0,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000 -CVE-2024-39497,0,1,d605ece57edd8c1924d68da30a47dcb5e1db73bc0b73e7007642bc3b1bb2dae6,2024-10-22T15:15:06.630000 +CVE-2024-39497,0,0,d605ece57edd8c1924d68da30a47dcb5e1db73bc0b73e7007642bc3b1bb2dae6,2024-10-22T15:15:06.630000 CVE-2024-39498,0,0,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000 CVE-2024-39499,0,0,8bd78139ee9d6c3d000d5156a9790ce67d1b2af9b3aee62da6523d24ba14e435,2024-07-12T16:34:58.687000 CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9d94,2024-07-12T16:34:58.687000 @@ -257807,16 +257809,16 @@ CVE-2024-40060,0,0,8684e047d9ba2e6cc4bcc7c4afd5cb58b4b20c732a4bb0dd43020155d17e1 CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000 CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000 CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000 -CVE-2024-40083,0,0,11e680e8bf1517e2634a64aa49a46d6caf49581be97998a9d9f77cf3267fbcc9,2024-10-21T21:15:05.703000 -CVE-2024-40084,0,0,534d11aef460ce9b34eb113477df41417197fd033d77d213100aad9c356df749,2024-10-21T21:15:05.770000 -CVE-2024-40085,0,0,5e26333c4ab2860e64b8bbaca881d20b70f9d1931f87426da705490dd3f5755b,2024-10-21T21:15:05.853000 -CVE-2024-40086,0,0,c921105c5ce57300119e18e8e6cfd8c24b8606d1f2e73bc08ab08f658ee80221,2024-10-21T21:15:05.923000 -CVE-2024-40087,0,0,6ee4107522c5969a2a517f5043d2f6b349c6a2286a5705254f08c3d25d87672b,2024-10-21T21:15:06.003000 -CVE-2024-40088,0,1,f7759b011e80db767fd1dbd212bf4323a92520bb9be3957ba923eab16655ce61,2024-10-22T14:35:16.010000 -CVE-2024-40089,0,0,fe50fd0a5e7736656c8bd604a9e5fad05ea85bca29858fe641bda85bc04f9a4a,2024-10-21T21:15:06.150000 +CVE-2024-40083,0,1,6214757a38a28413207a0d4d3bf59a87ad21f64a445a6477f90c9814d96e64d5,2024-10-22T17:35:03.297000 +CVE-2024-40084,0,1,e5a48869dc57daf978e93f4d404b40d8cd7575a004e2e23910e1636b2fbf4ba2,2024-10-22T17:35:04.057000 +CVE-2024-40085,0,1,7cc1b970ba005bdf1c26ff25b3a180cbc5e09f7dbecaeac58ab4095d9a54f531,2024-10-22T17:35:04.843000 +CVE-2024-40086,0,1,d477aa9a9d381f98d54e41fcc40bef402826f6575f7a4d21e22aed5f418bbdb5,2024-10-22T17:35:05.600000 +CVE-2024-40087,0,1,be7927f3488a0d370038975baafb448110d1c8fb340e9ed7e5d0faed3d81a193,2024-10-22T17:35:06.420000 +CVE-2024-40088,0,0,f7759b011e80db767fd1dbd212bf4323a92520bb9be3957ba923eab16655ce61,2024-10-22T14:35:16.010000 +CVE-2024-40089,0,1,ed4eb5a53b2cd859e53f91fb6a09f58a08f10b728994f90f9ffa170b92bfb777,2024-10-22T17:35:07.167000 CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000 -CVE-2024-40090,0,0,71c1d9398c5476b3448760d412c55985d17dac30c14dfff9be3cec0e88b95dcf,2024-10-21T21:15:06.223000 -CVE-2024-40091,0,0,77588eb2eb6db1704cc9e7edc29d724d334c5e0f77077e1081bebdfa0e3119b6,2024-10-21T21:15:06.313000 +CVE-2024-40090,0,1,1d8565eba1bbb89f12f02c55fd6cc2d4a5a146a6b0b6272e27409baab823c846,2024-10-22T17:35:07.957000 +CVE-2024-40091,0,1,d7ceb5c1a6a6f5dd1f114159610592371d05efa53ae448a2bdee1e5d98966d98,2024-10-22T17:35:08.760000 CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000 CVE-2024-40096,0,0,7067973a4296a7a70beea7b209cd71d2a86d44a9bdfd60035b86d8848d99631b,2024-08-30T16:14:41.957000 CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000 @@ -258235,7 +258237,7 @@ CVE-2024-4095,0,0,e2a40f44bdf8e372a41806afdce4161562b7b4bb2bcba8f3987036690d2e81 CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f822,2024-07-12T16:34:58.687000 CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000 CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000 -CVE-2024-40953,0,1,e65ed296f4076fd3edc9aaa9905f7ecd5e00c5e8a9ee2fde440fe5cbe0a29245,2024-10-22T15:15:06.720000 +CVE-2024-40953,0,0,e65ed296f4076fd3edc9aaa9905f7ecd5e00c5e8a9ee2fde440fe5cbe0a29245,2024-10-22T15:15:06.720000 CVE-2024-40954,0,0,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000 CVE-2024-40955,0,0,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000 CVE-2024-40956,0,0,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000 @@ -258709,8 +258711,8 @@ CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107 CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000 CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000 CVE-2024-41712,0,0,fda1df8096c7e740d7c1e5b76ebc20ad4db1e4b92172ce54a6c2dabadb93a134,2024-10-21T21:15:06.387000 -CVE-2024-41713,0,1,db1b71817a5ce0b697df043f8e1585f7943defebfef472347a986524d193ee8f,2024-10-22T14:35:16.817000 -CVE-2024-41714,0,1,b7e979e6a2ada11f31a276f8770fe1bb150c75726a0f17380180742b9a2f6160,2024-10-22T14:35:17.650000 +CVE-2024-41713,0,0,db1b71817a5ce0b697df043f8e1585f7943defebfef472347a986524d193ee8f,2024-10-22T14:35:16.817000 +CVE-2024-41714,0,0,b7e979e6a2ada11f31a276f8770fe1bb150c75726a0f17380180742b9a2f6160,2024-10-22T14:35:17.650000 CVE-2024-41715,0,0,35d1e19982d6029b0a8b7671c2382ff20d85aa479fa52b1ecc90bc4ca8088cf0,2024-10-17T17:15:11.530000 CVE-2024-41716,0,0,add00a3b8bb5c856cb11efe54462b72e0907045ad71076c98ae404e938cc3293,2024-09-13T19:53:47.723000 CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000 @@ -259668,8 +259670,8 @@ CVE-2024-43165,0,0,8125472d7e20e379acd67d29cc7075b43b03a71223ce60c46b14d0ffb4bd9 CVE-2024-43167,0,0,c4eae034ed90d957ee0d40ac6b75e1eb711889b4b8905f404c5783e222980273,2024-10-21T12:15:03.837000 CVE-2024-43168,0,0,ef0081344887975b429a2b0b7741a490ebb03d62e914345ff88e9fc7663b3374,2024-10-21T12:15:04.327000 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000 -CVE-2024-43173,1,1,5c8f90b9861a166e104ffcc99d3b578724b942af6f62a199be390ecf1a3fb743,2024-10-22T15:15:06.800000 -CVE-2024-43177,1,1,8b0b35d5d6991691783cdf8a0eab90dfd9795fad78b616442a1d6b5530beee1e,2024-10-22T15:15:07.020000 +CVE-2024-43173,0,0,5c8f90b9861a166e104ffcc99d3b578724b942af6f62a199be390ecf1a3fb743,2024-10-22T15:15:06.800000 +CVE-2024-43177,0,0,8b0b35d5d6991691783cdf8a0eab90dfd9795fad78b616442a1d6b5530beee1e,2024-10-22T15:15:07.020000 CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000 CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000 CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000 @@ -259755,7 +259757,7 @@ CVE-2024-43294,0,0,115da993f44036adfff3784c8efce939e5d53bb4f7ab07ebab66e86a98521 CVE-2024-43295,0,0,4c992084e199b514575e8ec2d873a4ef1cccca3f4f5df0b2e67e418aab98a634,2024-09-12T21:20:43.847000 CVE-2024-43299,0,0,519d081700ab3294f398a4287727657f1b1d3ae45286cab56afe1bc9702f1fca,2024-09-12T21:23:30.647000 CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000 -CVE-2024-43300,0,1,0e255468708543d303383e85dfb9e37cc538bb4005cde3896a7b317de3630d96,2024-10-22T15:35:24.050000 +CVE-2024-43300,0,0,0e255468708543d303383e85dfb9e37cc538bb4005cde3896a7b317de3630d96,2024-10-22T15:35:24.050000 CVE-2024-43301,0,0,36517c64264e25162f6a8960592c6f8ac4f28ee2609d1e9f07cf9e006ea49e2a,2024-09-12T21:24:20.563000 CVE-2024-43303,0,0,11d9501682f62a268ea8fd6f03971205e43f433af8e58b9f115735076a0f4308,2024-08-19T12:59:59.177000 CVE-2024-43304,0,0,0198c9c448bd60be5feef590d21005c81d3809f24efdc4b5ed5165051bdc5338,2024-08-19T12:59:59.177000 @@ -260015,7 +260017,7 @@ CVE-2024-43608,0,0,d778a741c452756f08141283b44511b35f848f925ff9e901d81fdc04d7ed6 CVE-2024-43609,0,0,b51bc951febae72cfbab824fd5dae1956187d25f6e42e962d7d237590a3266d0,2024-10-17T21:18:58.113000 CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88ea,2024-05-21T12:37:59.687000 CVE-2024-43610,0,0,e05bc7d7fba9921ddb28639aa2d807e02a712368195686314d74c31cc0c1b1bd,2024-10-10T12:51:56.987000 -CVE-2024-43611,0,0,e71bb37110cf57f4ebc98f5c779227b1c5e9d69f96a05916c17f38187ef51de9,2024-10-10T12:56:30.817000 +CVE-2024-43611,0,1,4cc7faddbc4a0042c9b0d18e623cdb2e65033905714d4e2435ea5507fb9866e2,2024-10-22T16:01:19.373000 CVE-2024-43612,0,0,2d63857a7410863939630233bd3c57b8a869ef6d82a1dc4e625bbf528ee43c0a,2024-10-21T20:48:02.050000 CVE-2024-43614,0,0,37f86979c4c4ec96d0dd61c1d9daa59ec511d8fd5452834efe232d695cc74469,2024-10-21T20:50:38.370000 CVE-2024-43615,0,0,841e5833e1934c639d3a9a11a43505704ba14c449fb8c86b43a2c5341378c86b,2024-10-21T21:00:34.967000 @@ -260130,7 +260132,7 @@ CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd CVE-2024-43842,0,0,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000 CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000 CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000 -CVE-2024-43845,0,1,d80433b94567f7553ba59d5578ff0ab177cc617e43797bbfe0b461c6dff68752,2024-10-22T15:15:07.240000 +CVE-2024-43845,0,0,d80433b94567f7553ba59d5578ff0ab177cc617e43797bbfe0b461c6dff68752,2024-10-22T15:15:07.240000 CVE-2024-43846,0,0,336ca6ce5d381bc8197cb8ae52aec5d82cb25fe9302c78389787b6ba92216525,2024-08-19T12:59:59.177000 CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075a6e,2024-08-19T12:59:59.177000 CVE-2024-43848,0,0,f1a2b4dd4e81d797bfb09af1eb3c38201e05560605d293e2d1b82a973cb40d73,2024-08-19T12:59:59.177000 @@ -261076,6 +261078,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1 CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000 CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000 CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000 +CVE-2024-45518,1,1,85e0e8d0490ef458e34c3cb4cab880d0e6443a5b3376eb82b1a1170ed808b4e1,2024-10-22T17:15:03.837000 CVE-2024-45519,0,0,1314fc46f1c0fd544c41bcc772f8e9adc71c225c5b1014a689dc2f992c782655,2024-10-15T14:32:13.520000 CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000 CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000 @@ -261340,6 +261343,7 @@ CVE-2024-46237,0,0,e9a03598fb64b05ba8882f6b5b526c713a555a3e7fdae15963deddf3bd8ce CVE-2024-46238,0,0,e04df7a8502d302f172444f965d1fa00612ca87792c631612b16a6e649750ad1,2024-10-21T21:35:03.580000 CVE-2024-46239,0,0,926566aaeaac1cf6bfa054ea714a4093c287c3bf6826d025bfc5db3fb3092da4,2024-10-21T21:35:04.510000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 +CVE-2024-46240,1,1,7095785d06ffd789b291cf674b04480cc2015e975f36b62912f4d71adb122b9a,2024-10-22T16:15:07.407000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000 CVE-2024-46257,0,0,9ea0ad0f2e6865da2b0362a090cb21ce2a440cd52edf95f9a53e87e2d7fb967d,2024-10-03T16:35:05.240000 @@ -261429,6 +261433,7 @@ CVE-2024-46528,0,0,a31b8dad674e1792ba2e3480eb54bd9167b5430c2cf6a9cfdcaa08814b4f5 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000 CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000 +CVE-2024-46538,1,1,cefa2e21b5bd2ee89cbf40d952628918d4a31d55c6fbe92a038df0e0a23ebcbc,2024-10-22T17:15:03.950000 CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000 @@ -261730,7 +261735,7 @@ CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257 CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000 CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 -CVE-2024-46897,0,1,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000 +CVE-2024-46897,0,0,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000 CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000 CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000 CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000 @@ -261897,7 +261902,7 @@ CVE-2024-47226,0,0,67acd1dda98161941683c1ecdf3fb2829a8afb2cdb12d796e19b0a64631c8 CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000 CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15bbe,2024-06-04T19:20:47.717000 CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb63,2024-06-04T19:20:47.830000 -CVE-2024-47240,0,1,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000 +CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000 CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000 CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000 CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000 @@ -262001,7 +262006,7 @@ CVE-2024-47386,0,0,8cb1861aa24862dc38fce1bb1f3d0d3efef1813cc377d83faa4f21f06229f CVE-2024-47387,0,0,08a3b98e23e8185d509837019c1ef3a9c139ede5ad875ee88b25d1df1e39d80b,2024-10-07T17:47:48.410000 CVE-2024-47388,0,0,dc31869c2fc889c08896c96961f94aea423bc557ea63d4c8cae8b1b120c02193,2024-10-07T17:47:48.410000 CVE-2024-47389,0,0,1d36b4f30f3636f2e5fbc982d1d69e8709dc3961752cb7621f1d6a2dcf8cb49d,2024-10-07T17:47:48.410000 -CVE-2024-4739,0,1,b1786ca24e141f44a22c18ecb9dbd095560a71bf7433b97a19b051761dc105de,2024-10-22T14:07:02.023000 +CVE-2024-4739,0,0,b1786ca24e141f44a22c18ecb9dbd095560a71bf7433b97a19b051761dc105de,2024-10-22T14:07:02.023000 CVE-2024-47390,0,0,609899d039b2d1f3f491074ef439bed613cbd5e5aeb5a6390f43ce3caca59f92,2024-10-07T17:47:48.410000 CVE-2024-47391,0,0,0ec9a4f4449faf31f9cfbe6055bdfe88e4acf6b8a151d36abdb7471992d61099,2024-10-07T17:47:48.410000 CVE-2024-47392,0,0,c1e57d415365b830226dbe3f308a9b5009db4e502bc21e205a9f212a29a477c4,2024-10-07T17:47:48.410000 @@ -262034,9 +262039,9 @@ CVE-2024-47459,0,0,0b1d286cc18504287dd532d658d2383a7255013ccc216b35a3e0d03bccac4 CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000 CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000 CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000 -CVE-2024-47485,0,0,ad983ecf2d27a8882140a86c2b8f76909d923038932c9e4c487291a554eaf4cc,2024-10-18T12:52:33.507000 -CVE-2024-47486,0,0,ebb52a6e58b7502e54c2d96f1f22f907d8d887fc6268cf25a428f304ce5cdeb2,2024-10-18T12:52:33.507000 -CVE-2024-47487,0,0,ce7934a5efbdf258c84a38c313f294ce5a0f986aa218002120ff84beedef1ca9,2024-10-18T12:52:33.507000 +CVE-2024-47485,0,1,70c31bc26651c666f1f81bb314c02989bd53a835a51d6fdce38b5fab47a41c05,2024-10-22T16:23:22.890000 +CVE-2024-47486,0,1,d0e2cdb063c29469a8d3896035823ed37b083b056a6c7ff12d1a7f59bad20ea5,2024-10-22T16:11:07.547000 +CVE-2024-47487,0,1,89e5f946b42ae69712fe53b468ea8b777288a7068d88dd6a3031473d76e487d6,2024-10-22T16:10:08.027000 CVE-2024-47489,0,0,b60e5447ef49080d8bcb541a004c5061338369ecebcb53ef8b0c02387b615511,2024-10-15T12:58:51.050000 CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000 CVE-2024-47490,0,0,e3601f25126ea5528355c875251d16d0b06252aacf2c95cdc691bd121e53f290,2024-10-15T12:58:51.050000 @@ -262164,16 +262169,16 @@ CVE-2024-47672,0,0,208c9363d63200a0f87e54b2ecaa4588cdcb8ebe0fa60448ea15f5f621cd4 CVE-2024-47673,0,0,2317135deeb5a2ba1be6a2e702cd3dee3239bc7e08807d40785f15a0d93329d9,2024-10-17T14:15:13.853000 CVE-2024-47674,0,0,9273dcf5991b9b8c8433130a4938740f9721051fe1fcb6d45b5c4bc4625153d6,2024-10-21T18:15:05.993000 CVE-2024-47675,0,0,fff2226e2e91403974930f662f226a29696936c529972a0662f08267575cdd8e,2024-10-21T17:09:45.417000 -CVE-2024-47676,0,0,647f2a3a1d3c30594b68c3c4e4b627dfaf40a57c2604da0b88353cfb7110d574,2024-10-21T17:09:45.417000 -CVE-2024-47677,0,1,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000 +CVE-2024-47676,0,1,d31d6f56ccab7b160561fa0b3c682aa5c75e9dbbe155592bcb66f3a4628abbed,2024-10-22T16:12:39.830000 +CVE-2024-47677,0,0,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000 CVE-2024-47678,0,0,0599171199c0933ac90dc22e0c718002df8dc875ff64d0f6cfd466c664eca6eb,2024-10-21T17:09:45.417000 CVE-2024-47679,0,0,307939d2ecd8d5c95d936c71f851827dbf3076f2cbcbbaee79f0d0403d820535,2024-10-21T17:09:45.417000 CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000 CVE-2024-47680,0,0,779185d87101541924dc45d047ca1b9e685cb152836bf7742a8884724035e45e,2024-10-21T17:09:45.417000 -CVE-2024-47681,0,1,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000 +CVE-2024-47681,0,0,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000 CVE-2024-47682,0,0,6c96643a2a20d61e5631dad60147e65d29328d6a7f713c97d1e3e384bd3d2097,2024-10-21T17:09:45.417000 CVE-2024-47683,0,0,29df637f255ef6790fa4d5a6cef4a640ffa0c80b3f317910e368f8552b5ce5c0,2024-10-21T17:09:45.417000 -CVE-2024-47684,0,1,c39612721e855a6bfd73c21cef099cc4455986cccfb2ea78b2c09a72e7deb582,2024-10-22T14:59:31.340000 +CVE-2024-47684,0,0,c39612721e855a6bfd73c21cef099cc4455986cccfb2ea78b2c09a72e7deb582,2024-10-22T14:59:31.340000 CVE-2024-47685,0,0,45dca83ceec4838c760fe3a933b300812ff7df633870d5c25a6d36368c1c1374,2024-10-21T17:09:45.417000 CVE-2024-47686,0,0,002328641bf73f5c7fdd0cb5a2e29f6ab710bee941d944f9154eb587c6d547fc,2024-10-21T17:09:45.417000 CVE-2024-47687,0,0,94419916fe94ff70fceea8c9848ea1313fd4f7e2844cd750b51c3c2895ce18a2,2024-10-21T17:09:45.417000 @@ -262238,22 +262243,22 @@ CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f7 CVE-2024-47740,0,0,768c60cc2aa6353990ba6be4a715ba73240d08f7aa920e59da8dba820cceb126,2024-10-21T17:09:45.417000 CVE-2024-47741,0,0,16de1929b973495fab2b76c1e0c3aec13d1144f771036e4c19ce75034196e012,2024-10-21T17:09:45.417000 CVE-2024-47742,0,0,d4bdf050ad676b843a45f07aa46808bebd66cb4930bdf4a3846418b0470ff5e9,2024-10-21T17:09:45.417000 -CVE-2024-47743,0,1,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000 -CVE-2024-47744,0,1,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000 +CVE-2024-47743,0,0,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000 +CVE-2024-47744,0,0,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000 CVE-2024-47745,0,0,bf9d70a37cd5327dcc2d07c3fdd8b5c36de5c72622dd6659e050773378799961,2024-10-21T17:09:45.417000 -CVE-2024-47746,0,0,a9cdeb753844bd87216637cd741d47b47d4ce9e70871099d1588c10e4fb363bf,2024-10-21T17:09:45.417000 -CVE-2024-47747,0,1,9d5a586f218eaaf78bda9441d4b5d07240456a6b32924dfbcbb0b265d0d3292b,2024-10-22T15:09:13.173000 +CVE-2024-47746,0,1,bd1d3998772b7b97367eddbd4c0f1f3e8c206783f1078083a98d6f055ddbde21,2024-10-22T16:00:35.703000 +CVE-2024-47747,0,1,bf426d12e6fede872474432e7d03578fd050f7aed12c854ab7dc6720315913fd,2024-10-22T16:11:40.627000 CVE-2024-47748,0,0,647817335e913f39ba0f188b7f0dda0acdc5eefa8874404f39f4072aced2a2c5,2024-10-21T17:09:45.417000 -CVE-2024-47749,0,1,c9441faf5e1defc6bde7c31bc17b95faf99e99f284f50e4f6ca541b2e00c5472,2024-10-22T15:00:29.497000 +CVE-2024-47749,0,1,6fb6c09686d727b440ebbd021d0a7a92d2bb1c2a12c6f5547a255465abc8b3b4,2024-10-22T16:08:31.637000 CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000 CVE-2024-47750,0,0,fcb30e866c3d64f885fc63b0fbe18064c59e15239984a0057b4922de3e3cda47,2024-10-21T17:09:45.417000 CVE-2024-47751,0,0,dbbb46f679c8ef6d582034b10e0fc5133e1862d2b7e7523462d867f3e651a7ba,2024-10-21T17:09:45.417000 -CVE-2024-47752,0,1,240161d7fe703e400c9d3fcfe3ca9a9a5bc29b42b931a326328c832bd997b559,2024-10-22T15:04:46.523000 -CVE-2024-47753,0,1,1dddd12c73af43ebb0904de1dc5d29129f502d57bab82119fa1cf293a4ba7b53,2024-10-22T15:04:18.277000 -CVE-2024-47754,0,1,8fefecc35f5ee5d8b148978b8b468c4a0826a3164fbc5c07c8ceec41094f8e9b,2024-10-22T15:03:31.147000 -CVE-2024-47755,0,1,6cb13a363c1927340d57e298ac76078d7c78d1527e04987bda7bb702169c10cb,2024-10-22T15:46:38.027000 -CVE-2024-47756,0,1,234d0c24ccb56a3602dbfe56e1b7f8eb887c075685f95cde9baebc46ad5cc3a2,2024-10-22T15:02:11.467000 -CVE-2024-47757,0,1,500f4ed7f4cebe77f095eabe903396578ed13baff1d5a05afdbb14496b4b2006,2024-10-22T15:54:48.830000 +CVE-2024-47752,0,1,65039c78bb19b3ece8928a956e9db0ee7719b3f114bcfd57c0c3ced74f237a1e,2024-10-22T16:11:09.037000 +CVE-2024-47753,0,1,b4bdc9a1d337353d37d865ac5f0c508d5e95f57a71156b3e1f6703729b56c2ad,2024-10-22T16:10:40.380000 +CVE-2024-47754,0,1,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdcd47,2024-10-22T16:10:21.907000 +CVE-2024-47755,0,0,6cb13a363c1927340d57e298ac76078d7c78d1527e04987bda7bb702169c10cb,2024-10-22T15:46:38.027000 +CVE-2024-47756,0,1,eb155bc0ec662a964b2c66ddbb8cf663bac19d4776af4da61c75acb4f1c74b8d,2024-10-22T16:09:56.570000 +CVE-2024-47757,0,0,500f4ed7f4cebe77f095eabe903396578ed13baff1d5a05afdbb14496b4b2006,2024-10-22T15:54:48.830000 CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000 CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000 CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000 @@ -262290,6 +262295,7 @@ CVE-2024-47815,0,0,843559a4031eaee974816014150940c4f18b7f6d93739de5a1866ac2ce670 CVE-2024-47816,0,0,c0bf0d33ec35192d4154926a2f4d5d81b042bde4dbbd41d5e4618f5e20416892,2024-10-10T12:51:56.987000 CVE-2024-47817,0,0,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000 CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000 +CVE-2024-47819,1,1,c727e536f3a624a59e67b95481c62382de08269a5f55f9d425d3effd214f1eb2,2024-10-22T16:15:07.500000 CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000 CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000 @@ -262467,10 +262473,12 @@ CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 +CVE-2024-48570,1,1,e565422dfa55e4b25b9efb30e59633745c3fab275e41215e02468494293003fa,2024-10-22T17:15:04.087000 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 CVE-2024-48597,0,0,d418873f3e9303c59419cda288a50538e497ca866e7b1cfaef7313951a15ddbe,2024-10-21T20:35:13.860000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 +CVE-2024-48605,1,1,f360f36ad27e8b971ca3313a232e92dc65547d1905cd6f8b04ad824f27bf2cf1,2024-10-22T16:15:07.757000 CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000 CVE-2024-48622,0,0,4cd7a4b67551e1c7266b414b834e1956aa3a51a75d895e45be98bc89b06ddf81,2024-10-16T16:38:43.170000 CVE-2024-48623,0,0,d049076f927dcf309023eb7c4a1c5680d5c48a2a4bd2097c596ebfe8af0f8628,2024-10-16T16:38:43.170000 @@ -262493,6 +262501,9 @@ CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000 +CVE-2024-48706,1,1,f6ed33b88a2a4cf79c6d1eae635780005dc95575e969d386a62204c211cae31c,2024-10-22T17:15:04.180000 +CVE-2024-48707,1,1,597fa9e5ec0742c8ccc62ed6d8aa1a1f509191f27a5d9d00c7621c443fe434b2,2024-10-22T17:15:04.273000 +CVE-2024-48708,1,1,82b37b547a43c5d13832cda6a763b6b0d073da2c9cedfa21cb674f5a350bfaa3,2024-10-22T17:15:04.370000 CVE-2024-48709,0,0,a2f1048f43a5ff6c83482412ed457499b4f82b0c444a20075955708fd04c880e,2024-10-21T19:35:07.443000 CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000 CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba41b8,2024-10-16T17:35:03.423000 @@ -262563,6 +262574,10 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000 +CVE-2024-48925,1,1,17ad6fa4547f2ce7b16f4da89e9b101cb04c2294b06cc702cb3983c1e1a94ab1,2024-10-22T16:15:07.853000 +CVE-2024-48926,1,1,85b04bcd589f9426bacb388b76883147a3307f836fd8fd417156eccdaeb86ba1,2024-10-22T16:15:08.090000 +CVE-2024-48927,1,1,703fccd925f1f3af0bb4d7bdb71de5226e00f5f5ac4de4592eb47b115aedc481,2024-10-22T16:15:08.360000 +CVE-2024-48929,1,1,66787fd57ce09c453329b762aeb961f8826f0e3b696b20681b1d74930ccbbfca,2024-10-22T16:15:08.617000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000 CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 @@ -262605,7 +262620,11 @@ CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d8 CVE-2024-49193,0,0,4817bc5a524f8686c9c390cc6499f217005a03a967baaa28cc06a1d405a85c45,2024-10-16T20:35:16.380000 CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714d45,2024-10-17T18:35:13.253000 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 +CVE-2024-49208,1,1,8f2e6c1e86f64af5e9881e3f7358f063e855448026ab47a0489d80c8a2fe32b3,2024-10-22T17:15:04.503000 +CVE-2024-49209,1,1,63bc036493de6c1ed83f722bcd4747b3b03d632c72fe17005e827b6f6284d1e9,2024-10-22T17:15:05.763000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 +CVE-2024-49210,1,1,6e53b8aa574f1a38b7aa78fd56066f3a919773a1d515d8c8b36c1cf9f646d98b,2024-10-22T17:15:05.970000 +CVE-2024-49211,1,1,639835fa2342b8dba7122e14997d5aa1fec6ab36565dab9c04b435fe88b7768d,2024-10-22T17:15:06.193000 CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000 CVE-2024-49215,0,0,9d23e97fd9538d4ddaefdbee98c9f991902afb90430384e62ea6427018c87235,2024-10-21T17:09:45.417000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 @@ -262739,6 +262758,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810 CVE-2024-49366,0,0,dba23a6a5d899dfc1dd93480431c60e66516ce3fea9b6f89406c417953de1770,2024-10-21T17:15:03.567000 CVE-2024-49367,0,0,9cdea4233abdf31e5711ba3faae763fba0a540ae42a436f6b5d5034f60f32d59,2024-10-21T17:15:03.783000 CVE-2024-49368,0,0,4323388038598adba9c2e6f2533f5d2b25d45af0a630786c844ee55a0bab465d,2024-10-21T17:15:03.960000 +CVE-2024-49373,1,1,0572794ffa0a562b1feec1afbfc4282a4c956dbda0b30d27fc085e44ad9f38f6,2024-10-22T16:15:08.860000 CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000 CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000 @@ -262784,12 +262804,12 @@ CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a1 CVE-2024-49610,0,0,4f883c779c7b80912a16a7cdc0e52ccc8dd24129efdfa293f6a1ccc1bf1526fe,2024-10-21T17:09:45.417000 CVE-2024-49611,0,0,c7f7e09d8f83b62743396c3bd4904fddaab94d00a5cf5a5c7129906b3bdbdafc,2024-10-21T17:09:45.417000 CVE-2024-49612,0,0,acd6c0707ff81a9cd91d7e43f1e50373957b69b17c638b1ca230b26e66d303b8,2024-10-21T17:09:45.417000 -CVE-2024-49613,0,1,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000 -CVE-2024-49614,0,1,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000 -CVE-2024-49615,0,0,ba81ea33ad44e9028a5a08fbc9b26c419164367943e113f8f0ddf78b9b8c69b0,2024-10-21T17:09:45.417000 -CVE-2024-49616,0,0,9a594ac2e99bd2ea3d04b4336df6a62b74a73cba884d04e5a4c50b731f2c0fcc,2024-10-21T17:09:45.417000 -CVE-2024-49617,0,0,fc3bc12b8230aeed8fe5e270ffff12b76ff2c45b03602b48cb05ca2b01bcb351,2024-10-21T17:09:45.417000 -CVE-2024-49618,0,0,b259022a82a9786efc0f4b97a99bb745863f5ea5c29985d8c38260ee2752bd41,2024-10-21T17:09:45.417000 +CVE-2024-49613,0,0,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000 +CVE-2024-49614,0,0,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000 +CVE-2024-49615,0,1,130d0356784581205e5e46cf3362c72fc7aa63cdf23c2209a80a7b2698730ac0,2024-10-22T16:43:14.190000 +CVE-2024-49616,0,1,5b88766e762e6343817ed4b072fa559035aa10e15052258529a01845d89d6e9d,2024-10-22T16:41:58.513000 +CVE-2024-49617,0,1,273326047d3e6de5c637f9bb2298d7d33d462172d179296cb89214e45a7a6ea1,2024-10-22T16:51:35.353000 +CVE-2024-49618,0,1,4bf989c333be7a79b8e837d5c1bc3d3690e7ab118b29552d86d9a2559ce5377c,2024-10-22T16:50:18.527000 CVE-2024-49619,0,0,e8500ad2f662c42eb5cefcb54e6583c1e771076814e70ad1ad1341515be5295a,2024-10-21T17:09:45.417000 CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54 CVE-2024-49620,0,0,03cc08ebcdb9c3da220e8f96b59d9d80dae0359c2d758e8d050a48cf9a60b6aa,2024-10-21T17:09:45.417000 @@ -262824,16 +262844,16 @@ CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 CVE-2024-4984,0,0,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000 -CVE-2024-49850,0,0,8fb2208ed48bdb26222d1dc252f610fc96b2529a3c2127408e4890cb805ccb01,2024-10-21T17:09:45.417000 +CVE-2024-49850,0,1,2b33649e908446d8844acedbede0997555f012b73f46f17eddbc04e11a5ff156,2024-10-22T16:12:14.193000 CVE-2024-49851,0,0,3d484e6abda4a4ce29d99f10316c857626eb63bf2eefc7621c465c7b13c23949,2024-10-21T17:09:45.417000 CVE-2024-49852,0,0,262ffe2d9e462bcad9f414c5114ff048fe0027922ed23ed53a0208a484284b67,2024-10-21T17:09:45.417000 CVE-2024-49853,0,0,c217dd9272b2cd4fab6ae4f4c0fffed7f5095340c59c640aa7cae9145dfe0c13,2024-10-21T17:09:45.417000 CVE-2024-49854,0,0,94138472b5f74b096a6e54fd3e7d9e10ac0cdb3bdf0c5b3ece24fbd6184cc9bd,2024-10-21T17:09:45.417000 -CVE-2024-49855,0,1,b08dc86ebf2d1773422e8bece84884893e7c26fc05c4bac9762abe3418e3e42d,2024-10-22T15:17:29.283000 +CVE-2024-49855,0,1,1c10554d37ca1638fe05ddaa09d6ac939fe9e21d5da77a220a4fa3ba8205886d,2024-10-22T16:12:27.030000 CVE-2024-49856,0,0,69c6d5b77115b2740f272ad46ab48ff11264f8cb25014c56c24110ee5f0eca13,2024-10-21T17:09:45.417000 -CVE-2024-49857,0,1,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000 +CVE-2024-49857,0,0,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000 CVE-2024-49858,0,0,189a38e2e1729e4f650f5ed2d9949d8780bddccdc0a5c8eca5c522d45db87500,2024-10-21T17:09:45.417000 -CVE-2024-49859,0,1,5d84e21d84afa869d2d12c89058663c672035a9c51324863a468cd9ea096c485,2024-10-22T15:24:57.640000 +CVE-2024-49859,0,1,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99aaa1,2024-10-22T16:13:03.267000 CVE-2024-49860,0,0,f5150f7cf3bb2d2d0ca50e9d424c876fd9c84254fcf7bd6f2627024294f5ef2f,2024-10-21T17:09:45.417000 CVE-2024-49861,0,0,f8d823d453896bd63aeb95297d35b7ca2209aad13429ece51e5e583706dfbad3,2024-10-21T17:09:45.417000 CVE-2024-49862,0,0,0c94aa307fd6d2aeab9692641051191e71a94c4443ed0051d87097b98891acf2,2024-10-21T17:09:45.417000 @@ -263068,8 +263088,8 @@ CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76 CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 -CVE-2024-50311,1,1,673baaa29832ec29e40ef2e3d47df34dc1d10d7389d03beb5f8c46a2e87a0ff0,2024-10-22T14:15:19.450000 -CVE-2024-50312,1,1,c64596e697a11e7fbe1b0878c7d8da7e4a1b9ec94a567221a61a57e09b010e21,2024-10-22T14:15:19.973000 +CVE-2024-50311,0,0,673baaa29832ec29e40ef2e3d47df34dc1d10d7389d03beb5f8c46a2e87a0ff0,2024-10-22T14:15:19.450000 +CVE-2024-50312,0,0,c64596e697a11e7fbe1b0878c7d8da7e4a1b9ec94a567221a61a57e09b010e21,2024-10-22T14:15:19.973000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 @@ -264737,7 +264757,7 @@ CVE-2024-6955,0,0,a26f625ecf124adff42bb43bc9f1e0c8d32b78d7fbf99f165aa453f32a4235 CVE-2024-6956,0,0,402b3b90bc0ef6eea6fea2da2c73e896560064f50f2a4d52cad793cf96bb3277,2024-08-21T17:35:59.550000 CVE-2024-6957,0,0,b4f44e4de7831c46c7995591b032592b6aa63f3442f007561464731699c5213c,2024-08-21T17:33:42.753000 CVE-2024-6958,0,0,815ebcc0d5fc84aab6c67001f06fe76ce9152d116a343e60ea5524ee95f4434e,2024-08-21T17:42:29.697000 -CVE-2024-6959,0,1,2979894cb6a452e0b42932dad0034ff9396cd2b285ee4d2288644288267536cd,2024-10-22T14:02:57.660000 +CVE-2024-6959,0,0,2979894cb6a452e0b42932dad0034ff9396cd2b285ee4d2288644288267536cd,2024-10-22T14:02:57.660000 CVE-2024-6960,0,0,932ef4036cbd886ee22297597ffd985e884d3c0cad50613ff0bd32ecdcd39a17,2024-08-01T14:00:50.973000 CVE-2024-6961,0,0,c26f41db6b5c6e22104567980ea901ebcdc3d0c6ac8c59905ee37ac020ae3afe,2024-08-01T14:00:51.710000 CVE-2024-6962,0,0,b8054e2d59ceccdcd4628c1dbc900d3f0c22ab58e2eaf33700d9d63f648dd237,2024-07-25T15:47:18.363000 @@ -265473,8 +265493,8 @@ CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 CVE-2024-7888,0,0,57ff3b28678f008c2bdd72bf81b6e5b1bbb449b0748e8292d87b9d1342b8d17e,2024-09-27T13:45:33.030000 -CVE-2024-7889,0,1,8f4cdef609827730a9cb2f8ad45b312addf6698f361e0182fcc41d26379da297,2024-10-22T14:50:55.187000 -CVE-2024-7890,0,1,a6a2cdaf8fa24b7c70bfeed12ed4dadb214245a77f1cdad93eee0ad6e9de59e7,2024-10-22T14:53:32.763000 +CVE-2024-7889,0,0,8f4cdef609827730a9cb2f8ad45b312addf6698f361e0182fcc41d26379da297,2024-10-22T14:50:55.187000 +CVE-2024-7890,0,0,a6a2cdaf8fa24b7c70bfeed12ed4dadb214245a77f1cdad93eee0ad6e9de59e7,2024-10-22T14:53:32.763000 CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000 CVE-2024-7892,0,0,2c771bb8577e200bacd6c43e315ff1bcb3900b37f1489eacc31e5f9c96a3f146,2024-10-07T17:26:49.607000 CVE-2024-7895,0,0,5d06451cedf9987fa35d6bed95786130c1c32b54d5cc7bebb800749e8d9738bd,2024-09-19T22:13:37.097000 @@ -266195,7 +266215,7 @@ CVE-2024-8970,0,0,ac6a340d484c123a9130b7a8da1b91e0090b1836f7865857c5a2324dbb60a4 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae149149381,2024-10-16T17:10:13.220000 -CVE-2024-8980,1,1,ab8ec6030d8159f710ee21cdfc696408d9afd11cf59f459033246e03d1a15983,2024-10-22T15:15:07.337000 +CVE-2024-8980,0,0,ab8ec6030d8159f710ee21cdfc696408d9afd11cf59f459033246e03d1a15983,2024-10-22T15:15:07.337000 CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000 CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000 CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000 @@ -266242,7 +266262,7 @@ CVE-2024-9046,0,0,8656f1201ca0039377fd822b96252cedb47d7d532a98f822fda06fa6ad4421 CVE-2024-9047,0,0,4ea7d0b1b11f6de8ec31e11947f5e76892006c92ffae382a37fca981e56bba3b,2024-10-15T12:57:46.880000 CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000 CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000 -CVE-2024-9050,0,0,14129a5f05505d4e465f96c2bc8c9664e1202efe095f7995c49d65466ad68f7d,2024-10-22T13:15:02.410000 +CVE-2024-9050,0,1,60723fac2bf439bb1adcc7283747d4d8d7e0afa3e6de58e8a91bfd3f499e46a9,2024-10-22T17:15:06.420000 CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000 CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000 CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000 @@ -266295,6 +266315,7 @@ CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c6 CVE-2024-9124,0,0,ed784b79f60c57333454c5582ccee1e6855416a99a054b161105f40c65181fb5,2024-10-10T12:56:30.817000 CVE-2024-9125,0,0,178fee32dc964661b9c65fa72adfd723833bc712092eacf5141ac942799ac520,2024-10-01T14:00:52.460000 CVE-2024-9127,0,0,2a57398f5cef1966c50482248e5fdb86e0eae0bed7d0a3c554fbb9c182ab0a8a,2024-10-01T14:09:26.017000 +CVE-2024-9129,1,1,134f7ece5b3cefa919b3f6de8c2759de84aa703b1114c3e9b5f02710bae06ae5,2024-10-22T17:15:06.557000 CVE-2024-9130,0,0,c55ec493e0918bdc6346df7de1c7b50119b1912e830881716d5b60020f91e1cd,2024-10-04T17:18:59.130000 CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a1f,2024-10-01T14:28:31.027000 CVE-2024-9137,0,0,264d67370ab0f50b8c3f1048814084fcd11d0d542a946dd3f8623532739c7355,2024-10-15T12:57:46.880000 @@ -266331,7 +266352,7 @@ CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab2191 CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000 CVE-2024-9204,0,0,f5f991f4ad7621e1bd7fe1b28f2260110bc4f49be8b0fb440d3c802fe287a27c,2024-10-16T14:26:41.423000 CVE-2024-9205,0,0,f51eb73f6ff5e878b874b1fc87e2002dcbff618e0eb4a751eb85e6ba7e0830aa,2024-10-15T14:16:53.337000 -CVE-2024-9206,0,1,f2744d9088cb2b46074d22abdd833bb28847b84eac15877357583dce73a10136,2024-10-22T15:27:08.847000 +CVE-2024-9206,0,0,f2744d9088cb2b46074d22abdd833bb28847b84eac15877357583dce73a10136,2024-10-22T15:27:08.847000 CVE-2024-9207,0,0,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000 CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000 CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000 @@ -266375,6 +266396,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000 CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000 +CVE-2024-9287,1,1,3de2c43f5b9341b2c2d4d558e92dd45b9e29b5a5149d5bb65c4e8390fe8f56dd,2024-10-22T17:15:06.697000 CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000 CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000 CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000 @@ -266420,24 +266442,24 @@ CVE-2024-9350,0,0,290e64557c531b1051792213fe1cd034817a07f758e3a220c124933ec4bc84 CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 -CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000 +CVE-2024-9355,0,1,9fd824909ba068088861a875cafcc5135d14a5e660ace6b963f9d0d130917184,2024-10-22T17:15:06.853000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000 CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a7446,2024-10-04T18:53:58.020000 CVE-2024-9361,0,0,4693288d6f9b770f354b271d3230619579a50994dbc41bcafd3fa00ed196033b,2024-10-18T12:52:33.507000 -CVE-2024-9364,0,1,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000 -CVE-2024-9366,0,1,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000 +CVE-2024-9364,0,0,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000 +CVE-2024-9366,0,0,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000 CVE-2024-9368,0,0,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000 CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000 -CVE-2024-9373,0,1,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000 +CVE-2024-9373,0,0,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000 CVE-2024-9375,0,0,232ace92ca49be5c1a33c93abd9a6f17ed5ee21ca74aacf34cd6b513a369ea2a,2024-10-10T20:44:02.900000 CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5eaf,2024-10-15T14:18:12.483000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000 CVE-2024-9381,0,0,b7ffa8189ba636e7b223831995cd87655bb323db0a8ce57a0037b68bd6c82df8,2024-10-16T13:30:34.740000 -CVE-2024-9382,0,1,9974cbae3b65aba95d0b7e51ea5485cc9f96ba1c03eee8eb0122ba4567d68e55,2024-10-22T14:31:49.097000 -CVE-2024-9383,0,1,bcbb779641918c0449c8c1e715b100b70d4ebd612997069770f4fe494807a125,2024-10-22T14:27:13.377000 +CVE-2024-9382,0,0,9974cbae3b65aba95d0b7e51ea5485cc9f96ba1c03eee8eb0122ba4567d68e55,2024-10-22T14:31:49.097000 +CVE-2024-9383,0,0,bcbb779641918c0449c8c1e715b100b70d4ebd612997069770f4fe494807a125,2024-10-22T14:27:13.377000 CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000 CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 @@ -266472,7 +266494,7 @@ CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836 CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000 CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000 CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000 -CVE-2024-9452,0,0,611328d50c3715494f831c5942738c614750e5d97f90d9d50fc04089aa82bed2,2024-10-18T12:52:33.507000 +CVE-2024-9452,0,1,7eb2217e5eb4f5560cd9b75a09c78b5c11eea85f09a819264a7f744adf0ba17a,2024-10-22T16:23:59.420000 CVE-2024-9455,0,0,70bc73495623b6fab8931499505a6be70a8937392cffccc260a57663b280a262,2024-10-07T17:48:28.117000 CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8eeb,2024-10-15T14:23:57.307000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 @@ -266508,7 +266530,7 @@ CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca7 CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000 CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000 CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000 -CVE-2024-9537,0,0,452190c6664f6422cc10e3635c7e8aae7087139e3819c6b70da7292d35f00d48,2024-10-22T01:00:02.043000 +CVE-2024-9537,0,1,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794abf,2024-10-22T17:33:23.837000 CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000 CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000 CVE-2024-9540,0,0,155792833f2c3d33a8c6cc679a0bdb6a5ac3f76d67aede19f5592875c2f877b6,2024-10-16T16:38:14.557000 @@ -266574,7 +266596,7 @@ CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93 CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 -CVE-2024-9674,0,1,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 +CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 CVE-2024-9676,0,0,d31717e3bcb8586d94edf5a821882c847af5c510cf5d1e8e5ea8ab53ee1286ab,2024-10-16T16:38:43.170000 CVE-2024-9677,0,0,7cf8d43d57c2900d9443e482797783848d861069497504cccb5159525ba63cae,2024-10-22T02:15:04.380000 @@ -266583,7 +266605,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 -CVE-2024-9703,0,1,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000 +CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000 CVE-2024-9704,0,0,44ebf677ae69495b92126e2eb8d9d17c07544c8235e40f4412f83b24b48e2f3a,2024-10-15T12:57:46.880000 CVE-2024-9707,0,0,cde0816a76e7682ea9f7dc3a69f12238a4d95599cfec418d205198361a6879cf,2024-10-15T12:58:51.050000 CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da6473,2024-10-15T12:57:46.880000 @@ -266630,7 +266652,7 @@ CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000 -CVE-2024-9848,0,0,c9c868f8b4dfcb8a16c343ca24b48f00207606de4438d4f715e98402b24e1592,2024-10-18T12:52:33.507000 +CVE-2024-9848,0,1,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000 CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000 CVE-2024-9858,0,0,bef02c0d9ed07a4afa527340189d49e60d5c238f08809a01d4eade734c583a54,2024-10-16T17:35:08.130000 @@ -266644,7 +266666,7 @@ CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c4 CVE-2024-9888,0,0,de5de1e3177c72ea1d0a5d19aa48b1693390bd1baf1f85524c962ffa2c18433f,2024-10-16T16:38:14.557000 CVE-2024-9889,0,0,ae2d8b3ae5ea45b7bf6ef4fc45ab8d1cf63876d506d81aa02cc186300793ec67,2024-10-21T17:10:22.857000 CVE-2024-9891,0,0,53ec4da3ba927732190105b9993cdfaefd46788f3c82dc582d229482b0eb1fcc,2024-10-16T16:38:14.557000 -CVE-2024-9892,0,1,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714ba,2024-10-22T15:46:17.880000 +CVE-2024-9892,0,0,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714ba,2024-10-22T15:46:17.880000 CVE-2024-9893,0,0,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000 CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000 CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000