From 051ec88b247e2b31a85a5f051f23fe8edb60c6d1 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 9 Oct 2024 18:03:19 +0000 Subject: [PATCH] Auto-Update: 2024-10-09T18:00:18.768864+00:00 --- CVE-2019/CVE-2019-201xx/CVE-2019-20101.json | 24 +- CVE-2021/CVE-2021-391xx/CVE-2021-39125.json | 24 +- CVE-2021/CVE-2021-413xx/CVE-2021-41305.json | 34 +- CVE-2023/CVE-2023-212xx/CVE-2023-21269.json | 14 +- CVE-2023/CVE-2023-212xx/CVE-2023-21272.json | 14 +- CVE-2023/CVE-2023-236xx/CVE-2023-23639.json | 14 +- CVE-2023/CVE-2023-482xx/CVE-2023-48206.json | 34 +- CVE-2023/CVE-2023-488xx/CVE-2023-48831.json | 34 +- CVE-2023/CVE-2023-65xx/CVE-2023-6501.json | 70 ++- CVE-2024/CVE-2024-204xx/CVE-2024-20470.json | 529 +++++++++++++++++++- CVE-2024/CVE-2024-248xx/CVE-2024-24881.json | 47 +- CVE-2024/CVE-2024-252xx/CVE-2024-25285.json | 43 +- CVE-2024/CVE-2024-258xx/CVE-2024-25825.json | 33 ++ CVE-2024/CVE-2024-27xx/CVE-2024-2762.json | 29 +- CVE-2024/CVE-2024-280xx/CVE-2024-28020.json | 20 +- CVE-2024/CVE-2024-310xx/CVE-2024-31098.json | 14 +- CVE-2024/CVE-2024-356xx/CVE-2024-35649.json | 8 +- CVE-2024/CVE-2024-364xx/CVE-2024-36474.json | 64 ++- CVE-2024/CVE-2024-424xx/CVE-2024-42415.json | 54 +- CVE-2024/CVE-2024-429xx/CVE-2024-42988.json | 29 ++ CVE-2024/CVE-2024-435xx/CVE-2024-43572.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43573.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43610.json | 63 +++ CVE-2024/CVE-2024-43xx/CVE-2024-4325.json | 50 +- CVE-2024/CVE-2024-457xx/CVE-2024-45746.json | 25 + CVE-2024/CVE-2024-462xx/CVE-2024-46292.json | 60 +++ CVE-2024/CVE-2024-463xx/CVE-2024-46304.json | 56 +++ CVE-2024/CVE-2024-463xx/CVE-2024-46307.json | 29 ++ CVE-2024/CVE-2024-463xx/CVE-2024-46316.json | 21 + CVE-2024/CVE-2024-49xx/CVE-2024-4941.json | 67 ++- CVE-2024/CVE-2024-51xx/CVE-2024-5179.json | 14 +- CVE-2024/CVE-2024-54xx/CVE-2024-5482.json | 49 +- CVE-2024/CVE-2024-89xx/CVE-2024-8983.json | 31 +- CVE-2024/CVE-2024-90xx/CVE-2024-9021.json | 31 +- CVE-2024/CVE-2024-94xx/CVE-2024-9463.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9464.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9465.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9466.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9467.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9468.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9469.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9470.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9471.json | 78 +++ CVE-2024/CVE-2024-94xx/CVE-2024-9473.json | 78 +++ CVE-2024/CVE-2024-96xx/CVE-2024-9602.json | 45 +- CVE-2024/CVE-2024-96xx/CVE-2024-9603.json | 41 +- CVE-2024/CVE-2024-96xx/CVE-2024-9680.json | 39 +- README.md | 103 ++-- _state.csv | 304 +++++------ 49 files changed, 2639 insertions(+), 317 deletions(-) create mode 100644 CVE-2024/CVE-2024-258xx/CVE-2024-25825.json create mode 100644 CVE-2024/CVE-2024-429xx/CVE-2024-42988.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43610.json create mode 100644 CVE-2024/CVE-2024-457xx/CVE-2024-45746.json create mode 100644 CVE-2024/CVE-2024-462xx/CVE-2024-46292.json create mode 100644 CVE-2024/CVE-2024-463xx/CVE-2024-46304.json create mode 100644 CVE-2024/CVE-2024-463xx/CVE-2024-46307.json create mode 100644 CVE-2024/CVE-2024-463xx/CVE-2024-46316.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9463.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9464.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9465.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9466.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9467.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9468.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9469.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9470.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9471.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9473.json diff --git a/CVE-2019/CVE-2019-201xx/CVE-2019-20101.json b/CVE-2019/CVE-2019-201xx/CVE-2019-20101.json index dcc8bc4d7ef..67e6d2ec0e5 100644 --- a/CVE-2019/CVE-2019-201xx/CVE-2019-20101.json +++ b/CVE-2019/CVE-2019-201xx/CVE-2019-20101.json @@ -2,8 +2,8 @@ "id": "CVE-2019-20101", "sourceIdentifier": "security@atlassian.com", "published": "2021-09-14T05:15:07.437", - "lastModified": "2021-10-18T12:13:56.640", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T17:35:02.077", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-391xx/CVE-2021-39125.json b/CVE-2021/CVE-2021-391xx/CVE-2021-39125.json index f596ed0dce4..c71ab13239f 100644 --- a/CVE-2021/CVE-2021-391xx/CVE-2021-39125.json +++ b/CVE-2021/CVE-2021-391xx/CVE-2021-39125.json @@ -2,8 +2,8 @@ "id": "CVE-2021-39125", "sourceIdentifier": "security@atlassian.com", "published": "2021-09-14T07:15:07.233", - "lastModified": "2022-06-28T14:11:45.273", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T17:35:02.380", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-413xx/CVE-2021-41305.json b/CVE-2021/CVE-2021-413xx/CVE-2021-41305.json index 889f81c8fcd..97adc166153 100644 --- a/CVE-2021/CVE-2021-413xx/CVE-2021-41305.json +++ b/CVE-2021/CVE-2021-413xx/CVE-2021-41305.json @@ -2,8 +2,8 @@ "id": "CVE-2021-41305", "sourceIdentifier": "security@atlassian.com", "published": "2021-10-26T05:15:07.350", - "lastModified": "2022-05-03T16:04:40.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T17:35:02.607", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21269.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21269.json index a7d232e0de7..d48435d2bc0 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21269.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21269.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21269", "sourceIdentifier": "security@android.com", "published": "2023-08-14T21:15:12.460", - "lastModified": "2023-08-24T15:07:31.833", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T16:35:01.057", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21272.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21272.json index de49789e8ff..a3990ce16a4 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21272.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21272.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21272", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:12.677", - "lastModified": "2023-08-18T19:56:45.393", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T16:35:02.920", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23639.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23639.json index ba93b80b79e..6f2f2d53f7f 100644 --- a/CVE-2023/CVE-2023-236xx/CVE-2023-23639.json +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23639.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23639", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-09T10:15:08.370", - "lastModified": "2024-10-05T01:37:41.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T17:05:48.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 }, { diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48206.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48206.json index aa9d762450c..dba15cfb07f 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48206.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48206.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48206", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T07:15:09.557", - "lastModified": "2023-12-09T04:46:38.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T16:35:04.887", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48831.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48831.json index 28faddb370b..1ff0e54eb1c 100644 --- a/CVE-2023/CVE-2023-488xx/CVE-2023-48831.json +++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48831.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48831", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T07:15:11.280", - "lastModified": "2023-12-09T04:47:51.867", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T16:35:06.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6501.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6501.json index b20fdb92e6f..7001cfe9ec0 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6501.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6501.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6501", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-12T16:15:08.283", - "lastModified": "2024-02-12T17:31:21.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T16:35:04.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "El complemento Splashscreen de WordPress hasta la versi\u00f3n 0.20 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cochinoman:splashscreen:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.20", + "matchCriteriaId": "107EE1BA-0B2D-406F-ADDC-383703802B4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://magos-securitas.com/txt/CVE-2023-6501.txt", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit" + ] }, { "url": "https://wpscan.com/vulnerability/dd19189b-de04-44b6-8ac9-0c32399a8976/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json index 637f5a0f38c..b15826ae167 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20470", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-02T17:15:17.027", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T16:55:23.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,503 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", + "matchCriteriaId": "EBAD013E-3550-4157-B52A-F045DEFB0810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", + "matchCriteriaId": "566AF5EF-B7BD-4F4A-9D5E-82588207C80E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", + "matchCriteriaId": "C0B4BB7F-FE4B-404D-9977-AAA3D492634B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", + "matchCriteriaId": "F6BCBFF6-9A31-48BD-B93D-598564A3BB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", + "matchCriteriaId": "DB20575D-3E22-49CA-91DE-CBACF2146D3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", + "matchCriteriaId": "8836DC95-1076-4CC4-8A6C-34F3ACCA312A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", + "matchCriteriaId": "45488336-CAF5-4F15-BB6E-5BEBD87A4F97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", + "matchCriteriaId": "BB498AAC-2FAC-4FCC-B644-1180627A5D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", + "matchCriteriaId": "744B76F8-1276-42ED-8913-5FC9E11F2F2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", + "matchCriteriaId": "1A4D7663-50E6-45B1-8701-2DF2D7F744AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", + "matchCriteriaId": "C0E4341D-9FD4-4AAD-A5BE-35B0909A8FE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", + "matchCriteriaId": "33A1EFF8-024B-46F6-A7E3-FCC593314B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D4C611-38FD-4BF1-B478-03F01283EAC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", + "matchCriteriaId": "4788385E-133A-4908-97A0-135403424DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", + "matchCriteriaId": "150DE44A-A558-4C15-8028-C301259E5ABF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5E8D98-570C-49A1-9934-45BBCD02AB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", + "matchCriteriaId": "6D9FF79A-BEE5-4204-B2C5-E0943DCD7773" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", + "matchCriteriaId": "F15F5D4D-A256-4A2E-9873-F0514F81CA77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", + "matchCriteriaId": "9ACFBF35-E5B2-4807-AC7D-E3021EAAEE94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", + "matchCriteriaId": "EA1379E9-D147-48F4-AE3A-860B49EFA497" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6822600-E716-4F22-AF34-AD2914D6C128" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", + "matchCriteriaId": "5BC16280-4809-4B2C-825C-76A99392F95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", + "matchCriteriaId": "9A112271-F32C-49F5-B6DA-4DDBBB146106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", + "matchCriteriaId": "133E4C64-B9C8-4B65-927D-39B7BDF89AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", + "matchCriteriaId": "ACD9ECA7-1DC4-4122-9D02-B258A62A2FA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", + "matchCriteriaId": "53A19846-F451-4578-A25B-F3777BE90C35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", + "matchCriteriaId": "A69964DE-67E6-4B1C-B3D2-C9177A891C40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", + "matchCriteriaId": "FB3346A2-D0FB-4AE7-87C0-793DE49D555B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", + "matchCriteriaId": "40B366BB-EC50-4C1A-ACFA-61C86714FE1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", + "matchCriteriaId": "29C253B5-DAAD-45F0-8A45-B6F44FC74DAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", + "matchCriteriaId": "4893D744-9041-4C89-A33C-8BB989B3FDFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", + "matchCriteriaId": "2AB31F2B-3A74-45DD-B21E-A698E321BA6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE2B1CD-E350-4C5D-BAA6-17138A8343F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", + "matchCriteriaId": "03FFDBF2-939C-46A3-BA90-6DED64474338" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", + "matchCriteriaId": "426C4FDC-AAF3-4726-80D0-7C48B06A7E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", + "matchCriteriaId": "E08A813B-630D-4EF4-812B-9E81A48A1DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", + "matchCriteriaId": "F27B5644-BA7B-4442-A539-337F93238479" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", + "matchCriteriaId": "9504523A-37F0-417A-99B4-CABE21E5E744" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", + "matchCriteriaId": "BE54D030-093B-4267-8169-C2DCF72605D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", + "matchCriteriaId": "D70E0828-1150-44FD-82C2-C441A3ACF644" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", + "matchCriteriaId": "F1C0171B-4C5D-4C15-84DD-E556C5AFDCBA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7E29320-5668-4F48-9BA1-DC81B256320B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", + "matchCriteriaId": "85C44874-31B8-4872-9973-4444D15B09B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", + "matchCriteriaId": "005FADE6-BF4F-416A-965A-46BF5F6C6D0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", + "matchCriteriaId": "0F78C801-EC2A-4B28-9ED1-A30E3589C3F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", + "matchCriteriaId": "2218EEEA-BB4D-4343-BB9F-3C01EA473342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", + "matchCriteriaId": "609583B2-4D32-4E76-AA9B-DA24A1BAFB16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", + "matchCriteriaId": "59D15056-B04A-40F1-A6D4-66A91FCE5A75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", + "matchCriteriaId": "217B02B2-B4E6-40E7-993C-238D7FBEBFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", + "matchCriteriaId": "5659BD61-EE0C-49BF-8484-034A58BA32E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", + "matchCriteriaId": "3B9B65AE-D6EF-4A2E-9C2D-D96E64506080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", + "matchCriteriaId": "383D6202-4215-46F5-9AA8-F7348997B99A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", + "matchCriteriaId": "55939AC6-77E2-43E6-956C-B0B99CEAB315" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", + "matchCriteriaId": "2385BD9B-80C6-4E54-A4A9-EEA724E58FE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", + "matchCriteriaId": "64CA692C-2D66-483B-A440-746A998CED07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", + "matchCriteriaId": "1D4AEE39-5EE2-43C7-80DC-B078A9953D4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", + "matchCriteriaId": "85FA6AFD-7A8E-4505-8E4F-3A06199E6697" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", + "matchCriteriaId": "36FE60B1-EE9F-4034-9612-482E2EECFBEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", + "matchCriteriaId": "DCCD1FC1-6029-4DDC-898C-169E429D1FA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", + "matchCriteriaId": "1C1E99B3-ACEA-48C1-A649-497D5960F215" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", + "matchCriteriaId": "53A69806-3B9F-46E5-877B-9477E3AF0A34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", + "matchCriteriaId": "95D01F5A-1CC5-4C52-AB70-5DF41588EF98" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", + "matchCriteriaId": "D2812299-2A3C-49AA-9E81-BE4AA50F0D8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", + "matchCriteriaId": "20569E42-E769-401B-8163-3981C7905943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", + "matchCriteriaId": "105566D1-80A2-4545-9BF9-B3382162CA48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", + "matchCriteriaId": "A468D852-CA7F-4561-9F0E-DB6A056A5F31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", + "matchCriteriaId": "C72F80EF-787D-4A5E-9B03-5215AD400571" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", + "matchCriteriaId": "66D7C66E-AF9E-4419-B6CE-3489DC19212E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", + "matchCriteriaId": "041D9323-A320-4492-BAC7-4E0B06FF56E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", + "matchCriteriaId": "2D047F9E-7BCE-4F7E-B334-426F46CFCE66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", + "matchCriteriaId": "77E8D977-F28F-46D9-8DA2-7A1746F4278F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", + "matchCriteriaId": "A87D53D4-AF6F-4E5C-A7A4-099294029C59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", + "matchCriteriaId": "42672D7D-5265-4323-A284-F36722F7C36A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", + "matchCriteriaId": "A71CFA39-CF25-4B37-855A-7816770633ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", + "matchCriteriaId": "2649FFCF-D9E1-466A-A7ED-4A2653259A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", + "matchCriteriaId": "743D74FF-2334-4C16-BDDD-FDFD4EEBF9EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", + "matchCriteriaId": "29AF1721-2676-4FDA-97E0-55E53A03AC16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", + "matchCriteriaId": "C3005E36-D17A-498B-9BF4-1D972FA03553" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", + "matchCriteriaId": "EFD115E4-53C8-4E3C-9024-4AE5F1F5DFB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", + "matchCriteriaId": "1D0231F8-CC96-4F02-9737-654FECFCF624" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", + "matchCriteriaId": "9C600D9E-4DDF-45A2-8760-749F0FB06513" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", + "matchCriteriaId": "B675841D-7591-492F-BCF0-E63D416C7F1E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF972452-70D7-4026-A326-ACDD7446DD9B" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24881.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24881.json index bff707bbe1f..1c0d9840db6 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24881.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24881.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24881", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-08T12:15:56.373", - "lastModified": "2024-02-08T13:44:11.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T16:28:32.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veronalabs:wp_sms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.5.3", + "matchCriteriaId": "D6AADFC7-97A9-49A4-8E9A-55347A0E3A3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-sms/wordpress-wp-sms-plugin-6-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25285.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25285.json index 0771709a408..11e686a04a9 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25285.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25285.json @@ -2,16 +2,55 @@ "id": "CVE-2024-25285", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T04:15:07.700", - "lastModified": "2024-10-09T04:15:07.700", + "lastModified": "2024-10-09T16:35:07.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "3DSecure 2.0 allows form action hijacking via threeDsMethod.jsp?threeDSMethodData= or the threeDSMethodNotificationURL parameter. The destination web site for a form submission can be modified." + }, + { + "lang": "es", + "value": "3DSecure 2.0 permite el secuestro de acciones de formularios a trav\u00e9s de threeDsMethod.jsp?threeDSMethodData= o el par\u00e1metro threeDSMethodNotificationURL. El sitio web de destino para el env\u00edo de un formulario se puede modificar." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25825.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25825.json new file mode 100644 index 00000000000..180de7b4f71 --- /dev/null +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25825.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-25825", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-09T16:15:04.277", + "lastModified": "2024-10-09T16:15:04.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FydeOS for PC 17.1 R114, FydeOS for VMware 17.0 R114, FydeOS for You 17.1 R114, and OpenFyde R114 were discovered to be configured with the root password saved as a wildcard. This allows attackers to gain root access without a password." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://fydeos.io/", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/hchasens/d20dff418f6908dc96e65f4e43a058f1", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/openFyde/", + "source": "cve@mitre.org" + }, + { + "url": "https://openfyde.io/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2762.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2762.json index bfcc05adbcc..54dc471723f 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2762.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2762.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2762", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-13T06:15:11.003", - "lastModified": "2024-07-22T18:31:03.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T17:12:42.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,25 +60,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:fooplugins:foogallery:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:fooplugins:foogallery:*:*:*:*:-:wordpress:*:*", "versionEndExcluding": "2.4.15", - "matchCriteriaId": "390C2540-AF20-4040-8109-0D1167BE86DE" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "matchCriteriaId": "7A6BC8B7-C039-471D-8028-0AA5923FD6E7" + }, { "vulnerable": true, - "criteria": "cpe:2.3:a:fooplugins:foogallery_premium:*:*:*:*:*:wordpress:*:*", - "versionEndExcluding": "2.4.6", - "matchCriteriaId": "D25DBF2F-E489-47D1-B4BD-49F34AED5E58" + "criteria": "cpe:2.3:a:fooplugins:foogallery:*:*:*:*:premium:wordpress:*:*", + "versionEndExcluding": "2.4.15", + "matchCriteriaId": "17764D23-355F-4F8C-9E6E-EAD576A0D624" } ] } @@ -90,7 +80,8 @@ "url": "https://wpscan.com/vulnerability/92e0f5ca-0184-4e9c-b01a-7656e05dce69/", "source": "contact@wpscan.com", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28020.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28020.json index 005e7c964e3..fa202f98126 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28020.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28020", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T19:16:05.787", - "lastModified": "2024-08-15T21:32:33.467", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T17:08:57.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,23 +90,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:hitachienergy:foxman_un:r15a:*:*:*:*:*:*:*", - "matchCriteriaId": "DE718EB5-3F54-4CCB-A34E-5BA0DF87EEF0" + "criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15a:*:*:*:*:*:*:*", + "matchCriteriaId": "A7593C74-2882-45D3-AB32-3A45E3AECAAE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:hitachienergy:foxman_un:r15b:*:*:*:*:*:*:*", - "matchCriteriaId": "EB17D0E8-A0AD-4B1B-A92B-110521975AE0" + "criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15b:*:*:*:*:*:*:*", + "matchCriteriaId": "47606044-296D-4561-B9DC-82659BC666F2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:hitachienergy:foxman_un:r16a:*:*:*:*:*:*:*", - "matchCriteriaId": "3ED924CD-4EBF-453E-BC07-40EB415F2585" + "criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16a:*:*:*:*:*:*:*", + "matchCriteriaId": "7EE987B2-0620-44BB-AEA7-4E20CBE44822" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:hitachienergy:foxman_un:r16b:*:*:*:*:*:*:*", - "matchCriteriaId": "9D92BFBB-239A-4188-A227-67D13C84CA5C" + "criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16b:*:*:*:*:*:*:*", + "matchCriteriaId": "AE743C56-A17F-4FA7-9998-0C767E07518A" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31098.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31098.json index 10f78cf91f4..037fded9a9c 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31098.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31098", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-09T09:15:11.073", - "lastModified": "2024-10-05T01:54:33.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T17:02:55.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 }, { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35649.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35649.json index 029acf68ac6..e1fbc424006 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35649.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35649.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35649", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T15:15:46.007", - "lastModified": "2024-06-06T13:26:46.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T16:48:22.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pdfcrowd:save_as_pdf_plugin:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.3.0", - "matchCriteriaId": "3A7C7437-0F83-44B1-A6B6-01B55B221337" + "matchCriteriaId": "23C7FD3D-ACAE-4CA4-96A6-9A4BE7B7CB57" } ] } diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36474.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36474.json index d53dcb5cb8d..40bd8b76935 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36474.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36474.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36474", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-03T16:15:05.010", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T16:37:55.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnome:libgsf:1.14.52:*:*:*:*:*:*:*", + "matchCriteriaId": "8F1D11AD-C49A-473B-A1F7-7FDC04493B1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.gnome.org/GNOME/libgsf/-/issues/34", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2068", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42415.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42415.json index 2ea50decddc..b8720487401 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42415.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42415.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42415", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-03T16:15:05.867", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T16:44:20.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnome:libgsf:1.14.52:*:*:*:*:*:*:*", + "matchCriteriaId": "8F1D11AD-C49A-473B-A1F7-7FDC04493B1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.gnome.org/GNOME/libgsf/-/issues/34", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2069", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42988.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42988.json new file mode 100644 index 00000000000..8163745fddd --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42988.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-42988", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-09T17:15:16.337", + "lastModified": "2024-10-09T17:15:16.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Lack of access control in ChallengeSolves (/api/v1/challenges//solves) of CTFd v2.0.0 - v3.7.2 allows authenticated users to retrieve a list of users who have solved the challenge, regardless of the Account Visibility settings. The issue is fixed in v3.7.3+." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.ctfd.io/ctfd-3-7-3/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/CTFd/CTFd/pull/2570", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/CTFd/CTFd/releases/tag/3.7.3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json index 13a2e68b450..b1d9c05996b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43572", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.593", - "lastModified": "2024-10-09T01:00:01.157", - "vulnStatus": "Received", + "lastModified": "2024-10-09T16:16:45.687", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "cisaExploitAdd": "2024-10-08", "cisaActionDue": "2024-10-29", @@ -13,6 +13,10 @@ { "lang": "en", "value": "Microsoft Management Console Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Management Console" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json index 220a128b345..b87223bb94f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43573", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.817", - "lastModified": "2024-10-09T01:00:01.157", - "vulnStatus": "Received", + "lastModified": "2024-10-09T16:16:42.877", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "cisaExploitAdd": "2024-10-08", "cisaActionDue": "2024-10-29", @@ -13,6 +13,10 @@ { "lang": "en", "value": "Windows MSHTML Platform Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de la plataforma MSHTML de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43610.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43610.json new file mode 100644 index 00000000000..9d4e9edac75 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43610.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-43610", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-10-09T17:15:19.397", + "lastModified": "2024-10-09T17:15:19.397", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "secure@microsoft.com", + "tags": [ + "exclusively-hosted-service" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43610", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4325.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4325.json index 4cb8f0bdeeb..473f6e6fc58 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4325.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4325.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4325", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:18.300", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T16:04:49.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,10 +73,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*", + "versionEndExcluding": "4.41.0", + "matchCriteriaId": "2FBC4B4D-0916-4DB0-A8C6-2F91A26EFF5E" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/b34f084b-7d14-4f00-bc10-048a3a5aaf88", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json new file mode 100644 index 00000000000..3343e7c0cb1 --- /dev/null +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45746", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-09T17:15:19.727", + "lastModified": "2024-10-09T17:15:19.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://trustedfirmware-m.readthedocs.io/en/latest/security/security_advisories/user_pointers_mailbox_vectors_vulnerability.html", + "source": "cve@mitre.org" + }, + { + "url": "https://www.trustedfirmware.org/projects/tf-m/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json new file mode 100644 index 00000000000..dc797869d0e --- /dev/null +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-46292", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-09T16:15:04.373", + "lastModified": "2024-10-09T17:35:14.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/owasp-modsecurity/ModSecurity/blob/v3/master/README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yoloflz101/yoloflz/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46304.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46304.json new file mode 100644 index 00000000000..53e4205b960 --- /dev/null +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46304.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-46304", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-09T16:15:04.437", + "lastModified": "2024-10-09T17:35:15.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Buffer Overflow vulnerability in libcoap v4.3.5-rc2 and below allows a remote attacker to cause a denial of service via the coap_handle_request_put_block function in src/coap_block.c." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/obgm/libcoap/issues/1509", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46307.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46307.json new file mode 100644 index 00000000000..7e06f7a6893 --- /dev/null +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46307.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-46307", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-09T17:15:19.813", + "lastModified": "2024-10-09T17:15:19.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A loop hole in the payment logic of Sparkshop v1.16 allows attackers to arbitrarily modify the number of products." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://sparkshop.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gitee.com/sparkshop/sparkshop", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-46307", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46316.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46316.json new file mode 100644 index 00000000000..6edc1cbae45 --- /dev/null +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46316.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46316", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-09T16:15:04.487", + "lastModified": "2024-10-09T16:15:04.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DrayTek Vigor3900 v1.5.1.6 was discovered to contain a command injection vulnerability via the sub_2C920 function at /cgi-bin/mainfunction.cgi. This vulnerability allows attackers to execute arbitrary commands via supplying a crafted HTTP message." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/glkfc/IoT-Vulnerability/blob/main/DaryTek/vigor3900_4.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4941.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4941.json index 5b141f40dd9..91520f7aec7 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4941.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4941", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:18.783", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T16:24:24.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +83,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*", + "versionEndExcluding": "4.31.4", + "matchCriteriaId": "6D1B27C4-B978-4ABC-A9AB-6A894C31AFDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gradio-app/gradio/commit/ee1e2942e0a1ae84a08a05464e41c8108a03fa9c", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/39889ce1-298d-4568-aecd-7ae40c2ca58e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5179.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5179.json index 305c2d9e35b..50c16dcfcd7 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5179.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5179.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5179", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:54.487", - "lastModified": "2024-08-06T12:10:17.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T16:57:08.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:codeless:cowidgets_elementor_addons:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:codeless:cowidgets_elementor_addons:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.2.0", - "matchCriteriaId": "4BCA1C3B-FAB1-44E2-B090-BF82C4364981" + "matchCriteriaId": "8F7A9973-AE5A-4DBF-A44D-A05185ECF346" } ] } @@ -74,7 +74,6 @@ "url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-portfolio-grid.php#L707", "source": "security@wordfence.com", "tags": [ - "Patch", "Product" ] }, @@ -82,7 +81,6 @@ "url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-post-navigation.php#L257", "source": "security@wordfence.com", "tags": [ - "Patch", "Product" ] }, @@ -90,7 +88,6 @@ "url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-carousel.php#L727", "source": "security@wordfence.com", "tags": [ - "Patch", "Product" ] }, @@ -98,7 +95,6 @@ "url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-grid.php#L582", "source": "security@wordfence.com", "tags": [ - "Patch", "Product" ] }, @@ -106,7 +102,6 @@ "url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-staff-carousel.php#L603", "source": "security@wordfence.com", "tags": [ - "Patch", "Product" ] }, @@ -114,7 +109,6 @@ "url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-testimonial-carousel.php#L600", "source": "security@wordfence.com", "tags": [ - "Patch", "Product" ] }, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5482.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5482.json index 0d196984a02..2236fefcd19 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5482.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5482.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5482", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:21.207", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T16:12:24.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0447480-50CE-4682-B3B1-B8F021C5C731" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/d97e23e7-172f-4862-a732-86bfc0b7860e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json index 658fbe1832c..a64182539c3 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json @@ -2,16 +2,43 @@ "id": "CVE-2024-8983", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-08T06:15:02.490", - "lastModified": "2024-10-08T06:15:02.490", + "lastModified": "2024-10-09T16:35:09.290", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Custom Twitter Feeds WordPress plugin before 2.2.3 is not filtering some of its settings allowing high privilege users to inject scripts." + }, + { + "lang": "es", + "value": "El complemento Custom Twitter Feeds de WordPress anterior a la versi\u00f3n 2.2.3 no filtra algunas de sus configuraciones, lo que permite a los usuarios con altos privilegios inyectar scripts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/29194dde-8d11-4096-a5ae-1d69c2c5dc33/", diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9021.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9021.json index 552d661aa7f..2bbe541225d 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9021.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9021.json @@ -2,16 +2,43 @@ "id": "CVE-2024-9021", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-08T06:15:02.693", - "lastModified": "2024-10-08T06:15:02.693", + "lastModified": "2024-10-09T16:35:09.457", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the process of testing the Relevanssi WordPress plugin before 4.23.1, a vulnerability was found that allows you to implement Stored XSS on behalf of the Contributor+ by embedding malicious script, which entails account takeover backdoor" + }, + { + "lang": "es", + "value": "En el proceso de prueba del complemento Relevanssi para WordPress anterior a la versi\u00f3n 4.23.1, se encontr\u00f3 una vulnerabilidad que permite implementar XSS almacenado en nombre de Contributor+ mediante la incorporaci\u00f3n de un script malicioso, lo que implica una puerta trasera de apropiaci\u00f3n de cuentas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/5f25646d-b80b-40b1-bcaf-3b860ddc4059/", diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json new file mode 100644 index 00000000000..9efe8d769fb --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9463", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:19.973", + "lastModified": "2024-10-09T17:15:19.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "RED", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/PAN-SA-2024-0010", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9464.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9464.json new file mode 100644 index 00000000000..2b29662530f --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9464.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9464", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:20.170", + "lastModified": "2024-10-09T17:15:20.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "RED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/PAN-SA-2024-0010", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json new file mode 100644 index 00000000000..a9d55af1124 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9465", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:20.287", + "lastModified": "2024-10-09T17:15:20.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "RED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/PAN-SA-2024-0010", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9466.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9466.json new file mode 100644 index 00000000000..929514f039f --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9466.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9466", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:20.400", + "lastModified": "2024-10-09T17:15:20.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Red", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "RED", + "baseScore": 8.2, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/PAN-SA-2024-0010", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9467.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9467.json new file mode 100644 index 00000000000..d9a69902d8b --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9467.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9467", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:20.517", + "lastModified": "2024-10-09T17:15:20.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A reflected XSS vulnerability in Palo Alto Networks Expedition enables execution of malicious JavaScript in the context of an authenticated Expedition user's browser if that user clicks on a malicious link, allowing phishing attacks that could lead to Expedition browser session theft." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "RED", + "baseScore": 7.0, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/PAN-SA-2024-0010", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json new file mode 100644 index 00000000000..e323def02e9 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9468", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:20.637", + "lastModified": "2024-10-09T17:15:20.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "AMBER", + "baseScore": 8.2, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-9468", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json new file mode 100644 index 00000000000..8abde3cfa1b --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9469", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:20.770", + "lastModified": "2024-10-09T17:15:20.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-9469", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json new file mode 100644 index 00000000000..a7c4015da7b --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9470", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:20.907", + "lastModified": "2024-10-09T17:15:20.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cortex XSOAR allows the disclosure of incident data to users who do not have the privilege to view the data." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:M/U:Amber", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "AUTOMATIC", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-9470", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9471.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9471.json new file mode 100644 index 00000000000..71b1ee2f9de --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9471.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9471", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:21.090", + "lastModified": "2024-10-09T17:15:21.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with \"Virtual system administrator (read-only)\" access could use an XML API key of a \"Virtual system administrator\" to perform write operations on the virtual system configuration even though they should be limited to read-only operations." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:D/RE:L/U:Green", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "AUTOMATIC", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "GREEN", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-9471", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json new file mode 100644 index 00000000000..5c779cb2150 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9473", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-10-09T17:15:21.230", + "lastModified": "2024-10-09T17:15:21.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-9473", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9602.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9602.json index 9efd09fec34..fdb909e2c64 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9602.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9602.json @@ -2,16 +2,43 @@ "id": "CVE-2024-9602", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-08T23:15:12.947", - "lastModified": "2024-10-08T23:15:12.947", + "lastModified": "2024-10-09T17:35:16.980", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Type Confusion in V8 in Google Chrome prior to 129.0.6668.100 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.100 permit\u00eda a un atacante remoto realizar una escritura en la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada espec\u00edficamente. (Gravedad de seguridad de Chromium: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +49,20 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + }, + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9603.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9603.json index cafc5550702..5a6c92c95ba 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9603.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9603.json @@ -2,16 +2,43 @@ "id": "CVE-2024-9603", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-08T23:15:13.040", - "lastModified": "2024-10-08T23:15:13.040", + "lastModified": "2024-10-09T16:35:09.623", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Type Confusion in V8 in Google Chrome prior to 129.0.6668.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.100 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +49,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json index 50fde390678..12fc2d94bae 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9680", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-09T13:15:12.090", - "lastModified": "2024-10-09T13:15:12.090", + "lastModified": "2024-10-09T16:35:10.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1923344", diff --git a/README.md b/README.md index 593b84a908e..a61680f6fc5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-09T16:00:24.936823+00:00 +2024-10-09T18:00:18.768864+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-09T15:57:03.037000+00:00 +2024-10-09T17:35:16.980000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265125 +265143 ``` ### CVEs added in the last Commit -Recently added CVEs: `44` +Recently added CVEs: `18` -- [CVE-2024-47659](CVE-2024/CVE-2024-476xx/CVE-2024-47659.json) (`2024-10-09T14:15:07.660`) -- [CVE-2024-47660](CVE-2024/CVE-2024-476xx/CVE-2024-47660.json) (`2024-10-09T14:15:07.730`) -- [CVE-2024-47661](CVE-2024/CVE-2024-476xx/CVE-2024-47661.json) (`2024-10-09T15:15:15.020`) -- [CVE-2024-47662](CVE-2024/CVE-2024-476xx/CVE-2024-47662.json) (`2024-10-09T15:15:15.080`) -- [CVE-2024-47663](CVE-2024/CVE-2024-476xx/CVE-2024-47663.json) (`2024-10-09T15:15:15.150`) -- [CVE-2024-47664](CVE-2024/CVE-2024-476xx/CVE-2024-47664.json) (`2024-10-09T15:15:15.223`) -- [CVE-2024-47665](CVE-2024/CVE-2024-476xx/CVE-2024-47665.json) (`2024-10-09T15:15:15.290`) -- [CVE-2024-47666](CVE-2024/CVE-2024-476xx/CVE-2024-47666.json) (`2024-10-09T15:15:15.353`) -- [CVE-2024-47667](CVE-2024/CVE-2024-476xx/CVE-2024-47667.json) (`2024-10-09T15:15:15.430`) -- [CVE-2024-47668](CVE-2024/CVE-2024-476xx/CVE-2024-47668.json) (`2024-10-09T15:15:15.513`) -- [CVE-2024-47669](CVE-2024/CVE-2024-476xx/CVE-2024-47669.json) (`2024-10-09T15:15:15.590`) -- [CVE-2024-47670](CVE-2024/CVE-2024-476xx/CVE-2024-47670.json) (`2024-10-09T15:15:15.673`) -- [CVE-2024-47671](CVE-2024/CVE-2024-476xx/CVE-2024-47671.json) (`2024-10-09T15:15:15.753`) -- [CVE-2024-47672](CVE-2024/CVE-2024-476xx/CVE-2024-47672.json) (`2024-10-09T15:15:15.827`) -- [CVE-2024-47673](CVE-2024/CVE-2024-476xx/CVE-2024-47673.json) (`2024-10-09T15:15:15.900`) -- [CVE-2024-7292](CVE-2024/CVE-2024-72xx/CVE-2024-7292.json) (`2024-10-09T15:15:15.970`) -- [CVE-2024-7293](CVE-2024/CVE-2024-72xx/CVE-2024-7293.json) (`2024-10-09T15:15:16.200`) -- [CVE-2024-7294](CVE-2024/CVE-2024-72xx/CVE-2024-7294.json) (`2024-10-09T15:15:16.463`) -- [CVE-2024-7840](CVE-2024/CVE-2024-78xx/CVE-2024-7840.json) (`2024-10-09T15:15:16.687`) -- [CVE-2024-8014](CVE-2024/CVE-2024-80xx/CVE-2024-8014.json) (`2024-10-09T15:15:16.883`) -- [CVE-2024-8015](CVE-2024/CVE-2024-80xx/CVE-2024-8015.json) (`2024-10-09T15:15:17.097`) -- [CVE-2024-8048](CVE-2024/CVE-2024-80xx/CVE-2024-8048.json) (`2024-10-09T15:15:17.317`) -- [CVE-2024-9286](CVE-2024/CVE-2024-92xx/CVE-2024-9286.json) (`2024-10-09T14:15:07.823`) -- [CVE-2024-9671](CVE-2024/CVE-2024-96xx/CVE-2024-9671.json) (`2024-10-09T15:15:17.513`) -- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-10-09T15:15:17.837`) +- [CVE-2024-25825](CVE-2024/CVE-2024-258xx/CVE-2024-25825.json) (`2024-10-09T16:15:04.277`) +- [CVE-2024-42988](CVE-2024/CVE-2024-429xx/CVE-2024-42988.json) (`2024-10-09T17:15:16.337`) +- [CVE-2024-43610](CVE-2024/CVE-2024-436xx/CVE-2024-43610.json) (`2024-10-09T17:15:19.397`) +- [CVE-2024-45746](CVE-2024/CVE-2024-457xx/CVE-2024-45746.json) (`2024-10-09T17:15:19.727`) +- [CVE-2024-46292](CVE-2024/CVE-2024-462xx/CVE-2024-46292.json) (`2024-10-09T16:15:04.373`) +- [CVE-2024-46304](CVE-2024/CVE-2024-463xx/CVE-2024-46304.json) (`2024-10-09T16:15:04.437`) +- [CVE-2024-46307](CVE-2024/CVE-2024-463xx/CVE-2024-46307.json) (`2024-10-09T17:15:19.813`) +- [CVE-2024-46316](CVE-2024/CVE-2024-463xx/CVE-2024-46316.json) (`2024-10-09T16:15:04.487`) +- [CVE-2024-9463](CVE-2024/CVE-2024-94xx/CVE-2024-9463.json) (`2024-10-09T17:15:19.973`) +- [CVE-2024-9464](CVE-2024/CVE-2024-94xx/CVE-2024-9464.json) (`2024-10-09T17:15:20.170`) +- [CVE-2024-9465](CVE-2024/CVE-2024-94xx/CVE-2024-9465.json) (`2024-10-09T17:15:20.287`) +- [CVE-2024-9466](CVE-2024/CVE-2024-94xx/CVE-2024-9466.json) (`2024-10-09T17:15:20.400`) +- [CVE-2024-9467](CVE-2024/CVE-2024-94xx/CVE-2024-9467.json) (`2024-10-09T17:15:20.517`) +- [CVE-2024-9468](CVE-2024/CVE-2024-94xx/CVE-2024-9468.json) (`2024-10-09T17:15:20.637`) +- [CVE-2024-9469](CVE-2024/CVE-2024-94xx/CVE-2024-9469.json) (`2024-10-09T17:15:20.770`) +- [CVE-2024-9470](CVE-2024/CVE-2024-94xx/CVE-2024-9470.json) (`2024-10-09T17:15:20.907`) +- [CVE-2024-9471](CVE-2024/CVE-2024-94xx/CVE-2024-9471.json) (`2024-10-09T17:15:21.090`) +- [CVE-2024-9473](CVE-2024/CVE-2024-94xx/CVE-2024-9473.json) (`2024-10-09T17:15:21.230`) ### CVEs modified in the last Commit -Recently modified CVEs: `70` +Recently modified CVEs: `29` -- [CVE-2024-30472](CVE-2024/CVE-2024-304xx/CVE-2024-30472.json) (`2024-10-09T14:12:54.947`) -- [CVE-2024-3504](CVE-2024/CVE-2024-35xx/CVE-2024-3504.json) (`2024-10-09T15:27:06.437`) -- [CVE-2024-37156](CVE-2024/CVE-2024-371xx/CVE-2024-37156.json) (`2024-10-09T15:08:29.647`) -- [CVE-2024-4194](CVE-2024/CVE-2024-41xx/CVE-2024-4194.json) (`2024-10-09T15:36:58.887`) -- [CVE-2024-42308](CVE-2024/CVE-2024-423xx/CVE-2024-42308.json) (`2024-10-09T14:15:05.227`) -- [CVE-2024-43047](CVE-2024/CVE-2024-430xx/CVE-2024-43047.json) (`2024-10-09T14:39:06.540`) -- [CVE-2024-44950](CVE-2024/CVE-2024-449xx/CVE-2024-44950.json) (`2024-10-09T14:21:16.773`) -- [CVE-2024-44951](CVE-2024/CVE-2024-449xx/CVE-2024-44951.json) (`2024-10-09T14:27:43.973`) -- [CVE-2024-44991](CVE-2024/CVE-2024-449xx/CVE-2024-44991.json) (`2024-10-09T14:36:15.790`) -- [CVE-2024-45001](CVE-2024/CVE-2024-450xx/CVE-2024-45001.json) (`2024-10-09T14:49:39.953`) -- [CVE-2024-45003](CVE-2024/CVE-2024-450xx/CVE-2024-45003.json) (`2024-10-09T15:07:31.027`) -- [CVE-2024-45004](CVE-2024/CVE-2024-450xx/CVE-2024-45004.json) (`2024-10-09T15:19:15.813`) -- [CVE-2024-45005](CVE-2024/CVE-2024-450xx/CVE-2024-45005.json) (`2024-10-09T15:30:03.767`) -- [CVE-2024-45179](CVE-2024/CVE-2024-451xx/CVE-2024-45179.json) (`2024-10-09T14:35:11.783`) -- [CVE-2024-45394](CVE-2024/CVE-2024-453xx/CVE-2024-45394.json) (`2024-10-09T15:15:13.600`) -- [CVE-2024-46410](CVE-2024/CVE-2024-464xx/CVE-2024-46410.json) (`2024-10-09T15:35:16.780`) -- [CVE-2024-46832](CVE-2024/CVE-2024-468xx/CVE-2024-46832.json) (`2024-10-09T15:51:20.700`) -- [CVE-2024-46833](CVE-2024/CVE-2024-468xx/CVE-2024-46833.json) (`2024-10-09T15:54:38.123`) -- [CVE-2024-46834](CVE-2024/CVE-2024-468xx/CVE-2024-46834.json) (`2024-10-09T15:57:03.037`) -- [CVE-2024-46836](CVE-2024/CVE-2024-468xx/CVE-2024-46836.json) (`2024-10-09T15:47:55.187`) -- [CVE-2024-46837](CVE-2024/CVE-2024-468xx/CVE-2024-46837.json) (`2024-10-09T15:37:51.653`) -- [CVE-2024-46838](CVE-2024/CVE-2024-468xx/CVE-2024-46838.json) (`2024-10-09T15:35:40.827`) -- [CVE-2024-5277](CVE-2024/CVE-2024-52xx/CVE-2024-5277.json) (`2024-10-09T14:49:25.753`) -- [CVE-2024-5452](CVE-2024/CVE-2024-54xx/CVE-2024-5452.json) (`2024-10-09T14:57:27.450`) -- [CVE-2024-9575](CVE-2024/CVE-2024-95xx/CVE-2024-9575.json) (`2024-10-09T14:35:13.220`) +- [CVE-2023-21272](CVE-2023/CVE-2023-212xx/CVE-2023-21272.json) (`2024-10-09T16:35:02.920`) +- [CVE-2023-23639](CVE-2023/CVE-2023-236xx/CVE-2023-23639.json) (`2024-10-09T17:05:48.593`) +- [CVE-2023-48206](CVE-2023/CVE-2023-482xx/CVE-2023-48206.json) (`2024-10-09T16:35:04.887`) +- [CVE-2023-48831](CVE-2023/CVE-2023-488xx/CVE-2023-48831.json) (`2024-10-09T16:35:06.783`) +- [CVE-2023-6501](CVE-2023/CVE-2023-65xx/CVE-2023-6501.json) (`2024-10-09T16:35:04.897`) +- [CVE-2024-20470](CVE-2024/CVE-2024-204xx/CVE-2024-20470.json) (`2024-10-09T16:55:23.887`) +- [CVE-2024-24881](CVE-2024/CVE-2024-248xx/CVE-2024-24881.json) (`2024-10-09T16:28:32.153`) +- [CVE-2024-25285](CVE-2024/CVE-2024-252xx/CVE-2024-25285.json) (`2024-10-09T16:35:07.700`) +- [CVE-2024-2762](CVE-2024/CVE-2024-27xx/CVE-2024-2762.json) (`2024-10-09T17:12:42.747`) +- [CVE-2024-28020](CVE-2024/CVE-2024-280xx/CVE-2024-28020.json) (`2024-10-09T17:08:57.697`) +- [CVE-2024-31098](CVE-2024/CVE-2024-310xx/CVE-2024-31098.json) (`2024-10-09T17:02:55.033`) +- [CVE-2024-35649](CVE-2024/CVE-2024-356xx/CVE-2024-35649.json) (`2024-10-09T16:48:22.853`) +- [CVE-2024-36474](CVE-2024/CVE-2024-364xx/CVE-2024-36474.json) (`2024-10-09T16:37:55.997`) +- [CVE-2024-42415](CVE-2024/CVE-2024-424xx/CVE-2024-42415.json) (`2024-10-09T16:44:20.360`) +- [CVE-2024-4325](CVE-2024/CVE-2024-43xx/CVE-2024-4325.json) (`2024-10-09T16:04:49.597`) +- [CVE-2024-43572](CVE-2024/CVE-2024-435xx/CVE-2024-43572.json) (`2024-10-09T16:16:45.687`) +- [CVE-2024-43573](CVE-2024/CVE-2024-435xx/CVE-2024-43573.json) (`2024-10-09T16:16:42.877`) +- [CVE-2024-4941](CVE-2024/CVE-2024-49xx/CVE-2024-4941.json) (`2024-10-09T16:24:24.433`) +- [CVE-2024-5179](CVE-2024/CVE-2024-51xx/CVE-2024-5179.json) (`2024-10-09T16:57:08.317`) +- [CVE-2024-5482](CVE-2024/CVE-2024-54xx/CVE-2024-5482.json) (`2024-10-09T16:12:24.527`) +- [CVE-2024-8983](CVE-2024/CVE-2024-89xx/CVE-2024-8983.json) (`2024-10-09T16:35:09.290`) +- [CVE-2024-9021](CVE-2024/CVE-2024-90xx/CVE-2024-9021.json) (`2024-10-09T16:35:09.457`) +- [CVE-2024-9602](CVE-2024/CVE-2024-96xx/CVE-2024-9602.json) (`2024-10-09T17:35:16.980`) +- [CVE-2024-9603](CVE-2024/CVE-2024-96xx/CVE-2024-9603.json) (`2024-10-09T16:35:09.623`) +- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-10-09T16:35:10.390`) ## Download and Usage diff --git a/_state.csv b/_state.csv index fc3c647df2b..4e013b4ea35 100644 --- a/_state.csv +++ b/_state.csv @@ -86706,7 +86706,7 @@ CVE-2016-3423,0,0,f488c6c7a9631fd699fa9b57b56b86988d635c1dd450226500d2cde596b29c CVE-2016-3424,0,0,12a2452cd8236b7b003af717b552b17c568dc6ad2276770c6c815ab727a09268,2017-09-01T01:29:08.757000 CVE-2016-3425,0,0,3980fcdd6b582f77d8738e3fb3c3014b69a3c5f69786134c7feef1ed5c568ff2,2022-05-13T14:57:21.280000 CVE-2016-3426,0,0,22a611d74ba5653e7d51a013d889a6174c468db31a3d4254b64f3e36ce9fb63f,2022-05-13T14:57:21.287000 -CVE-2016-3427,0,1,d52166f154769a8f9d846b6ceeb19ac47f6770393eac9702fa6ba4e5eee816ba,2024-10-09T14:41:20.383000 +CVE-2016-3427,0,0,d52166f154769a8f9d846b6ceeb19ac47f6770393eac9702fa6ba4e5eee816ba,2024-10-09T14:41:20.383000 CVE-2016-3428,0,0,821ab93ab9f9b7c000b0a0e3558ee4082ee77c196fd17fb39cef9ad80c3ee75d,2017-09-03T01:29:06.407000 CVE-2016-3429,0,0,298e0976d614f443bc0690c14bd472e228c05ff2e8969750c9f5d2b91da29469,2016-12-03T03:26:54.870000 CVE-2016-3431,0,0,e79081d1162d89c9389fa396cfaa769607de656a51ddc125cd694172e6d287ff,2017-09-03T01:29:06.453000 @@ -137043,7 +137043,7 @@ CVE-2019-20098,0,0,1baa075245ac96509410c45be622a002efae5040643e74fa3a3cff043de9c CVE-2019-20099,0,0,c6e17a059fd29c8d2cab689a1b5671e54b6e1ce15b643fe4d6a76cc706275f6b,2022-03-30T13:21:18.863000 CVE-2019-2010,0,0,f4b2fc50fe27e81451fc158765dd8bfa4913d3367ce8eb34c7ee696bb7bb50e8,2019-06-20T20:09:47.923000 CVE-2019-20100,0,0,9b68539919983ac4e36fec6ce83015e3e7164ca3abf27a574b159e63df0b7b86,2022-03-30T13:21:18.907000 -CVE-2019-20101,0,0,b8f14a0553fd0609c82c7c8949ec755f9f79521e57672fe5bdaa890955ded5b4,2021-10-18T12:13:56.640000 +CVE-2019-20101,0,1,5e55f96763ff9906f55cda7af47cd4124b088bd11662153b59a154f9a464e8af,2024-10-09T17:35:02.077000 CVE-2019-20102,0,0,2087af8ba5627977c66d3346f0722863aa719f6d047a8e35b1d1aa0aab18d93f,2021-12-13T16:05:55.117000 CVE-2019-20104,0,0,fd18018e1f7463f2342ed671563af28fcdaa5c17b8a6e5ba754023bff6860b81,2022-01-01T19:56:39.010000 CVE-2019-20105,0,0,7d9484aaddc231f41438c4903305cba028482b08846b444ec292e5f27979a3a1,2020-08-24T17:37:01.140000 @@ -166000,7 +166000,7 @@ CVE-2021-1643,0,0,40e52edd9699ed1b1bc34f3578aed96912d9fef909ddc638e3616dd14e05fa CVE-2021-1644,0,0,4df713b7b865647dda610d38409c95e80ba054b13ee4692ba8cf1cd86fadad09,2024-10-08T17:15:15.383000 CVE-2021-1645,0,0,052d41b0a55462e238427c4cc6609dfdd31b56a67f68c19ad832cf44355615f9,2024-10-08T17:15:15.513000 CVE-2021-1646,0,0,3cf7b5d6b8826a49ee2202aa1402a417596d7b7ceaa6279f8fc11764b1d947d8,2024-10-08T17:15:15.690000 -CVE-2021-1647,0,1,ec3307a8d06054defa6c4098f5faf0b7919c2e2541487a57ed209ac7b46f45fe,2024-10-09T14:40:17.447000 +CVE-2021-1647,0,0,ec3307a8d06054defa6c4098f5faf0b7919c2e2541487a57ed209ac7b46f45fe,2024-10-09T14:40:17.447000 CVE-2021-1648,0,0,4f914affbfaddedc009d1a5b4d229067ce6ec7de32b93b763376232ef4d25858,2024-10-08T17:15:15.963000 CVE-2021-1649,0,0,ce45606f9392f96387c34171fb5696eb425a1d0ee35dfba22c1942ae11f24618,2024-10-08T17:15:16.143000 CVE-2021-1650,0,0,f3869adae3143cfdb0dbe78c146cab615a03333fc67344f39c5fd486d0a50d8a,2024-10-08T17:15:16.370000 @@ -181133,7 +181133,7 @@ CVE-2021-39121,0,0,633d5656fffda0e45c49d4bc8d151e90cce078ce60d3d369ea3f30579930e CVE-2021-39122,0,0,c9981cfb918b68d6a12602ba73c7b1acc25021219d3d022a55745d72255b54c2,2022-03-30T13:29:19.573000 CVE-2021-39123,0,0,d0e4c2c03b72a02ecdb7525c0e326d6b0d96a344de7caa87bc9349453372cd09,2022-07-12T17:42:04.277000 CVE-2021-39124,0,0,2b58fd447d3cafa91334dabd9357b993b27ae7c16f1985b8ba8afc2558c4088b,2022-02-24T20:18:49.327000 -CVE-2021-39125,0,0,de67947b82a219e32fc0e9a4bc48819b100de500849c0a700f6dfcd3593bb651,2022-06-28T14:11:45.273000 +CVE-2021-39125,0,1,4c8f1895e82d1bcd913a7b42e9a1b5d82429da426af796f023bfb884e96ba7ec,2024-10-09T17:35:02.380000 CVE-2021-39126,0,0,c5fcfc69aba84d73b9f8c74c936a36d81151cadeddc7fa2ff49085a699b83f32,2022-04-15T15:29:12.737000 CVE-2021-39127,0,0,3633d3c73b39c6ff31d41b803d67091de27a5d10e7274dd536bd56bf63949af3,2022-07-12T17:42:04.277000 CVE-2021-39128,0,0,3afe35281fb278b542f828cba3a2f1783f1fe9e90ef4145351a04c21b5a2970f,2022-08-01T16:13:08.583000 @@ -182955,7 +182955,7 @@ CVE-2021-41301,0,0,9287908c6aacc812286a07fcc4b008517b60fe1be1c8efdfada7427002ede CVE-2021-41302,0,0,4bbf71887a89c51cfdfdc61498d8d9d3b9eaa00cbcb5b31b55fe40181e7ec116,2022-08-12T17:48:44.553000 CVE-2021-41303,0,0,ef209cfd45b26db1a9f424bac02e1445dfaf162473bb92b15f7648b734e78b57,2023-11-07T03:38:55.270000 CVE-2021-41304,0,0,965a4f99f96e402b015191fc9983517ec77b04fbaa10bff922660aff560ce4d7,2022-03-30T13:29:49.623000 -CVE-2021-41305,0,0,693cf4136ae2f7fe9dbd5f00f969dde6c2833f496ade4626fd4420a20de0b8bb,2022-05-03T16:04:40.443000 +CVE-2021-41305,0,1,c1ebdde2379fe23f7c43787afa73694bb283be765dba75893d579667592b2830,2024-10-09T17:35:02.607000 CVE-2021-41306,0,0,c423eae28238b4fc99dc3829df970e39b9d4c981fd835a682e3541aaef8bb431,2022-05-03T16:04:40.443000 CVE-2021-41307,0,0,dffddb5c65dd162d1bb8cfb7ef953cbf8a2e6738f267dfa26555f16e38cafdc6,2022-03-25T18:14:24.650000 CVE-2021-41308,0,0,cfb1dc84f95dca98ea9db01ce0a047c8488867d52c4b6bc7f5724969a80a8bbf,2022-08-09T13:41:02.947000 @@ -199531,7 +199531,7 @@ CVE-2022-31691,0,0,3147c1465e31f8d8d2d6d27897f16a7a674d04d4cb3d1fde70b641f49ea0b CVE-2022-31692,0,0,f1c34c6caf6e386cfd7813af22e5f54dd63cc1c8ba6464aa9c28e562f2c19446,2023-08-08T14:22:24.967000 CVE-2022-31693,0,0,1f016da5cedd970d018d8be64178481b37f84136f0deb879c6ec274f163a1638,2023-08-24T19:15:10.177000 CVE-2022-31694,0,0,2329c118b6bb9e51b8206c0569ca413eba1a0b3d06ff7ddce7c0ce8e91bb6439,2022-11-22T20:31:54.550000 -CVE-2022-31696,0,1,31c4b773340ee63d2e253e8d010216ced65ef60fabea71f8def99921e3d48036,2024-10-09T14:05:54.210000 +CVE-2022-31696,0,0,31c4b773340ee63d2e253e8d010216ced65ef60fabea71f8def99921e3d48036,2024-10-09T14:05:54.210000 CVE-2022-31697,0,0,39f68de85b68c59e475d8af7afdd73f797e9f9fe8b170490a8ae314b505e2bf3,2022-12-15T17:45:12.637000 CVE-2022-31698,0,0,b367426e9e009401c8445b4c1c92f4c25e210c44defdda2610c4c4f5a75ab9fc,2023-11-07T03:47:40.757000 CVE-2022-31699,0,0,d7238901e236428b21197def37fa206c5dce7bb9921abb1f2bc015779728b382,2022-12-15T17:46:07.693000 @@ -208178,7 +208178,7 @@ CVE-2022-42822,0,0,67bbc2542a632a1720052dfa2dcc2ec8cda2381ddc4abbf51e0a406addb8a CVE-2022-42823,0,0,e527007e56fd9ca0a023505639059f03d1a93bc32c9f91f64b28934c1e13112e,2023-11-07T03:53:36.660000 CVE-2022-42824,0,0,3decdbf4675ae514469ae19794aef66a9db0dcf4b7eeb493ca5f15806b7af04e,2023-11-07T03:53:36.900000 CVE-2022-42825,0,0,592c5899b832cd8a364c486be9eb0cc8d21effaa6cc1985df42e5ba9060dda79,2022-11-03T13:43:34.207000 -CVE-2022-42826,0,1,bfc80331bb0c7d2c7842228191ffb7fa36709b1362a1d0f76d5b33ff18296048,2024-10-09T14:11:51.867000 +CVE-2022-42826,0,0,bfc80331bb0c7d2c7842228191ffb7fa36709b1362a1d0f76d5b33ff18296048,2024-10-09T14:11:51.867000 CVE-2022-42827,0,0,4f2ce1e3c23d1f9640ca94007dde7437af93b5d1446a9a23b6cc4498023ab528,2022-11-03T13:33:54.017000 CVE-2022-42828,0,0,108c4161a0a14b937b4fc9f9070fb385b1c6333b73b11e370306801630eb8e97,2023-08-22T01:46:32.393000 CVE-2022-42829,0,0,461c801043806b686ec28a62301dbdb9056043c0dc1f5fa62045af8a99f02dfd,2023-01-09T16:41:59.350000 @@ -211259,7 +211259,7 @@ CVE-2022-4718,0,0,952c1d8bf17992dada8741f396c042935df19f04903c8a0d911590c9ca838a CVE-2022-47180,0,0,feeb910e30fc590f014c687ac3b445ad520d89e7bd146542881614c509fcaa7e,2023-05-31T00:59:02.133000 CVE-2022-47181,0,0,51afd3bad1538ba6200abd9f8ed00bcacb9c749ddf0f1b3acf678c6446ded1f8,2023-11-15T15:52:09.650000 CVE-2022-47183,0,0,cce3276c953e1ad26b3593918630191fbed32dda25f1ab16491186a3efe94af4,2023-05-26T13:56:53.707000 -CVE-2022-47184,0,1,3417696e0dc39b0f4bfb22335e0ba677edb626fc0c45d3ca44d173feb8c946ac,2024-10-09T14:35:01.527000 +CVE-2022-47184,0,0,3417696e0dc39b0f4bfb22335e0ba677edb626fc0c45d3ca44d173feb8c946ac,2024-10-09T14:35:01.527000 CVE-2022-47185,0,0,065bfecabb9c0fe335359d3df24bea57ca36ad2123e34b49d507b12c5e7642ba,2024-10-01T19:35:00.857000 CVE-2022-47186,0,0,fc4b0558bef7a018ed1447c73a878492478d31f80573d5d43c4df02b4bacefa7,2023-10-03T00:45:03.710000 CVE-2022-47187,0,0,f70f9487045a773b790514c9aaca409db00d19ea5383fd18c1f5d735a7719558,2023-10-02T20:45:38.697000 @@ -215550,9 +215550,9 @@ CVE-2023-21265,0,0,57fa4d038fe76148eed4f6ab25a81c66ddd97185afa0ead53d79d35a85810 CVE-2023-21266,0,0,18d7bcc4c1fdfc1af03411d2e140522d50eb303306a9a01cd215164baa58cd61,2024-07-09T21:15:10.863000 CVE-2023-21267,0,0,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000 CVE-2023-21268,0,0,7502585c73530dd6ce3c3ff0a870c3ee2c56fd847c4fb3355c51e0a7f0ac2071,2023-11-15T02:55:56.537000 -CVE-2023-21269,0,0,8bb2c577b971486738820d63c346e0c4616a5fd8582a07b1331d268f04c612fa,2023-08-24T15:07:31.833000 +CVE-2023-21269,0,1,fece9dff3711fe2af86d775cc74a99bad4829a0075d5a2a32efc6af138cb5008,2024-10-09T16:35:01.057000 CVE-2023-21271,0,0,3086339ffce7fa60dbd215e725bc9394127b3bd1eb1d62f2277d721d350ea6f3,2023-08-18T19:54:05.827000 -CVE-2023-21272,0,0,8055c1d265bf0348d9a11b1d91bf1d5ccc1531a7bed126f524a27cdb2c6fa2c2,2023-08-18T19:56:45.393000 +CVE-2023-21272,0,1,8929585c315334a5cf678abc944b74ca2a510b1cfc115c2eab8b9f06cedbaa56,2024-10-09T16:35:02.920000 CVE-2023-21273,0,0,1299d8533bbcaea325dcedcf17bc021b0703fb6c70d4dac65290a62467f88245,2023-08-18T19:44:13.167000 CVE-2023-21274,0,0,b1f56c9244e340c531ca13d6a5e8398c8c82825edc0b43d42ed9d4845eec3b84,2023-08-21T16:42:55.323000 CVE-2023-21275,0,0,3565455bdfec549a9e9a6a640c9fecb2b17e5053d50868c2b980408e15965175,2023-08-21T16:42:30.400000 @@ -217552,7 +217552,7 @@ CVE-2023-23635,0,0,235e2f9aaa4d81653a473f7bee2f02441220d52847a6b1d7757be3aabdf4b CVE-2023-23636,0,0,410bb48460364d685aab91b77723cbce62a06bf15d69ddb482938ccb37001a9c,2023-02-09T18:17:10.097000 CVE-2023-23637,0,0,8303c2e888f4a7f7be3861e3dd96442a11d683fc03173c478fa0af6f4291768d,2023-01-25T02:29:20.367000 CVE-2023-23638,0,0,c798c27985bf183b36d281532d811c42a95db85432ae20ee49e04ec4e03cbf8b,2023-11-07T04:07:50.990000 -CVE-2023-23639,0,0,609b39ace6a6dec0659c782fcf6da5dd20dad42cd06a4def317a7a1aa722e692,2024-10-05T01:37:41.107000 +CVE-2023-23639,0,1,ad5a7a045e136abbb1de43eaead0c56d11ebf3b2f981de0d08e9c03525821478,2024-10-09T17:05:48.593000 CVE-2023-2364,0,0,ef2fa89d6009c2c0b9501247c770157813a8ca3461f78ce280790e9fc931b9dc,2024-05-17T02:22:53.063000 CVE-2023-23640,0,0,3cbb88c0f5af99ec512e3dba8b675700fb698479049cd57ca836ed757a4e1fd6,2024-10-05T02:04:13.263000 CVE-2023-23641,0,0,9e0bf1ea6e96cfa227eb36bfb2991b91b3191e168b28cc245f74934ce61a383b,2023-05-22T20:02:44.160000 @@ -220957,7 +220957,7 @@ CVE-2023-27929,0,0,371d487f07a836d0bc5f1398593c9fdd65114a671ed8f3e79240b0b7122d2 CVE-2023-2793,0,0,a17c4315e929bbb6bf306f55af872539fd9734199e49f1f538c311ddfba71e09,2023-06-26T17:45:53.867000 CVE-2023-27930,0,0,cad4042e604bb91193b53349df2ed4e5af9a8e270c71e080be594a4fa23631b2,2023-07-27T04:15:17.167000 CVE-2023-27931,0,0,3c45b73aee43a1faf6a8376de6b33615b425b2f9792e858175802ec1a9598597,2023-07-27T04:15:17.277000 -CVE-2023-27932,0,1,44a5bb22310e844c1ea87e7c05ea84d2a0191cfca5dccd39d1c3337b8c9e7075,2024-10-09T14:25:54.770000 +CVE-2023-27932,0,0,44a5bb22310e844c1ea87e7c05ea84d2a0191cfca5dccd39d1c3337b8c9e7075,2024-10-09T14:25:54.770000 CVE-2023-27933,0,0,c1b5e61d28f48579736c8e197c98968fc3b33f42e831e62f916e23f11448f4fc,2023-07-27T04:15:17.520000 CVE-2023-27934,0,0,23c6684a3ce86ecadf4464d61af5f5437a0ed96268d21678300601aa5d59bfb6,2023-07-27T04:15:17.627000 CVE-2023-27935,0,0,2f283dbbd9003b866187998c741d90f69a90cf43b8df15b5b763be4a89815d4e,2023-07-27T04:15:17.777000 @@ -223462,7 +223462,7 @@ CVE-2023-31043,0,0,7966c380c4ff52ef4c652dd5937ce2c7a47f54de433713bc1d8968bd78e2e CVE-2023-31045,0,0,ac484a29c897cd74a42d29855eaafabd3dc11da65f8745511b99a7d075023e29,2024-08-02T15:15:59.847000 CVE-2023-31046,0,0,896ed8272cae6e4a49b645831705effa351f1140f72a933ffff1f7a3ea535912,2023-10-26T17:14:53.670000 CVE-2023-31047,0,0,799c27446196896a2155b4ff736d0e4c98fa4d3a17dd14303b0af7537b3e601f,2023-11-07T04:14:10.440000 -CVE-2023-31048,0,1,085198888c668c9620ecdd2cd8b8ba13b5e86067bb31f7fd09ae2d0369478942,2024-10-09T14:35:02.490000 +CVE-2023-31048,0,0,085198888c668c9620ecdd2cd8b8ba13b5e86067bb31f7fd09ae2d0369478942,2024-10-09T14:35:02.490000 CVE-2023-3105,0,0,be99bcf9045a615beffe2a865c2ddddc0783f9f4b672f8174022afca2422f44d,2023-11-07T04:17:55.157000 CVE-2023-31056,0,0,4f2fef484ed386abb0f005ab89606a773da4d5a08e2c27112d7f1b7e48a4a1e7,2023-04-29T03:06:14.197000 CVE-2023-31058,0,0,ca7da33276284c78442c38f8f57df235ece18c6aca5dbfb6dd049ebe8205ac85,2023-05-27T00:48:58.773000 @@ -223770,7 +223770,7 @@ CVE-2023-31462,0,0,6b4469307d2bc501de0f0f5abefd794c9c39b16ff7779b291bf1d216d1371 CVE-2023-31465,0,0,e53d08adda22ed06d87d62bcfcf54d3acc0004666559aa545a1fa265aee14434,2023-08-03T15:21:16.817000 CVE-2023-31466,0,0,da6fc0cb905974fb3c8b32c31c02b9d620fd8ce33bae2a4bf3e707b5b6e59882,2023-08-03T15:12:02.457000 CVE-2023-31468,0,0,700b7fa2bea955781239281828aaef27f7b2f5a35cd66b385a227cf102cd6add,2024-07-12T16:11:12.297000 -CVE-2023-31469,0,1,d1a426fdd2be7cfe8917a6c2b910aa85ef44c0b7ccdf9ed875c360822d8667f3,2024-10-09T15:35:05.020000 +CVE-2023-31469,0,0,d1a426fdd2be7cfe8917a6c2b910aa85ef44c0b7ccdf9ed875c360822d8667f3,2024-10-09T15:35:05.020000 CVE-2023-3147,0,0,7e0901b2973cac3f4166291463e7b1601c821bee68bbc4d95420a8d53da593dc,2024-05-17T02:27:18.420000 CVE-2023-31470,0,0,57cd640d05d88f75d36fad878af29c64c3bc6bba569ea939afa2413e06abaa9d,2023-05-08T17:42:00.757000 CVE-2023-31471,0,0,c07d8b85821561986a7f8c0f5881926eb1a8ba6584c0f50aedb68800f2ce7361,2023-05-18T21:24:07.747000 @@ -224471,7 +224471,7 @@ CVE-2023-3242,0,0,d7affedfb69954780396c3429a656a47fdced696ab2dd3f46b339a768bebd0 CVE-2023-32420,0,0,d567dafb9d7301282afcbb0069471d86449f9b82e4e4758e9161816afa0a4d04,2023-07-27T04:15:37.297000 CVE-2023-32421,0,0,737f9753f6aade17a3da197a9918c2f454c274891900e7d452b1eb3e5c31d5e8,2023-10-05T14:38:05.767000 CVE-2023-32422,0,0,d63ff0b0e1c05222523ec560588d075348a1484eaebdb2d99ac0418f830211da,2023-09-09T22:15:08.817000 -CVE-2023-32423,0,1,5a916cee9ad8d72fb06e04d52577149720ff25b2dcbd4ad0a1aeb8b5b857d508,2024-10-09T14:26:48.320000 +CVE-2023-32423,0,0,5a916cee9ad8d72fb06e04d52577149720ff25b2dcbd4ad0a1aeb8b5b857d508,2024-10-09T14:26:48.320000 CVE-2023-32424,0,0,9c1cb2d8efd6fbec181e8e282a17b4427f43ff976e257813956cb53365206c83,2024-01-18T14:44:50.053000 CVE-2023-32425,0,0,17e7380f18af3fc614f9f6f59adf7b5dbc5a3d584bde76eb994db7292e489a26,2023-09-09T03:44:20.687000 CVE-2023-32426,0,0,970fbf78a125d0b52b92255db034458315b464faf2ef337e12c3d317c142099e,2024-09-26T21:35:16.690000 @@ -225683,7 +225683,7 @@ CVE-2023-33929,0,0,acdd709cc9c133bfbf4ed7106ac42a92f14158efc429a0fbee3a9849c15ef CVE-2023-3393,0,0,ed9a0ba91ad4a8f09fbdeaeefe5d6742b533c27532218bce46a9c7781a555215,2023-06-30T07:33:35.807000 CVE-2023-33930,0,0,5e1b4b2e39ebc0810edaed24fa749cb5ff1094a76d90351b848320fd4a16f9c5,2024-06-04T16:57:41.053000 CVE-2023-33931,0,0,9106168532ab2addb5e7b5a3eb8d9190aa2bca4cfda158157202afa7a07cd3a7,2023-06-02T01:31:13.207000 -CVE-2023-33933,0,1,40183aa46ee07322f2b82a6fcb628c240c9277d47b76ad8fe7b353eeaa95520e,2024-10-09T14:35:03.540000 +CVE-2023-33933,0,0,40183aa46ee07322f2b82a6fcb628c240c9277d47b76ad8fe7b353eeaa95520e,2024-10-09T14:35:03.540000 CVE-2023-33934,0,0,de334d9acd68662471dedff6521ef25ea4f9b72b7a3f6f1790e5d33c45ca327d,2024-10-01T19:35:03.657000 CVE-2023-33937,0,0,bc1be9e31f7865fa56bee64c9cedb1f9708b14232973e80728efd59ee3961971,2023-05-30T17:03:17.217000 CVE-2023-33938,0,0,ac6ff70b73875be47e3d0537893ed9a023897167f8897f10814a360e575b89e1,2023-05-31T19:32:37.323000 @@ -226083,7 +226083,7 @@ CVE-2023-34337,0,0,59bba41fdd1ff09f8f3ddfe9180a561f3666a6a64a007afc97194016f1e98 CVE-2023-34338,0,0,55d9cf388095c1ab474be3e2a85a6a6e366eba55e27fbf04f41248bbbc9da6e0,2023-07-12T17:40:56.377000 CVE-2023-34339,0,0,145c8c839bd365926b75eee0f4f9e9f8b079f8c1087bba1b3422860b4ac6d20f,2023-06-08T19:15:46.400000 CVE-2023-3434,0,0,a257259e7d4b6e51cacbd2e740ee3141336dcb5e64d34e144369f6cdd052314c,2023-07-26T14:05:19.787000 -CVE-2023-34340,0,1,bbce76e520c02e1224223c1005cb41f58dd42114f0789942593f2cd026d656a8,2024-10-09T15:35:05.370000 +CVE-2023-34340,0,0,bbce76e520c02e1224223c1005cb41f58dd42114f0789942593f2cd026d656a8,2024-10-09T15:35:05.370000 CVE-2023-34341,0,0,695d65290eb84b3106f47e09955ded074f840c3e309b2cff29dbee0675aa3482,2023-06-20T15:32:56.323000 CVE-2023-34342,0,0,89ae8c5d9c27ab12a5f64a8d1f5757f45b7c057fef61a3084adffa6be42c0444,2023-06-20T16:35:30.250000 CVE-2023-34343,0,0,238c79cc4c4d8c2a82ead4acc1bbe22664877a59370e2b08baf01e22c16457c3,2023-06-20T13:46:15.263000 @@ -226421,7 +226421,7 @@ CVE-2023-34976,0,0,0b3b94df7723f0287929ab195b214722cecf51cbb481f91e6d3fef26aa3d4 CVE-2023-34977,0,0,1703b848a5df1bb3394008c0819906a5fa78d63da44b9476eede69386548ece9,2023-10-14T01:49:11.190000 CVE-2023-34979,0,0,e633852ec5c5cdbd8daa52e407fd8518b14c0a8225c22834c0bee36f7e5f784e,2024-09-17T16:54:20.340000 CVE-2023-34980,0,0,7421b70c66abd07a5d88b0843ee0000c9380414adbb83621b8449b4538a68f8d,2024-03-08T21:19:43.127000 -CVE-2023-34981,0,1,9cb446cb67a297b7875e90260c6189a612aef964e8f554929592973a9722c1f1,2024-10-09T15:35:05.653000 +CVE-2023-34981,0,0,9cb446cb67a297b7875e90260c6189a612aef964e8f554929592973a9722c1f1,2024-10-09T15:35:05.653000 CVE-2023-34982,0,0,69ddd85a34f25c63fa63f83f2232e3dfa5c88ebfb8548a87e8b550ae4963b78c,2023-12-08T18:53:18.187000 CVE-2023-34983,0,0,bedefe397037b06016555351f71393eb7a255baa4b17a634efcd3d89fea4f603,2024-02-14T15:01:51.137000 CVE-2023-34984,0,0,570a947501d26249f350f1523e7ac826fb9b3f47429ec107901e1cec07cf2408,2023-11-07T04:15:51.207000 @@ -230478,7 +230478,7 @@ CVE-2023-40296,0,0,7bf08006e2ca869c99b2b7c0f53edb66ab06e149bcf27f3121bc4ee797ca4 CVE-2023-40297,0,0,ddc0a127a362ed2874074b3bb08e044e355a773cf6e266ecae71001a19880a0c,2024-07-03T01:41:05.987000 CVE-2023-40299,0,0,3c380b230ceaec869a7591f9f88aac84273793baacb11f14339ca6c6955b1668,2024-09-20T14:35:06.783000 CVE-2023-4030,0,0,a89f80411defde8eab177d11716159e441ab8c198ce0cd852b16280625d77cc0,2023-08-24T20:29:39.293000 -CVE-2023-40300,0,1,43d2d398b72e7a1502c0ad009750b0f283f94480219cf712831665ac23d1588c,2024-10-09T14:35:05.110000 +CVE-2023-40300,0,0,43d2d398b72e7a1502c0ad009750b0f283f94480219cf712831665ac23d1588c,2024-10-09T14:35:05.110000 CVE-2023-40301,0,0,3946cf13a88bdf5b9c27199d556c15ea3e1d32b960481c4109169c3fce99f48c,2023-12-12T19:14:27.427000 CVE-2023-40302,0,0,a30efaa6cff85b7728e14979b7c1eb21998ec29072dcc4a727ff2e210a12243b,2023-12-12T19:12:44.113000 CVE-2023-40303,0,0,d6cb6b035abc631ae0d94147f6eb702a3f7a7be8da5779ad50afa1a80f592a65,2024-01-02T01:15:07.857000 @@ -230608,7 +230608,7 @@ CVE-2023-40442,0,0,371a54a2886702bdd120ac95d0338c00531e4b44258cb23feb2e8e3ccda1d CVE-2023-40443,0,0,25106f1ecece68470f850e40dcdcdfd5c13d2f600fb063357bf942477cf7374f,2023-12-22T22:15:07.633000 CVE-2023-40444,0,0,8e1b6c91b99a933120e4c3483795c6b1c6d4fbc387d0988b41cf352dce93a0bf,2023-11-02T14:10:10.940000 CVE-2023-40445,0,0,87e2fbf117e7e6e952d3883540d047476f87cee681b2fafd74b5f42c414ccb7b,2024-09-10T21:35:04.170000 -CVE-2023-40446,0,1,8b9a0fd6e5e167cdc12afda812614c846650c66be74645c257321ba890664f8f,2024-10-09T14:35:05.897000 +CVE-2023-40446,0,0,8b9a0fd6e5e167cdc12afda812614c846650c66be74645c257321ba890664f8f,2024-10-09T14:35:05.897000 CVE-2023-40447,0,0,ba8a4588c5be24be94940418440cd7e1a7f9ce1a9cf1573462fff78623750e4f,2023-12-07T20:15:37.680000 CVE-2023-40448,0,0,23da6ec20146bd3914f77a7eb5aeffa03207be4a0f4c6afd09f5029201d17dd3,2023-11-07T04:20:14.757000 CVE-2023-40449,0,0,3c0e9b8344d0d7cb0a51347962d0f9d1ade8c23957cccada2d3c6b2f24752671,2023-11-02T14:58:19.950000 @@ -230616,7 +230616,7 @@ CVE-2023-4045,0,0,d02309562557e4c141af062d9503ad6a93e5545c33ef4fdd400d281286d516 CVE-2023-40450,0,0,d0d2fe2c6b77e1b2d928d2f49e58cbf3458bbc4f130f706689cabf8b5c61637d,2023-10-12T02:28:48.060000 CVE-2023-40451,0,0,53d52bb36c7903dce04fb0f4b9d72e63a58a839302277d2ef2af4250f9c72b5b,2024-01-31T15:15:09.977000 CVE-2023-40452,0,0,abfd30a5fdb80950f171cfbe800d51816fc83d170b610aa52771f6852a1f724d,2023-11-07T04:20:14.897000 -CVE-2023-40453,0,1,130c1ba245794699f114636eda3c5cf90574ba5b46bd6a704fe406b89dec0e3d,2024-10-09T15:35:08.173000 +CVE-2023-40453,0,0,130c1ba245794699f114636eda3c5cf90574ba5b46bd6a704fe406b89dec0e3d,2024-10-09T15:35:08.173000 CVE-2023-40454,0,0,c10b12346537ef1e5c8787b1e2fe9d4cb45cf0b585647c357d5bb525587ce317,2023-11-07T04:20:15.070000 CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de75b,2023-10-12T02:29:35.947000 CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000 @@ -231993,7 +231993,7 @@ CVE-2023-42278,0,0,83b72137122d88e009fdc96de3ee875aba5a7eaf46f62954f527aa5f7e9c0 CVE-2023-42279,0,0,ae49b3507d000821f96296c67177c590cc1eb74f799ba761db8a6f7d004cae85,2024-03-08T13:15:07.870000 CVE-2023-4228,0,0,5627100d3d009ddd44121533ee010601f1b69de61372b6e239119aa26f8ab42e,2023-08-29T23:36:22.147000 CVE-2023-42280,0,0,338f1e80580ca1989719a71ec7d0b94dc9c2d9206091f2586bdd5dcdcbebaedc,2023-09-25T17:06:48.100000 -CVE-2023-42282,0,1,5372ebc66cdacc2f51e8cdc27180dd1a7cf8d8e17f9e4e0c886380bec3ab6925,2024-10-09T15:14:21.817000 +CVE-2023-42282,0,0,5372ebc66cdacc2f51e8cdc27180dd1a7cf8d8e17f9e4e0c886380bec3ab6925,2024-10-09T15:14:21.817000 CVE-2023-42283,0,0,eb1dd33ed81d2cda0b1cc9c01a925283f91fb7dc61ff23d14f3504998d98d90f,2023-11-14T19:39:46.053000 CVE-2023-42284,0,0,6ab160dd02f58913692c1d76b9bf09e29104d4837d03edcab143adf85652f8a6,2023-11-14T20:35:27.577000 CVE-2023-42286,0,0,1ff902e0c529d433cb875766830d3d5c7e1b312f2a66bbf37d0991d655f68bc2,2024-03-15T12:53:06.423000 @@ -232470,7 +232470,7 @@ CVE-2023-4290,0,0,fa26c4e781c85677e6e0e9d8d0320ffc864b1796c1bdedf80033ce2c5b42dd CVE-2023-42900,0,0,a6f8af1bd9d9f2d754e408c030df1eab261b184aa6f71bcb86fd9890c7c1d223,2023-12-14T14:55:04.343000 CVE-2023-42901,0,0,d05f15bee25a61234928224dfa552082549d57ce759cec090d20b8f402eadb55,2023-12-13T19:52:31.333000 CVE-2023-42902,0,0,1b35ed5c37e79d0e783e5b7a80d95a670ac632651b720a6568395aee4914b51d,2023-12-13T19:52:46.847000 -CVE-2023-42903,0,1,e06ac086c696e46e63308f14efc0a6a211ba4c73cdefbf4f5c3e77e595abd422,2024-10-09T14:35:06.137000 +CVE-2023-42903,0,0,e06ac086c696e46e63308f14efc0a6a211ba4c73cdefbf4f5c3e77e595abd422,2024-10-09T14:35:06.137000 CVE-2023-42904,0,0,a4c92d294584e5b82757bf9583be72c477c2c16a372ccab76498a5f06e703e47,2023-12-13T19:51:18.227000 CVE-2023-42905,0,0,a6e9a13eb7e3baf7c8d998d266ee3635731c8d3d1a5d57a5847ce5596df2fc8c,2023-12-13T19:51:31.743000 CVE-2023-42906,0,0,b8e6615556be432edece2ec3b117dc4a8d9c8572aed436f9c0f11244d4cc81b5,2023-12-13T19:51:46.413000 @@ -232731,7 +232731,7 @@ CVE-2023-43359,0,0,e90a8d42dd25d7d590bfe313ccac92b689e0550914c2cf710d215613f3e3c CVE-2023-4336,0,0,5ee0887690a15cfe3a323a2d56d3781c99a040fdeadcebdd2871e597b297022e,2023-08-21T18:45:37.487000 CVE-2023-43360,0,0,9359760d24443ab492860c76a8973706d921b350b1d0d79f379a0c17e2b931d5,2023-10-30T16:31:41.030000 CVE-2023-43361,0,0,1e31aa91b0f71fe0036e63f3e5cd8a88b05e6d7f7f06336744c3dd4b8d4d532e,2024-01-27T03:15:07.687000 -CVE-2023-43364,0,1,8729569b51e6ae97d4de554fa657c1016b010697f6078498854e0872faef812b,2024-10-09T14:35:06.480000 +CVE-2023-43364,0,0,8729569b51e6ae97d4de554fa657c1016b010697f6078498854e0872faef812b,2024-10-09T14:35:06.480000 CVE-2023-4337,0,0,3b73160e30603c0a37f2a27c9f0d69755744b94dbed18abbef1d7b89bdcac0e7,2023-08-21T18:45:25.530000 CVE-2023-43371,0,0,3de23514d4d2dc5d2f5867c67c6d00e66573b3ebc00d3c98b0716dd84f3f8454,2024-09-25T01:36:25.517000 CVE-2023-43373,0,0,b3607855a7f4544a93e82ff09ca5dc7734dfda0dd31e4880545b0a2b687d21e0,2024-09-25T01:36:26.250000 @@ -234025,7 +234025,7 @@ CVE-2023-45358,0,0,7f96189ec3a479246b13a2926c14e3d2144a7c985302246d9c9c0ec1db4dd CVE-2023-45359,0,0,68cbe8d71009222eebc2dca31b035afd809ba5785f08aa4449dbc9b9cd2d5ce6,2024-10-09T06:15:13.097000 CVE-2023-4536,0,0,69a4fb02e12f51562a4ed02a5feba11f17c9156d60c929fae4f1f4d1a0fcd5b0,2024-01-23T19:38:31.160000 CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 -CVE-2023-45361,0,1,10253df39112f65e66d43e0903fa429df40e36757d111a4a45028ed4d1d94cf5,2024-10-09T14:35:07.353000 +CVE-2023-45361,0,0,10253df39112f65e66d43e0903fa429df40e36757d111a4a45028ed4d1d94cf5,2024-10-09T14:35:07.353000 CVE-2023-45362,0,0,6a324f41b6301bc393e4e53b7fe2d3c213070e5c36f11f2203dcccfc20038a9d,2024-06-10T17:16:14.220000 CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694240,2023-11-28T13:15:07.313000 CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000 @@ -234304,7 +234304,7 @@ CVE-2023-45799,0,0,188b0f83d7878ae47b8098f969f768cf869e50e3dea08b261f247126db8b5 CVE-2023-4580,0,0,a57c3e7664e688b156820bd4b918e3f8486072b2b6add09845f38021feffdaf5,2023-09-14T03:53:15.150000 CVE-2023-45800,0,0,f496ca2530efaf7c1db1169c548eb0572c2c7fa0dc16de92c9d8b65231aa37ad,2023-12-15T18:50:06.017000 CVE-2023-45801,0,0,cf65d978a57bbdd5cf197844da19475d7658c7088a3bc16263e469fcf01449d6,2023-12-15T17:12:58.397000 -CVE-2023-45802,0,1,e4e76add47e3a811876be0dfb2ef021839e6e4b347665987bbaf1a44eff51f31,2024-10-09T14:30:34.180000 +CVE-2023-45802,0,0,e4e76add47e3a811876be0dfb2ef021839e6e4b347665987bbaf1a44eff51f31,2024-10-09T14:30:34.180000 CVE-2023-45803,0,0,23b8cbd7f626523fc6c08c975e564a6e86c86fc0e31e897720bf93e28c1eefe1,2023-11-03T22:15:11.693000 CVE-2023-45804,0,0,dc3dcadd1fa31289495558cbc9b18ddf506c53bed3ec877dd82065d35e3d6f57,2023-11-07T04:21:48.277000 CVE-2023-45805,0,0,513f366112bde8fc8e42fbdfa66a39be7b5c9845822dfc13910fb1d740f25275,2023-10-28T03:24:28.190000 @@ -234899,7 +234899,7 @@ CVE-2023-46581,0,0,ddbe9f76840b22f517942a1f34726a719d3e36386b213c605802508e5583c CVE-2023-46582,0,0,0894f8ba201a6b65eace2e6bd10d8ff5cca6b5c7fb29301efb138b31a43d6fbc,2023-11-20T20:35:04.477000 CVE-2023-46583,0,0,969c355d7cfec10c8a1f9b16324cc93d129ae26776b599d85f02e6163d12b61d,2023-11-03T17:39:21.597000 CVE-2023-46584,0,0,d277677c561a6e9506409f2c4808eaaedaa00cb068832fa603cd3e156430cbdd,2023-11-03T17:46:20.620000 -CVE-2023-46586,0,1,9fce462d3e786bb62be16e1ae969156b04ea74a6323cc6f390031a8a163010e2,2024-10-09T14:35:07.683000 +CVE-2023-46586,0,0,9fce462d3e786bb62be16e1ae969156b04ea74a6323cc6f390031a8a163010e2,2024-10-09T14:35:07.683000 CVE-2023-46587,0,0,7c66d76999c5f4a7223ba40fb9aee5bec7036799264d9bd6a20cfabf7a6dedd7,2023-11-07T15:09:23.127000 CVE-2023-46589,0,0,bd780c2dad93b0e2d205a58b4dbad854e66abc28d93ba51e26c0cbc208e26540,2024-07-12T16:11:18.710000 CVE-2023-4659,0,0,734dc6182932d6aedbbb6f226cde06492d58ea9196ddbf2e6087df9402266726,2023-10-04T17:01:28.217000 @@ -235965,7 +235965,7 @@ CVE-2023-48201,0,0,60c0993f9fd2fad1a2984b05e7b86a1372e3842a8522e79a0281ec50d3807 CVE-2023-48202,0,0,c6bc40e08c24ecf68e502d209640cabbad377454c37a188d6a555e38fbace74a,2024-02-01T04:49:50.897000 CVE-2023-48204,0,0,b27569f5e61fa99d026a1735cd1eb9a3781721caf7729424d73d9071b31a9491,2023-11-21T01:55:53.100000 CVE-2023-48205,0,0,d931c53fcc07350019b6afb7a38df5320fee430f71d830d3db93dd7715c5cc80,2023-12-11T15:26:29.517000 -CVE-2023-48206,0,0,20ee135f264e39ea194e7b3b9376c908f51bf0b1faf86fad557b54b2e0606596,2023-12-09T04:46:38.210000 +CVE-2023-48206,0,1,6d84b9eb4d72a00390c4dcad40273a998547c506c04572f73164bb39f0dc4a0a,2024-10-09T16:35:04.887000 CVE-2023-48207,0,0,d793095da8efd5ddd147e786763501cd6f20b6b2e55f78c1a33e22768b079b8a,2023-12-11T15:22:41.410000 CVE-2023-48208,0,0,841d516802bfdf502fd904df1eadd1bd77882620ea29e00cc91d7ca90cb1bf11,2023-12-09T04:46:49.663000 CVE-2023-4821,0,0,22a9c3ed335c3e41e653f4d81c0358510829a4c40afcd6276a3405c11bbed61a,2023-11-07T04:23:00.477000 @@ -236150,7 +236150,7 @@ CVE-2023-48394,0,0,c3024715840789d9f312132faa6fbaf0c1f9f5e5dcaedc7eeb2cfc7e71091 CVE-2023-48395,0,0,f4526cf83078b38c5056fd136243e449325c90f84eaf2a2201d315d32d83e447,2023-12-22T15:28:27.923000 CVE-2023-48396,0,0,7460321eae536ecf3c703f4e925de8665dc31bbe351d91f092291f68a8433a25,2024-08-01T13:45:08.480000 CVE-2023-48397,0,0,8ec89914f42c906f53d68364d7b6e597661ed4a8d677d7d81388609a835cf322,2024-03-12T21:15:55.883000 -CVE-2023-48398,0,1,e6e3ea5a23a3be0472c8feb5a64b68a4dd926cf6e0f4369e9616d67d78bc7094,2024-10-09T15:35:08.890000 +CVE-2023-48398,0,0,e6e3ea5a23a3be0472c8feb5a64b68a4dd926cf6e0f4369e9616d67d78bc7094,2024-10-09T15:35:08.890000 CVE-2023-48399,0,0,2adddd0123f92d5301226919e6681905241faecb6990fd36a9f3f8b4c3c9508b,2024-03-12T21:15:56.047000 CVE-2023-4840,0,0,c61c504d280424e27572fc40bd1b3623e054b8bb180693964171cc5610705d40,2023-11-07T04:23:01.510000 CVE-2023-48401,0,0,edac25284838b15881b1ce667c96d37f54752f7d500638f5dfceb2dc57736148,2024-03-12T21:15:56.107000 @@ -236410,7 +236410,7 @@ CVE-2023-48637,0,0,f87b3b3c82dd305b042d56c7a120c10c7a366bfd3e75600776433c563e7cd CVE-2023-48638,0,0,23b1764ce9735fb8875fd40c84628a8a747bf0a1fac59ffece16e0c59aa0f754,2023-12-18T18:33:18.053000 CVE-2023-48639,0,0,db61faefdce760fcdc9c94751e7f094635c9fbe9e46be178fde52da88e1bd74f,2023-12-18T18:31:37.297000 CVE-2023-4864,0,0,5e4e713f4a2743c129ea5063a4b32fd9ee7eae9e195855039cc002046cb1f05c,2024-06-04T19:17:55.300000 -CVE-2023-48641,0,1,90788dbafc145ec79bbe3b958168f374538b21118c568ca8b6058c84c3b863dd,2024-10-09T14:35:07.850000 +CVE-2023-48641,0,0,90788dbafc145ec79bbe3b958168f374538b21118c568ca8b6058c84c3b863dd,2024-10-09T14:35:07.850000 CVE-2023-48642,0,0,6f82232b5872cfe8a5f483ecc51e89fbf83ed70bb3fce6aac912fbf0e65fa058,2023-12-14T18:38:31.893000 CVE-2023-48643,0,0,bd3ab5b15ed0ad15029f58ce010c58e7d3dd0efabf1085a2608a5c689c7e7a54,2024-08-20T16:35:01.933000 CVE-2023-48644,0,0,5e5be15f1fbc02e79c5730bd0794299024e6fb4586d04faf70253bc9e2410791,2024-08-19T18:35:03.937000 @@ -236584,7 +236584,7 @@ CVE-2023-48827,0,0,ccc7d7691986552771f2bf4ba192bc148b382091836c4ef5d4c776ade03e1 CVE-2023-48828,0,0,c308b0a9161fd423f8ef43b8389de97df6f2c520a920f9a9311316fe3130ca04,2023-12-09T04:47:17.003000 CVE-2023-4883,0,0,a13bf634ce6fb4915b205d9299f39aebbb96184989c2e6d0fb7db89735c60bf6,2023-10-05T00:58:08.403000 CVE-2023-48830,0,0,9e0f7ef65195faa64e994bbf5e7dc248a4bc1ccb326932949b4dec2a07d92d44,2023-12-09T04:47:38.257000 -CVE-2023-48831,0,0,4d4042cd5a2614de7b6339fb6e40b48c2f6adb48ca21d441735f548a9f66a5d9,2023-12-09T04:47:51.867000 +CVE-2023-48831,0,1,0abddcd907e8ebcecd218714ad07ec8084f2a7aa377ae49ec9302f52a6016772,2024-10-09T16:35:06.783000 CVE-2023-48833,0,0,47c31c215fc498973e3cc380c8794cc3d085d6a913206fcee78cc656eb36f576,2023-12-09T04:48:05.443000 CVE-2023-48834,0,0,ad360d3182f6eca3ad5da886de7a1670f32bd5be2c42db10b10bb075282ddec2,2023-12-09T04:48:01.503000 CVE-2023-48835,0,0,7aa802e1f3cafd86fe3eba109081a0c7464ebc877cdfc343098f216261a562ec,2023-12-09T04:48:14.123000 @@ -236594,7 +236594,7 @@ CVE-2023-48838,0,0,2188b253a3fc94a6784a65d12e289e32dc350d80ebbc1c299fc58aaa801c0 CVE-2023-48839,0,0,36380b17048df0090316c01a49071fb580b37cd912b1011d4d2a266c2827a00a,2023-12-09T04:45:56.707000 CVE-2023-4884,0,0,cfbecc9b7cb6cbd0b4b1362ef48e959396e0c75ee9945389f4dfeb8d9f826a12,2023-10-05T00:57:43.697000 CVE-2023-48840,0,0,66507f89762cce8058d30fe903be3d25aa0326032ad749eddab90f58dfe5e1f6,2023-12-09T04:46:03.793000 -CVE-2023-48841,0,1,a98679f76431dcf6326a4f8961979545584bd793a405fa03c3999d29af747aba,2024-10-09T15:35:09.740000 +CVE-2023-48841,0,0,a98679f76431dcf6326a4f8961979545584bd793a405fa03c3999d29af747aba,2024-10-09T15:35:09.740000 CVE-2023-48842,0,0,99ae820b733e6276d6aa35a1a60ab7d466debfd9a079b7690c967b25c7e87d0d,2023-12-06T18:54:07.467000 CVE-2023-48848,0,0,6104d81c07dc162ba8030e44033fb5f9f2b6b25c8fdd6ce70f4501237665e04f,2023-12-04T19:05:42.390000 CVE-2023-48849,0,0,2253543c611d2e3acc680e128d1321413ba686970c36c4ae9ebbfec5b2a9273d,2023-12-11T16:18:06.687000 @@ -236940,7 +236940,7 @@ CVE-2023-49346,0,0,5d8e0fce4b0b902b907bf1215003822f2af36724feb90399df0795fee0d52 CVE-2023-49347,0,0,9211b7f0000c3f6933e3b3aa8ed30a7db712683beb58b532aedf4333d4da4204,2023-12-20T20:41:11.457000 CVE-2023-4935,0,0,242bc9840a476ae010d3e1b8a48adba482c633379a2ded57c2a72f0a8e0fe4ef,2023-11-07T04:23:11.060000 CVE-2023-49351,0,0,3955a17520eab4ffecb74b7388aec58ad5d6e3a0d7151e431670d8ed395be36a,2024-01-30T13:56:04.213000 -CVE-2023-49355,0,1,a23a23112c79e1660f79d69f2da0898d345842148aa04960805e2f83d63ca4c7,2024-10-09T15:35:09.920000 +CVE-2023-49355,0,0,a23a23112c79e1660f79d69f2da0898d345842148aa04960805e2f83d63ca4c7,2024-10-09T15:35:09.920000 CVE-2023-49356,0,0,624f2e46ec199abf19adfe7e93af1e9d4519d029ecc8f323a81519785521aa1c,2023-12-29T18:54:18.983000 CVE-2023-4936,0,0,a99c684c2e14a760f008ab7fdbc8d0135ab64de886545181feb3c2547e72b10c,2023-10-17T17:10:02.883000 CVE-2023-49363,0,0,834a845e6ab7a571e263b5e222df241d78905facf4bc423ab94c8079bf3a5305,2023-12-18T18:28:39.080000 @@ -237006,7 +237006,7 @@ CVE-2023-49447,0,0,ae22d358e3d35240a1fcacd212f02758a2313b5bf3aea06a046529e1ddd00 CVE-2023-49448,0,0,88fb7288edc1f6bd878336f86c33b00611a5794c265f7f170de80fae37371e91,2023-12-09T04:49:37.330000 CVE-2023-4945,0,0,78bc440698b3b32f7e1cafa3c9a7b8ce10319905fcfb635f684b1cb09256423c,2023-11-07T04:23:12.540000 CVE-2023-49453,0,0,63895b177ebb19546d64fcad8130ae2940d5172731363790ff9b898d17f7a54d,2024-08-16T18:35:00.910000 -CVE-2023-49460,0,1,ba28c1b3b83a4181791514173c8d5cc9758940824354842abe0c02dfeec09425,2024-10-09T14:35:08.690000 +CVE-2023-49460,0,0,ba28c1b3b83a4181791514173c8d5cc9758940824354842abe0c02dfeec09425,2024-10-09T14:35:08.690000 CVE-2023-49462,0,0,93abc8c208231550058f4c17a937842286c7a4cdf9823871eb88140b89e42d67,2023-12-11T17:32:38.270000 CVE-2023-49463,0,0,3997f0c76b75718e8d7fddf13118ae3adfe6e7b8a1e026bbdd8c02aa82ae2644,2023-12-11T17:32:07.403000 CVE-2023-49464,0,0,6558ffdc5c503d25be5dd218daff18765b512708dd37d505c33fce4d88f34e1f,2023-12-11T17:31:56.900000 @@ -237026,7 +237026,7 @@ CVE-2023-49488,0,0,3940c81445941341f2f5af7f433e8ecbb6b71d94a45549b5d6b7d254cc50f CVE-2023-49489,0,0,85a058d7d87ff19c761126c4d1839db31cc064446a974f1cbe42fc35dad7387d,2024-02-23T15:15:07.970000 CVE-2023-4949,0,0,6131c53e0ed92608d9e825806c45b4df6439e1a0da2e7810dff141efbb78e650,2023-11-20T19:37:23.430000 CVE-2023-49490,0,0,a4374940afa6e33c51a27f8931940c71e35707cbd50b17233308670c2ec877d4,2023-12-13T17:43:33.160000 -CVE-2023-49492,0,1,0c73109a59147679b51d4ec0f8f171403b830dddd79cbb3f5c2e96f09a0d131a,2024-10-09T15:35:10.710000 +CVE-2023-49492,0,0,0c73109a59147679b51d4ec0f8f171403b830dddd79cbb3f5c2e96f09a0d131a,2024-10-09T15:35:10.710000 CVE-2023-49493,0,0,fb34ac3da5edc0f52859b41ad33e0ffc92c0e5a150f6bc9b8790ce7f30cf7029,2023-12-12T18:23:26.673000 CVE-2023-49494,0,0,6707342a75496ebf222d3c3e218a3eac4d44b13ac4a0b4bf48aee5af714535ab,2023-12-13T16:29:45.553000 CVE-2023-4950,0,0,756d5ad7619ee12672132987a97d38302ecbb6061d03d4478eb6c1af3da04724,2023-11-07T04:23:13.067000 @@ -237332,7 +237332,7 @@ CVE-2023-49954,0,0,5f2dd99d2d2c5535eeb8bba62a2016b84ef33eebb943b9df4f5ddb0db1b14 CVE-2023-49955,0,0,cbf9c53c0bb64b06b75bdbba368b6a283ee8d6496dcad41687ecb7908881f040,2023-12-13T15:20:11.417000 CVE-2023-49956,0,0,3a870fcbca81b4abff15e228414f86cd1d698ffd0c027bfafed8702887aef856,2023-12-13T15:14:46.320000 CVE-2023-49957,0,0,8f9b199be485b1673dc5447e376ee2bb3e20dd97ded779983109c4fe9a0624cb,2023-12-13T15:14:40.917000 -CVE-2023-49958,0,1,30bf1dac98c89e8f3e9ba90c7a692dc1a04ae5bee90abe47a053d3ed509c4049,2024-10-09T15:35:11.470000 +CVE-2023-49958,0,0,30bf1dac98c89e8f3e9ba90c7a692dc1a04ae5bee90abe47a053d3ed509c4049,2024-10-09T15:35:11.470000 CVE-2023-49959,0,0,30b0178602287fcddca4ef377ff9f6871bbd1799c813bab1004d34e253cc7693,2024-08-29T20:35:39.437000 CVE-2023-4996,0,0,6a96837fcca1d7deaa6aa589d92a14b4327d14c87ed64a80dfeb3367527137a1,2023-11-14T17:04:04.747000 CVE-2023-49960,0,0,0e9ad95596e6a050966eeae850b05c374feaaec388768a0ded233d222e3ddb12,2024-08-01T13:45:17.753000 @@ -237363,7 +237363,7 @@ CVE-2023-49987,0,0,6666894146cb92f75fc70a6c668cf409191be8d05d66fdbc2b6973b272208 CVE-2023-49988,0,0,af3f01af8abbd20907ca3d22a8fb2f0ce6ca13f1af6f9bf92429d44550b8b49a,2024-08-16T18:35:02.507000 CVE-2023-49989,0,0,8df1969668f4784b3aa305612d6516447c61c41a729e4e36322e658aab5c3304,2024-08-28T15:35:08.730000 CVE-2023-4999,0,0,a9caefdd4df7e960da2284d3ca94a538ae47e3d7f39d9ecb83734266ebc3a13e,2023-11-07T04:23:17.550000 -CVE-2023-49990,0,1,8a85b9e771bb1df6786357a17de58cb70481d8956ec5ef7fdfdf86e15a9bdc1b,2024-10-09T14:35:09.040000 +CVE-2023-49990,0,0,8a85b9e771bb1df6786357a17de58cb70481d8956ec5ef7fdfdf86e15a9bdc1b,2024-10-09T14:35:09.040000 CVE-2023-49991,0,0,bd97a9ee7ae0f1cc74ef24bcda4231f713b9e1b0d8fdff1d77ef1e74196f05c6,2024-01-19T04:15:08.870000 CVE-2023-49992,0,0,edcab1d5a7b400bcaff2161b32f6e5c4af8efe0694352ac1a39dc0bd9f2ab63d,2024-01-19T04:15:08.960000 CVE-2023-49993,0,0,0aa2a5e45b1df62bb4abc8c36b7f63610ea75e2d2daa2e4dcb0f5ee2e36d16a2,2024-01-19T04:15:09.083000 @@ -239790,7 +239790,7 @@ CVE-2023-5629,0,0,7e6798797b363836a6f68c0660a0441b52f3631f60a9991276c08a96f30860 CVE-2023-5630,0,0,3072d6705514ff8b04e35c4acd894f558cdb54032a9cbe6e724fdab46e963cc4,2023-12-27T18:45:36.387000 CVE-2023-5631,0,0,5f07007a20bb2dda9efb27c552720a26c393ce7eb1f775cb2a4d745ead162b5d,2023-12-22T18:55:30.400000 CVE-2023-5632,0,0,56ff7f39be5ba1eee3e0439676ca7f39fd02b7efec57b6f2580941c9bb104be4,2023-10-25T17:32:13.007000 -CVE-2023-5633,0,1,6af5c1704772a21fbfc04ad0020a0bf39c250727b8fcd5399bca421442bfe3f8,2024-10-09T14:43:26.870000 +CVE-2023-5633,0,0,6af5c1704772a21fbfc04ad0020a0bf39c250727b8fcd5399bca421442bfe3f8,2024-10-09T14:43:26.870000 CVE-2023-5634,0,0,e587ffcfa7ea95a40df03855557a10777d01a5818110ab153743d2b6b549ed87,2023-12-06T18:59:59.893000 CVE-2023-5635,0,0,809760649528b2a8ff45a46ed3580c71b50b09190c35543546f6b22b8f14c24f,2023-12-06T18:59:51.757000 CVE-2023-5636,0,0,5b9f7faf77daa38955d87414eba1ab1ed6bca8c51088b10eac66b79b69cea5d6,2023-12-06T18:59:28.783000 @@ -240131,7 +240131,7 @@ CVE-2023-5988,0,0,e8870fe285335fc9ce27fd61b5356b88284d0d9de295811057ae9832cb67e1 CVE-2023-5989,0,0,f8509da0ba0d97be9b7e7d1f7b5f79dd1d2578aa08df6f41d5225f6bb32f42c1,2024-01-04T14:40:49.677000 CVE-2023-5990,0,0,15ce5aec00c7b53e458575c1bf06462b3643079b31aca67ca329b5e17aebb001,2023-12-08T14:32:27.447000 CVE-2023-5991,0,0,53ad6ba66617388676db7532ed8835e282a5dd8dfff15947bac31665750497dd,2024-01-02T20:49:50.667000 -CVE-2023-5992,0,1,89014b5a90cddffc4e92782c319b1123b3b73fe015e6577eb84795ec814d5287,2024-10-09T15:07:19.680000 +CVE-2023-5992,0,0,89014b5a90cddffc4e92782c319b1123b3b73fe015e6577eb84795ec814d5287,2024-10-09T15:07:19.680000 CVE-2023-5993,0,0,e89bca2c7b548c3aac923b412136cfbbc334d9d5a4c9f1dbaa71ffb351f185cc,2024-02-27T14:19:41.650000 CVE-2023-5995,0,0,1174ae36855f90b509be2e0c5287d452935790dedb6b9a4a07f403c75e535791,2024-10-03T07:15:25 CVE-2023-5996,0,0,a39512b4e26586438bfe4d642c83b3e78017d2d0d5d7007b3e44874f38592e9c,2024-01-31T17:15:22.350000 @@ -240206,8 +240206,8 @@ CVE-2023-6076,0,0,785349ee1b43a84e354166d321001c2befbbadd25695bc0d81584d4bc86bfb CVE-2023-6077,0,0,e66b1452c8e6292f97a54db430f2bf33d302af2002eed812cae50eb7b5b581e6,2023-12-21T19:35:11.607000 CVE-2023-6078,0,0,1932527b21a8099f46ffc89544c26744c754a38dba52bec61da58201006fed10,2024-02-09T20:23:01.477000 CVE-2023-6079,0,0,b8f1006a826661ea0e917e1a7d7f47f594110ed1928962517b4919ba2ad7c6e5,2023-11-15T17:15:41.840000 -CVE-2023-6081,0,1,178b25173627eb0b57b5dd11bc1c806c9af8a3ad415a03ba5ab5f93aed40cc65,2024-10-09T14:57:16.107000 -CVE-2023-6082,0,1,4af34e45b57c353c9abf90f47fbc027e75196c20d60a16c38742835a1662ee67,2024-10-09T14:57:13.950000 +CVE-2023-6081,0,0,178b25173627eb0b57b5dd11bc1c806c9af8a3ad415a03ba5ab5f93aed40cc65,2024-10-09T14:57:16.107000 +CVE-2023-6082,0,0,4af34e45b57c353c9abf90f47fbc027e75196c20d60a16c38742835a1662ee67,2024-10-09T14:57:13.950000 CVE-2023-6083,0,0,d1560627dc68f7b1a426ece78a2c5533b729fcd47dd7569b2120a5d6118d44ad,2023-11-14T00:15:08.847000 CVE-2023-6084,0,0,7749e3bd1a5d4588819153647e0e930d568b0e412c02433e13fbc1084fde9f76,2024-05-17T02:33:30.967000 CVE-2023-6085,0,0,bab498fc828a0983f54a060480ae58d994e084d7192299d171cd812da89dd83c,2023-11-14T00:15:08.887000 @@ -240573,7 +240573,7 @@ CVE-2023-6497,0,0,b7a3e3e856dd05985bea6750ba79ee0e76ef7afa2b4e40f56c5687d368154d CVE-2023-6498,0,0,e6d4f3fee7aef143191e25541a797b33d30d2b79732b185ae94c7101e98a96b9,2024-01-10T16:53:30.670000 CVE-2023-6499,0,0,d46cd6be7590cba34948f17fe4f2bf26e560b814d3a898ff81fde7aeda81cc2f,2024-10-08T20:06:08.057000 CVE-2023-6500,0,0,b7e4b5707092c32691bd4884be310539cb3deb2e1b3476a4077fd0fa79e885c9,2024-03-21T12:58:51.093000 -CVE-2023-6501,0,0,458ace5a018266421d15a37f407ed30a087034189adac3ac381201d7b8bbd71d,2024-02-12T17:31:21.670000 +CVE-2023-6501,0,1,f05eb7ee94d536bb375f65518fb418f5820e8e15b20d09997d7d857cfeeca500,2024-10-09T16:35:04.897000 CVE-2023-6502,0,0,d0a5062c142a930addd3676eee720b7b15792618e4d03e9a12daaedfbf54c529,2024-10-03T07:15:25.577000 CVE-2023-6503,0,0,d218ad8473fec30dfcb16931ef46bcb78cf3da9a7f36a35616f1e55c784136c2,2024-09-05T18:35:06.590000 CVE-2023-6504,0,0,1dcc6bc3d1fde830086c7a2c14987af01f76f1d08b941e5de9c5ff386a21111f,2024-01-17T20:32:01.283000 @@ -240652,7 +240652,7 @@ CVE-2023-6583,0,0,21747000af50c2bd6c4b8b6c66e340f66b1695cdbb1a986ec00ce5959faa5c CVE-2023-6584,0,0,8773a46c0bf1e98def92bf09be9f216087e9553ba2b162c8add10fe75120d24f,2024-08-01T13:45:47.720000 CVE-2023-6585,0,0,70e873ef2197e75c79ec5fa1f4cfd3e0f2d76a7c6a8efc068f7ddf5f731f4adc,2024-08-09T21:35:01.303000 CVE-2023-6588,0,0,dd063a41944b062c6e460e59f76370d247a67c6df97c981e6163aa98d4cdd787,2023-12-12T18:50:19.453000 -CVE-2023-6591,0,1,b3431473f4254d7e94a5d0a773451a8ff4e22dc82d431e43a20350544c668600,2024-10-09T15:39:22.323000 +CVE-2023-6591,0,0,b3431473f4254d7e94a5d0a773451a8ff4e22dc82d431e43a20350544c668600,2024-10-09T15:39:22.323000 CVE-2023-6592,0,0,0adc812257fbd91a67a793f4568aaca2b31731b8c909103ecdfd8d33fef06ec4,2024-02-05T22:15:55.937000 CVE-2023-6593,0,0,fe1ee711e78c3bb0a13a29704dce0aafa9fa06e3727be5f19b50dd27ddc695a2,2023-12-15T14:38:03.057000 CVE-2023-6594,0,0,277e0f84fdab8db60396d1e087aca8094336e147a66dbbb03745e488ffdbc935,2024-01-11T23:32:17.207000 @@ -241213,7 +241213,7 @@ CVE-2023-7225,0,0,7341cefa9e74cf83e2fa5008510d3de42a90e3da733eb637be6f7cce9195e1 CVE-2023-7226,0,0,3893c05fe6258b832207ad30aaac294e8200b072544fdcc965a7b5a7f265dd10,2024-05-17T02:34:19.650000 CVE-2023-7227,0,0,f09d40c1798c608e74b613273994885e81f8c72f7860873cda131cb55dce19fa,2024-01-31T18:46:00.220000 CVE-2023-7232,0,0,156e2327f167f22b03f75e9d7e3ba8518eca33b5ed593a1c4859deb33e365170,2024-03-26T12:55:05.010000 -CVE-2023-7233,0,1,e5fe13d2a4428fd4e4020fc7b1f777ad9d2c087815bd0943f82d6bc94f58cd21,2024-10-09T15:13:58.453000 +CVE-2023-7233,0,0,e5fe13d2a4428fd4e4020fc7b1f777ad9d2c087815bd0943f82d6bc94f58cd21,2024-10-09T15:13:58.453000 CVE-2023-7234,0,0,4913e889eaa472bb82ac4ba0cfb090f6c1de954cba61f05570944d51d33ce47e,2024-01-24T16:47:18.570000 CVE-2023-7235,0,0,288cad2e6179ef85d872cd7f090732746a564db6bcf8f5576a956098e7e30cf5,2024-08-26T17:35:02.810000 CVE-2023-7236,0,0,cd6a7ec339739cf2aa5f2eae566c737d9fd00de8ade845936b1d92492028c2e6,2024-03-18T19:40:00.173000 @@ -241738,7 +241738,7 @@ CVE-2024-0562,0,0,da76ada5e80bb87b4a110a9fa03a565bf9113fd5412b976afa32604e08bd48 CVE-2024-0563,0,0,9ec355fcf8c2bfde63e8cd3b32f6b09899d66d999623867d4585cdbccddf2e84,2024-08-27T11:15:04.277000 CVE-2024-0564,0,0,9f4cf532f2df225cad861ce2ec08ab9ceb4e29633d51c64f31796eb4bcd7e01c,2024-02-08T16:36:48.837000 CVE-2024-0565,0,0,ca58e43bc8d960bbfb34d32be78694d44cad238c92c5ee98dbd6b9bf2c483600,2024-09-14T00:15:15.387000 -CVE-2024-0566,0,1,596c6a44a6236efe2ddb3202b638004a8482a0ee81f574b58e361ad51f787e1d,2024-10-09T15:23:20.433000 +CVE-2024-0566,0,0,596c6a44a6236efe2ddb3202b638004a8482a0ee81f574b58e361ad51f787e1d,2024-10-09T15:23:20.433000 CVE-2024-0567,0,0,2f4df701f3416c48266db1bb8a27d322f4c7f91f5c54f623275f8e06a0796629,2024-09-16T13:15:08.680000 CVE-2024-0568,0,0,33eac886ba5b69f80ae385e0dcdb88a2caf2e7add15dda3f9f1cb918faf651d0,2024-02-14T18:04:50.373000 CVE-2024-0569,0,0,a95accd00cf0ee074f6751dcd8e432a7e91c717e436d391ea5221ea3ce82042e,2024-06-18T13:21:16.393000 @@ -242289,7 +242289,7 @@ CVE-2024-1151,0,0,4bd96d45d8577f9810851348ab4eeb008c26399957744dd5c6d2cb4a43cb17 CVE-2024-1153,0,0,ef044a07a9d08d9e4b985a54be5b7192d28514cd606cdbcd1ece01d4ab3f4a43,2024-09-16T17:39:45.023000 CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138d1,2024-02-20T19:50:53.960000 CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000 -CVE-2024-1157,0,1,001990078fff7096490bf70ba6c297a0b4693b99849d8bff3e34fde8c569a855,2024-10-09T15:20:50.540000 +CVE-2024-1157,0,0,001990078fff7096490bf70ba6c297a0b4693b99849d8bff3e34fde8c569a855,2024-10-09T15:20:50.540000 CVE-2024-1158,0,0,3f0844fda5c657ec14fc878f4ca458f05346302835336ebfa8e7bba85b29f7d9,2024-03-13T18:16:18.563000 CVE-2024-1159,0,0,6093cf6c5c8fc4abf001ccc0f4d05ab0de1f6859d26926dcd40937cbf24b911d,2024-10-09T13:22:23.253000 CVE-2024-1160,0,0,895b8a1484864a7446dc0dad2cc1b1d7457042a73872ab53e023b0e471ba9cb5,2024-10-09T13:30:12.563000 @@ -243373,7 +243373,7 @@ CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419 CVE-2024-20467,0,0,c1af58980ccad99499fcb95639264b5a0614f69936f5a7ffc5edb35f8fbf6c29,2024-10-03T20:09:50.970000 CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 -CVE-2024-20470,0,0,f4d0f370b33409c262c5ab31378ee827b9a245accc78a60dda7d13e5892b01f8,2024-10-04T13:50:43.727000 +CVE-2024-20470,0,1,f40c5f3d443e730674f42085e42ea8d2de51e3f4830b15dca54c9f67812afae9,2024-10-09T16:55:23.887000 CVE-2024-20475,0,0,3f291467cc737decf2fac9adb4dea13bddd59923e910f2a0d4abb07dc30557b9,2024-10-03T17:49:17.797000 CVE-2024-20477,0,0,546baafd3f9cb181a62a5bf8f2d6a935693c1d9566bac043856053043d6e851c,2024-10-08T16:00:30.167000 CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611029,2024-08-29T13:25:27.537000 @@ -244260,7 +244260,7 @@ CVE-2024-21587,0,0,6fb74afc13eaed151f7dfc73f3405ccfaec4bc45b3ea2dc8ae59dadb238cb CVE-2024-21589,0,0,bf8a565022261f069a66f4b01e754b7d699f349013c5b07db7616e20369d7f8b,2024-01-19T17:41:50.160000 CVE-2024-2159,0,0,1ffbabe39c0169d7c9b0e1bf51aed51f76764237e56b3a68db025efae83b9120,2024-04-26T12:58:17.720000 CVE-2024-21590,0,0,d08474c974f9592fef08b015c317503a18e23e40ac3eeaa76411343449e4ff8a,2024-05-16T20:15:08.473000 -CVE-2024-21591,0,1,e40a687cc8061975f7bebad4323d4bb4ab97a9cba87c782ec13ee84f9e541139,2024-10-09T14:47:40.580000 +CVE-2024-21591,0,0,e40a687cc8061975f7bebad4323d4bb4ab97a9cba87c782ec13ee84f9e541139,2024-10-09T14:47:40.580000 CVE-2024-21593,0,0,540dea6f9467759cebeb81acc8a430afb7c98c09a21ab68c332120fcdcbd1e65,2024-05-16T20:15:08.637000 CVE-2024-21594,0,0,11d4c74084ca15766e97c10fde7fa2c9e8c7206abcd2d4603d3379eded09cbba,2024-01-18T20:14:10.903000 CVE-2024-21595,0,0,f9c63caa0cd8c20e7d4b4fa1660d58d7b118b5c585059df64314169457425b36,2024-01-18T20:37:57.160000 @@ -246292,7 +246292,7 @@ CVE-2024-24693,0,0,ac8cc34f48c61eb589c082158704cb9f6ec8df776fbb4dc464b315d507943 CVE-2024-24694,0,0,53c1cb705c824edd778104ee7d12ae923f740ce699c776d76636bfef61ed1ffb,2024-09-20T15:15:17.107000 CVE-2024-24695,0,0,75188a5c5af2a8bd21078f5ad30db4daa4f9d2cd15761abb1d9f5da7a84e177c,2024-10-04T15:44:35.943000 CVE-2024-24696,0,0,58fbfde2e31e9cdb4d02fb73a59564c0ca72f0d1abe00755a092d7c72de161db,2024-10-04T14:33:50.130000 -CVE-2024-24697,0,1,99a9d445f30d3da408defd1afbbe9c40bfe40a7f50ded5ce7a8b8e1e2040a755,2024-10-09T15:22:48.937000 +CVE-2024-24697,0,0,99a9d445f30d3da408defd1afbbe9c40bfe40a7f50ded5ce7a8b8e1e2040a755,2024-10-09T15:22:48.937000 CVE-2024-24698,0,0,51dcad39cf1c87c72709aeecda43446ac23d958f1480a731be0fec89bb6f7b9a,2024-10-04T15:54:22.307000 CVE-2024-24699,0,0,4d44123d26f0218677318a2c0774e7a9b53b2b639868e0b44134e40476a43359,2024-10-04T16:56:00.213000 CVE-2024-2470,0,0,18e1880afe1444954891abe795fc3a0d849c951a72a80f6d9a727adff6033cb3,2024-08-01T13:49:46.933000 @@ -246472,7 +246472,7 @@ CVE-2024-24878,0,0,298a08ab82a5bf3a5e1905d2bd2b0b3a16b15c92c4d573ce5c55312b22ff7 CVE-2024-24879,0,0,62c521300bf2d7befb585371230a008740a177167b97c0e7bac4746447ed53c5,2024-02-08T13:44:11.750000 CVE-2024-2488,0,0,9f9545c282e96006573210a989f186c5df3154a3513e0af714a0d9e2892e8aac,2024-05-17T02:38:15.413000 CVE-2024-24880,0,0,d33c65d2cd8280ebaa686b2fcc8fd218b13ad4aa68609a2777547b3bf6ac3482,2024-02-08T13:44:11.750000 -CVE-2024-24881,0,0,2288be2c91942fc92a3bfbf824dea2534c6e6030681aebf811f46922dbd6fdfa,2024-02-08T13:44:11.750000 +CVE-2024-24881,0,1,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000 CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000 CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000 CVE-2024-24884,0,0,9cc0b3ec8c7734d1deb101b539045a2699ea3341a31f17e51491360af063871c,2024-02-12T14:19:54.330000 @@ -246755,11 +246755,11 @@ CVE-2024-2527,0,0,3595089dfbf7c838cd10907d9475b6f382b61f5d4f125e4851b3ab5c70cb2f CVE-2024-25270,0,0,5f30998f0581b52564ffa879dfe70f343d5031848a9545cbe5dd55b89d561500,2024-09-13T16:01:01.810000 CVE-2024-25274,0,0,6d61d530dc49a931412656c8f607fd75a29229348fb483cac927de396452465f,2024-08-29T20:36:19.120000 CVE-2024-2528,0,0,f3ce2742845e3c962e76fc1fc8b85fe99361dde771fc18d0886792da646965aa,2024-05-17T02:38:17.403000 -CVE-2024-25282,0,1,ad5adefec4b2ae9cd7b70c0e4074c0b23e21283c69ae293bb4cc15205e2cd08b,2024-10-09T15:35:11.880000 -CVE-2024-25283,0,1,ea1f7eb37df199b0742031837ffdff119422945944224010744062a42e8efeae,2024-10-09T15:35:12.690000 -CVE-2024-25284,0,1,8ad66d77cb887221e3b9656f8ee65f3a3250afcd8618a6d71142a8325a902290,2024-10-09T15:35:13.433000 -CVE-2024-25285,0,0,f59e41792d6726a49ae8f7914401e25d4579ec8fde9d9953f6dda24c4ca3f7d5,2024-10-09T04:15:07.700000 -CVE-2024-25286,0,1,d2996e9acfac66431ee3ce4b29371ebca19246d1b18aa3ce8d9bc306e453b53c,2024-10-09T15:35:14.180000 +CVE-2024-25282,0,0,ad5adefec4b2ae9cd7b70c0e4074c0b23e21283c69ae293bb4cc15205e2cd08b,2024-10-09T15:35:11.880000 +CVE-2024-25283,0,0,ea1f7eb37df199b0742031837ffdff119422945944224010744062a42e8efeae,2024-10-09T15:35:12.690000 +CVE-2024-25284,0,0,8ad66d77cb887221e3b9656f8ee65f3a3250afcd8618a6d71142a8325a902290,2024-10-09T15:35:13.433000 +CVE-2024-25285,0,1,9581b2f9e5d37d9f97582be2bb7a9aa5c565114f6c3384e0ddaa9465b667913f,2024-10-09T16:35:07.700000 +CVE-2024-25286,0,0,d2996e9acfac66431ee3ce4b29371ebca19246d1b18aa3ce8d9bc306e453b53c,2024-10-09T15:35:14.180000 CVE-2024-25288,0,0,5073c2c356c31f0a28f991dd78ab646fa56ee0bfa67ba129f7aa2ad1aa6c7f01,2024-08-16T17:35:05.360000 CVE-2024-2529,0,0,3dcfb18c753ec485cf6ba2b140882ea30783b45e3ebf36f2c06c6d0afef8cf3b,2024-05-17T02:38:17.490000 CVE-2024-25290,0,0,1ec48026c39efee418c42c9ca18840885fee8443e93218944bef4bd724ec09b7,2024-08-01T13:47:39.797000 @@ -247088,6 +247088,7 @@ CVE-2024-25808,0,0,c8b3842916e7c06900b08f9fd62594e0f61e1918f91fddba1f15f9656576b CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000 CVE-2024-25811,0,0,19975e07ecf1fabf59b175c7c29029eca5183606ae6164f55f4361c17d565764,2024-08-04T12:35:05.137000 CVE-2024-25817,0,0,594e7944f467d2705810e71e76846a873167e65fb8715f24384d52ab7508e60a,2024-08-08T21:35:05.550000 +CVE-2024-25825,1,1,5ca1e4ad60487a4bc79feabb10baec168b6bbb3135ea1a857f949b04337b1ae1,2024-10-09T16:15:04.277000 CVE-2024-25828,0,0,bb5f11d12010040c46347f1b01567677eceaf6416fc48feec74112280779705c,2024-08-19T21:35:05.027000 CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000 CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2bab0f,2024-08-13T19:35:05.710000 @@ -247127,7 +247128,7 @@ CVE-2024-25874,0,0,88ae9cad6df17a6b755158813094243d8c75451396169285ca83aa1d99653 CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000 CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000 CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000 -CVE-2024-25885,0,1,c4c35b30ecdc096cf80c648aec8f0c937c1e4c435d03b7a8f2c1b020d59586fe,2024-10-09T15:35:14.920000 +CVE-2024-25885,0,0,c4c35b30ecdc096cf80c648aec8f0c937c1e4c435d03b7a8f2c1b020d59586fe,2024-10-09T15:35:14.920000 CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000 CVE-2024-25891,0,0,e93779192ae2b53bc940c8dc86dbc0a2aabc2f496df349ea80435884b9f989b3,2024-08-29T20:36:23.993000 CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000 @@ -248619,7 +248620,7 @@ CVE-2024-2761,0,0,5795ed83fa99c1921b7aae8b1ff040c74f4ad844a04231fed91291049f2adb CVE-2024-27612,0,0,f8c2cd7915293a4c2c09133339b060a4c43cfa10a215c68dc3d525db0ac4d818,2024-03-08T14:02:57.420000 CVE-2024-27613,0,0,e8ddbf6e46995016b86fec11e3a571d06151af83dbfa811d22e9f83bc983a650,2024-03-08T14:02:57.420000 CVE-2024-27619,0,0,4630c10ac04a18c1c105f4ff5c282cc750eaff930c2daf364ced347359aecffd,2024-09-04T17:35:03.770000 -CVE-2024-2762,0,0,99337d978a85b8c23bac30a66dfb740d33cb7f450f707199e5441f5723a8b146,2024-07-22T18:31:03.357000 +CVE-2024-2762,0,1,63cbdeca85f6f186e23a6be025bad2b8a24e4d64f251fff914f6a23a4f7fa759,2024-10-09T17:12:42.747000 CVE-2024-27620,0,0,a6cd517087288a476282a828ad06f1425f605eb49a5acbc3c4b9fdfa51cf4c1e,2024-08-01T13:48:33.830000 CVE-2024-27622,0,0,d36e42f80fadc01b57dce713d0e942cdb5061aeef02f106f66a87171df29d206,2024-08-05T21:35:04.990000 CVE-2024-27623,0,0,908e722a38df81c5e163df23fcc18187660fed41610c0b2838365cfd8fe61d3a,2024-08-03T20:35:05.903000 @@ -248940,7 +248941,7 @@ CVE-2024-28014,0,0,16fb600a35cd34a3bc2910bc5d71fb1c433afeb8bbc697318d98ea82c7efb CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000 CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000 CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000 -CVE-2024-28020,0,0,20d763f6a7d879da851798b82fa90e89f1e3cf4560e3c465ec8e7510e66b7ffc,2024-08-15T21:32:33.467000 +CVE-2024-28020,0,1,60bbaddce1e052f604b4df6e4226a190b3ae4639e3752fc86ca3638fe7ed3aa8,2024-10-09T17:08:57.697000 CVE-2024-28021,0,0,698af9df63c869e8bcfc4e84d62db6e4d7ff182600a91f2bc02d26dab9f88c10,2024-08-15T21:29:46.697000 CVE-2024-28022,0,0,05ab2292ec2d5764d60dc41d68acf6b7ed0f81413d1d5304ceb85ddefc5f7d7d,2024-08-15T21:44:20.677000 CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000 @@ -249060,7 +249061,7 @@ CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4 CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000 CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000 CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000 -CVE-2024-28168,0,1,141529afec7243a7559a211caee03d8711a42d9364bbb9fa6e10f69aae8e2f7f,2024-10-09T14:35:10.237000 +CVE-2024-28168,0,0,141529afec7243a7559a211caee03d8711a42d9364bbb9fa6e10f69aae8e2f7f,2024-10-09T14:35:10.237000 CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000 CVE-2024-28170,0,0,b651a495621059669c19c3fdc9d2ee84d87fc5f846a93fbe1c30394bd5ddd768,2024-09-23T14:49:17.057000 CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000 @@ -250652,7 +250653,7 @@ CVE-2024-30469,0,0,5f60e05589c3ee2464f9657ee501b05ffdf6e5d6a13b3d79ce37326fbe7f6 CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b398,2024-05-02T18:00:37.360000 CVE-2024-30470,0,0,9f2505b68ca9ef7063653e3f81b9c447b6f415f8a409c2bcecf6b6b159784a85,2024-10-08T20:43:52.250000 CVE-2024-30471,0,0,d2c7175a640d9b74965331cf8285959ab05f361410426a885e08e10d5fad74e2,2024-08-01T13:50:08.403000 -CVE-2024-30472,0,1,1e5c142b01ad909062ee7ef3de360df0687c4b7ff069ecc14b368725b7f14a4a,2024-10-09T14:12:54.947000 +CVE-2024-30472,0,0,1e5c142b01ad909062ee7ef3de360df0687c4b7ff069ecc14b368725b7f14a4a,2024-10-09T14:12:54.947000 CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000 CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000 CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000 @@ -251036,7 +251037,7 @@ CVE-2024-31094,0,0,96018b384dee14c4167dc62fa0fce59c729622c883102393ed22db19b370a CVE-2024-31095,0,0,31ed0388a12281d5a7978ac66f06a17c76e0891ba943bbf86daf64b5ed1eba59,2024-08-01T13:50:47.373000 CVE-2024-31096,0,0,4270e5e66128cdab91811a0ce591a6eb33a08f957387696602f581ae0ed51dae,2024-04-01T01:12:59.077000 CVE-2024-31097,0,0,af09d47b9da9890511e00b9cb33e81e18545423fcf604be15b4f56a0320067e6,2024-04-01T01:12:59.077000 -CVE-2024-31098,0,0,575269b926b2ab5203734875858ede91a25503d1903e96c2dfe82bc588e9c081,2024-10-05T01:54:33.020000 +CVE-2024-31098,0,1,e24dcc12ec80ae731570328b821bd8d0791f13fa285e0f7e54914b36600e2ab2,2024-10-09T17:02:55.033000 CVE-2024-31099,0,0,528ba98d88fb34d8f61e8485a4326c059785e996c72869ec228c224daf695f3d,2024-06-05T14:15:13.310000 CVE-2024-3110,0,0,635900212764359abe4ce85d386db98d21740945c63dc9266eccccde33b65fe3,2024-06-07T14:56:05.647000 CVE-2024-31100,0,0,304afdd26a02a950739edd8b75999107f4a6aad6e328c60a5193227610b72d07,2024-04-01T01:12:59.077000 @@ -253881,7 +253882,7 @@ CVE-2024-35010,0,0,6e4b79d2c02224bc0070ffd30b8ebbf9821b5f9a967abd7e45b682dfed020 CVE-2024-35011,0,0,20c56ae7701ad2e917dd6b2ccceeffea8e94a8ddd9a2b2ca02beb893f0a0b7e1,2024-08-19T17:35:16.943000 CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000 CVE-2024-35039,0,0,16789b799d84c4b57ca393e0c1f64a27f89bdf5208029185a91c381dd5f853e1,2024-07-03T02:01:12.907000 -CVE-2024-3504,0,1,e2de0e6f69991c8d2671ce35086e9faed799d2b484a27eddaabccf584b0c7ea8,2024-10-09T15:27:06.437000 +CVE-2024-3504,0,0,e2de0e6f69991c8d2671ce35086e9faed799d2b484a27eddaabccf584b0c7ea8,2024-10-09T15:27:06.437000 CVE-2024-35048,0,0,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502def,2024-07-03T02:01:13.607000 CVE-2024-35049,0,0,7f4be420d91d9a8f87262bac46be64324b444d7ac3ac1587575b0d32b81ff685,2024-07-03T02:01:14.393000 CVE-2024-3505,0,0,07b0949681fcc5ca8054aa7f9f47a8f95432c3a4c9c46506fc21cb30ad4bc3b4,2024-04-15T13:15:31.997000 @@ -254210,7 +254211,7 @@ CVE-2024-35643,0,0,c3caf5959b77d4a702d91aa0bf4b2758b075d303be07c72fc9b62adb0d2da CVE-2024-35645,0,0,532df1b4372939ef83a34b0a0d03915cd6fd67d0dc5ece71d687ac9c57ee71cb,2024-06-03T14:46:24.250000 CVE-2024-35646,0,0,027c9b2e9841ee1e77535a434cd7e453fe8391963c3ce5a49633203d62b6f6ef,2024-06-03T14:46:24.250000 CVE-2024-35647,0,0,6fa4f434e58493f0d43c9eb1feab744779e961ba26cc03a4fb24aa12bf3c878c,2024-06-03T14:46:24.250000 -CVE-2024-35649,0,0,3d6a25667cb3672adc1a0922468ba62bec4b1bab59b4a3b5a0bfb2d0243fad4a,2024-06-06T13:26:46.537000 +CVE-2024-35649,0,1,defdfeac2d046cc36fd6e7e16ae01bccc1e3fc7c434a9b237649aec0bc7bb583,2024-10-09T16:48:22.853000 CVE-2024-3565,0,0,019da6b3c037d544052ebf0d1f42ac3ca631946ed912344ab1ee871ab0fbdf06,2024-06-03T14:46:24.250000 CVE-2024-35650,0,0,f33c38cad6e11bb195fc26d62a75f01a9fccce582e365229ab2bb2ff6c150274,2024-06-12T17:51:20.710000 CVE-2024-35651,0,0,c9287fbb9cb515830b37c1bef0b65b054e85bcc17b4c30de254a80c2087d8a90,2024-06-06T13:31:03.307000 @@ -254957,7 +254958,7 @@ CVE-2024-36470,0,0,05049c8242b38f083734214f212efa24bf0b8e7684b3d943061a8cbb7c06a CVE-2024-36471,0,0,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000 CVE-2024-36472,0,0,2535bb51ccaa28f537e77e0ccd5fbdc4d19f82667f3e7465a3e9bc19e2a787a8,2024-05-28T17:11:47.007000 CVE-2024-36473,0,0,aa04ebf30531a2d8b8fe44f55c5d2b24e6cb3b712da23e42c688962416c1c553,2024-06-11T13:54:12.057000 -CVE-2024-36474,0,0,f8360981fc4df95882332b69b366adb0c5a2c3191dfdff8cad7211dda2f06b44,2024-10-04T13:50:43.727000 +CVE-2024-36474,0,1,7ad005bd9a04cbf097c2ce416fdaa71f889e9e92c15a3876dd5e047eb89637a9,2024-10-09T16:37:55.997000 CVE-2024-36475,0,0,3bfe32e61fee0f325d0a0c42cbb21fe74c2f37d1a00be99f11a322ba582b65cf,2024-09-27T17:50:00.430000 CVE-2024-36477,0,0,1d17ae62300b2d07c5941459ecfc6e574f91510a7910b453c64417a36e5b6766,2024-06-24T18:38:40.737000 CVE-2024-36478,0,0,d3d3e31a448c89c876d8752dd3d0a5ed214ab436e75114c562c846a5ae1724e2,2024-09-09T13:30:12.647000 @@ -255380,7 +255381,7 @@ CVE-2024-37151,0,0,8369ee3c4d467fa86763a95ad47c05c55ab1bf8ab2582315661b340a8d9a5 CVE-2024-37152,0,0,ac6f3acf11b3a1f516e05266cf8046e8001605f3fd121de5700d8dfd6dcff917,2024-09-18T12:51:04.430000 CVE-2024-37153,0,0,3e601aadc0030e22b67cf5ecc50e8ccc456d76da476705d4602850de1d2ba895,2024-06-07T14:56:05.647000 CVE-2024-37154,0,0,40ee9505a6683eeed6f3ae53fa200cad03875c0f73331677a172d9430e44e9a0,2024-06-07T14:56:05.647000 -CVE-2024-37156,0,1,a4629359601329a252e33b03a4ccc833dd9e2ce7a4a6bb980b335d8342668158,2024-10-09T15:08:29.647000 +CVE-2024-37156,0,0,a4629359601329a252e33b03a4ccc833dd9e2ce7a4a6bb980b335d8342668158,2024-10-09T15:08:29.647000 CVE-2024-37157,0,0,a07622f963d285fd9e3dcfe8c8c66929285017ffcec83ca71975fa9dd7c880ca,2024-09-18T13:50:23.367000 CVE-2024-37158,0,0,d89015f3d5c7061659d9d0607cd8f932d19692ba0c53081aaf8195c4a3e4e008,2024-06-20T12:44:22.977000 CVE-2024-37159,0,0,29983f96449420557db1b3112a95ba2589dbf1f20f2491176bacc2d05dea9576,2024-06-20T12:44:22.977000 @@ -258415,7 +258416,7 @@ CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d4217352 CVE-2024-41937,0,0,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000 CVE-2024-41938,0,0,3ab7c3a39df7962916b58b6a8012e354ce7c2e72731bfa6d3bfa597d2e12afa7,2024-08-14T18:08:42.777000 CVE-2024-41939,0,0,4183ed079a81e71abb2d3254aa5006833dc573353e4bf1b5fd01bacb1a530db3,2024-08-14T18:09:24.030000 -CVE-2024-4194,0,1,6ae263b26d43da2e432bc4ff1f4550ae0632b78109bfb03f8293ab65e841176e,2024-10-09T15:36:58.887000 +CVE-2024-4194,0,0,6ae263b26d43da2e432bc4ff1f4550ae0632b78109bfb03f8293ab65e841176e,2024-10-09T15:36:58.887000 CVE-2024-41940,0,0,40e39cb31395a424c750b6d477b3e11f54c783760fe9f9c2366bd9816127d23b,2024-08-14T18:10:36.097000 CVE-2024-41941,0,0,6dee954a53674120446bf0ba9e7fb56eb0512c8e3107ad9dd161c49f34e1aa23,2024-08-14T18:12:25.063000 CVE-2024-41942,0,0,7923ac40921d31d0296434cafefbd05115f6a6de46c0d45a5dcdea9f8a32742f,2024-08-12T15:53:27.457000 @@ -258719,7 +258720,7 @@ CVE-2024-42304,0,0,d173e622eb62d973d07785876ea39085958d8e911790210e06238340260b1 CVE-2024-42305,0,0,2a0027efaf18337e14a39532daab3b0d02ba1e240704105fd7925f4d1b755c9a,2024-08-19T12:59:59.177000 CVE-2024-42306,0,0,ecd4db3e8cdd17b10ea08b2eca0729317a2688c0bef58523ae201bb7d84633e3,2024-08-19T12:59:59.177000 CVE-2024-42307,0,0,979ad70f7e00ffa1bd38ea1452c16c437681ce079eb10d014525c56c5760da58,2024-09-05T17:49:58.257000 -CVE-2024-42308,0,1,339f346ac40e8283882a4326935ed708a24c237959aa0dd6a07f1a9db9ed6492,2024-10-09T14:15:05.227000 +CVE-2024-42308,0,0,339f346ac40e8283882a4326935ed708a24c237959aa0dd6a07f1a9db9ed6492,2024-10-09T14:15:05.227000 CVE-2024-42309,0,0,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000 CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000 CVE-2024-42310,0,0,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25caf0,2024-08-22T16:01:46.263000 @@ -258805,7 +258806,7 @@ CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000 CVE-2024-42412,0,0,7ea410a30890f641de68bc8b7a39cf35396bac17868b4fd498b764e1359ef0b7,2024-09-03T14:55:58.757000 -CVE-2024-42415,0,0,4839bf77179277d2cfa194bfc1f048a9b9d9e918e55805643fbe033d66c830d0,2024-10-04T13:50:43.727000 +CVE-2024-42415,0,1,54b88b1483f9dbb417e72d5eac636a64ce9431f976ae33821cfda8b39e97e793,2024-10-09T16:44:20.360000 CVE-2024-42416,0,0,0c0ba6b9334c7e838b8d455f49871ca47f5d5630f34ccb39214f945ba545086b,2024-09-05T21:25:09.273000 CVE-2024-42417,0,0,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475a69,2024-10-08T15:43:05.720000 CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001f8b,2024-09-04T18:22:22.583000 @@ -259130,6 +259131,7 @@ CVE-2024-42984,0,0,2fd3b2ae263fff500fb556980428a38b378e10c4993fb651d635c225d8b20 CVE-2024-42985,0,0,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000 CVE-2024-42986,0,0,0b2d204ff26f9eb28ce17ac6820e07d93d61424a006dadbf321ab643bf7229ed,2024-08-19T21:35:07.937000 CVE-2024-42987,0,0,78d20dcc8dedb262666f57c924ed05a38397e8611300fdadb69763919f535881,2024-09-03T18:35:13.793000 +CVE-2024-42988,1,1,3f16093180f911e5136d519c887e31cd87ab50274315abf8c9ce4b739afda740,2024-10-09T17:15:16.337000 CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000 CVE-2024-42991,0,0,d0804277ca8fdc9e2d163274c34d3a26e99fbaa9c60738b6b9568dd8b044fcf1,2024-09-03T19:40:46.783000 CVE-2024-42992,0,0,922ec86108ffde155b16bab8bce05d736126b3c84831d9a4ac12e72887280de3,2024-08-26T15:15:08.593000 @@ -259155,7 +259157,7 @@ CVE-2024-43040,0,0,1da4fee0ec9b26a667b61884070b050a8f4bcf13a2b21e01185cd5279abd3 CVE-2024-43042,0,0,d94e46af540f49a4f3c40e5f52dafd9243317a2003df44ac76bccf484c7eed66,2024-09-19T21:01:24.137000 CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000 CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000 -CVE-2024-43047,0,1,0d74f1bcc5dc754e35ff59d035ec7a934e6a0f15d06acedd36f35069ccd0e437,2024-10-09T14:39:06.540000 +CVE-2024-43047,0,0,0d74f1bcc5dc754e35ff59d035ec7a934e6a0f15d06acedd36f35069ccd0e437,2024-10-09T14:39:06.540000 CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000 CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000 CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000 @@ -259258,7 +259260,7 @@ CVE-2024-43246,0,0,44a65a28ca2af5cc21ed79f6503fa68b6cded6fd3bf6e91f921a120c96c44 CVE-2024-43247,0,0,220191dd10152667288134a16c89cbb59fca851cc3c6624699a29db3935ac221,2024-08-19T18:36:07.297000 CVE-2024-43248,0,0,37e2b8cca688a0234dda3a9dab634a52bdc30376015e490ed29d6343038e8a15,2024-09-06T16:32:16.687000 CVE-2024-43249,0,0,daa9c739bf37aa314068fc6a2bce3483193f437aa67d0043602d733ed9ca6ca0,2024-09-06T16:30:49.183000 -CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000 +CVE-2024-4325,0,1,89689cb57f32d08c6aded07ab6ed668978bcfa22d6491cc76a7248b12f0174d3,2024-10-09T16:04:49.597000 CVE-2024-43250,0,0,a841443f689b24b465816a01f105b6a5bcdc875b6da892ea807eb0553baf62d4,2024-09-06T16:02:16.067000 CVE-2024-43251,0,0,7154911118b81496671cf51187ef674b23ebccccdab2c0d297eb1629baa691c4,2024-09-17T18:10:36.453000 CVE-2024-43252,0,0,b771f9e76d477a6b132719a51019c908bb6489774cbaa7cda1dfd67b307e9d1d,2024-08-19T18:36:07.297000 @@ -259524,8 +259526,8 @@ CVE-2024-43567,0,0,dca2ed64951b773cb441fa0df76c09d4a6ffb9288788735af1e1694ac08fb CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 CVE-2024-43570,0,0,c865077bca30bc411c801500867ac03cfd59313735d06cc54e40b763efdd85b3,2024-10-08T18:15:24.207000 CVE-2024-43571,0,0,0541cb90a92aec766aef8dc533345697e7e87469ea5911e020c5fe9cab367e53,2024-10-08T18:15:24.400000 -CVE-2024-43572,0,0,edbf4cc0451928b418ac37d2733f21de9947ba66b2424b00c8249f1e1bca8c18,2024-10-09T01:00:01.157000 -CVE-2024-43573,0,0,704084f80e12465366651c358ebfdfd86e261d32e2e073a1f81d205625e617b4,2024-10-09T01:00:01.157000 +CVE-2024-43572,0,1,c5b6bd1c7b68b3e00edab28608ced1c7e955c66b71fc89c4003bd803ff137556,2024-10-09T16:16:45.687000 +CVE-2024-43573,0,1,978bcc99424be07b6f0df6c5ac3b8b33f48ee9c2dd0c03b05e841251af30fbdf,2024-10-09T16:16:42.877000 CVE-2024-43574,0,0,780ac4540971d435f138e8c561bf22e83d97229ce63df10bbd7e3e1d630f750e,2024-10-08T18:15:25.030000 CVE-2024-43575,0,0,76037003cd8b64321af240a28da28ffc57467669144e86a45af480a1ae2deea5,2024-10-08T18:15:25.257000 CVE-2024-43576,0,0,2165af1adc864de0f8da13303861fdda0fe9a0ee1d17c174d40ae96e64d63e3e,2024-10-08T18:15:25.450000 @@ -259550,6 +259552,7 @@ CVE-2024-43607,0,0,5f458719313c536779b7f852a701e553937f5de101b9bde414db93c04a1d6 CVE-2024-43608,0,0,6235a5e8784c2240d958b10c3d73e4530569bb747fbdf46aff0a30f02ca4282f,2024-10-08T18:15:28.813000 CVE-2024-43609,0,0,377909def4af2ca1ef787f374a0182997c7bcd0c588abb0ffcfb16e7e7675548,2024-10-08T18:15:29.037000 CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88ea,2024-05-21T12:37:59.687000 +CVE-2024-43610,1,1,57f15db62878ca34a5f82fd02c58e21b929e38de2183435b5f20d3c1c29018c8,2024-10-09T17:15:19.397000 CVE-2024-43611,0,0,f4185107e1249b2e85b5df0f7990610117f7d2f7f6f02a96001db70dae8e1bb1,2024-10-08T18:15:29.240000 CVE-2024-43612,0,0,71751df9a78b297053fffaff531feed0fdde3b9adb3c0ace2eb30d06578caaa9,2024-10-08T18:15:29.437000 CVE-2024-43614,0,0,645924067305a4dd4d40fc8e24630d2313c14b59a93aded31cb3537d38662a2a,2024-10-08T18:15:29.623000 @@ -260164,8 +260167,8 @@ CVE-2024-44947,0,0,80aee974cb8f526f49372964ac6e0ce27b8502cba5192c8bdb08e313a4596 CVE-2024-44948,0,0,b6624809fc4e7fad2ef29d7ebf62dc5527a907fa09ba4a21a20058ddaf98aede,2024-09-05T12:53:21.110000 CVE-2024-44949,0,0,b7b7622b983a3734466cfe3f2958346ada4afa05901a8b3e8d3a4caaf654fb3c,2024-10-09T13:53:32.513000 CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000 -CVE-2024-44950,0,1,5e42ef2a98099750242b4bcce4d058e90a98782e0666750e9b6b801f3fbcfe09,2024-10-09T14:21:16.773000 -CVE-2024-44951,0,1,d4df6b53659b4bf2ca95c9e72ed9fbab6343da2558ed206d0ca74ab61429319e,2024-10-09T14:27:43.973000 +CVE-2024-44950,0,0,5e42ef2a98099750242b4bcce4d058e90a98782e0666750e9b6b801f3fbcfe09,2024-10-09T14:21:16.773000 +CVE-2024-44951,0,0,d4df6b53659b4bf2ca95c9e72ed9fbab6343da2558ed206d0ca74ab61429319e,2024-10-09T14:27:43.973000 CVE-2024-44952,0,0,6abe9435eb01f0417ea6e45511928e929f498aad7a413484748a480c46e0c4ce,2024-09-06T16:37:38.370000 CVE-2024-44953,0,0,f2ec50e0309c43f7cf9bb2e776118a51e77c29a5f9b8c0285a1645b3f3d10a0b,2024-09-06T16:37:33.650000 CVE-2024-44954,0,0,31b5dfbb887da799bd2bd3ced4c927fc2ecea3232fc0eafa678eaf39c7e755f6,2024-09-05T12:53:21.110000 @@ -260209,7 +260212,7 @@ CVE-2024-44988,0,0,88c9242491758cb5cb40dacc794baa4f1069a31af76a02349607187c0ed57 CVE-2024-44989,0,0,f232cbe2cf85d26edc47089ff1f523369ffa3f6479342bd09b010a8ff52ddbe8,2024-09-06T16:31:22.253000 CVE-2024-4499,0,0,76c471af3c85399c41d057a036d2a12d52d3dc17ec6cbd4660af6d2299ed90b8,2024-09-13T16:01:19.483000 CVE-2024-44990,0,0,87bc0c256d1ef863849319b5a4078ee77f85507d6091a25f9ed554ccb2e112e7,2024-09-06T16:31:12.870000 -CVE-2024-44991,0,1,69eec0bb380a8754aee628a5bf38db8d970f8f66da3bb74dd5662c2dae9dd51b,2024-10-09T14:36:15.790000 +CVE-2024-44991,0,0,69eec0bb380a8754aee628a5bf38db8d970f8f66da3bb74dd5662c2dae9dd51b,2024-10-09T14:36:15.790000 CVE-2024-44992,0,0,97ef2dd55e50d283d25cb375a53b1b9e4ced48005c60f251c68cb5bcbe063f3e,2024-09-06T16:29:28.963000 CVE-2024-44993,0,0,83c20e8055b5f920fb8768cd48edd51dee49d28189ff000654e3b9aceca5b744,2024-09-06T16:28:49.180000 CVE-2024-44994,0,0,077657e93a1c5153a567e0a622109d3f9d5a912137e3785d416b4a628cffcce8,2024-09-05T12:53:21.110000 @@ -260220,11 +260223,11 @@ CVE-2024-44998,0,0,40b25cb37bb885401e69911af67b231d0343f60d965743732a0c70cf3b146 CVE-2024-44999,0,0,e380bf728dfa26ece10d7874c8b05bc3764e80af89ddf0e41877fbdc49e455a1,2024-09-06T16:27:51.890000 CVE-2024-4500,0,0,a407be114022fa5d45245610952c429e57739daa41702d131b7165fd39ef277f,2024-06-04T19:20:39.540000 CVE-2024-45000,0,0,79a57d7b11c85e25d75eaa2ad0e074d3c11bd38520cca8fd127bbed6b352c944,2024-09-06T16:27:31.003000 -CVE-2024-45001,0,1,ac9bd3390320e8ca9a3fe11fed004fd06bb89299d69d7d80038930223841990e,2024-10-09T14:49:39.953000 +CVE-2024-45001,0,0,ac9bd3390320e8ca9a3fe11fed004fd06bb89299d69d7d80038930223841990e,2024-10-09T14:49:39.953000 CVE-2024-45002,0,0,e2071222d816d9fc367eba910a87fa209d5c35705a0723b76f0ecea5701cdf74,2024-09-06T16:27:13.727000 -CVE-2024-45003,0,1,36ca1769672e598c2dc210fc95b60f8aa08bc5e737b87fbac0af8227acf0ff26,2024-10-09T15:07:31.027000 -CVE-2024-45004,0,1,d5de75be805a8110105bdfe9315ff6c75c624cb09132fe54b3a09eba3676223f,2024-10-09T15:19:15.813000 -CVE-2024-45005,0,1,914ddf2e7a60a00763ebf134debef88e308ac63315e4ad992b3e9320321ceff2,2024-10-09T15:30:03.767000 +CVE-2024-45003,0,0,36ca1769672e598c2dc210fc95b60f8aa08bc5e737b87fbac0af8227acf0ff26,2024-10-09T15:07:31.027000 +CVE-2024-45004,0,0,d5de75be805a8110105bdfe9315ff6c75c624cb09132fe54b3a09eba3676223f,2024-10-09T15:19:15.813000 +CVE-2024-45005,0,0,914ddf2e7a60a00763ebf134debef88e308ac63315e4ad992b3e9320321ceff2,2024-10-09T15:30:03.767000 CVE-2024-45006,0,0,5452c1a79742ccdebb367ec30c38e9d482e8d0678948443e98ba439908eac48e,2024-09-06T16:26:52.640000 CVE-2024-45007,0,0,9c51cc66379cf576bcd17f9e957329cedbd34ee23634a31bf340e6e230dd369f,2024-09-05T12:53:21.110000 CVE-2024-45008,0,0,37dc0718d2dd8ba9fb7eca159ff733be9b954368896d4dc7e665604ee4c36c7c,2024-09-05T12:53:21.110000 @@ -260308,21 +260311,21 @@ CVE-2024-45112,0,0,fe220e89b9c90418cf9256ec0d1a61e1fb615761854b12c59226a9746bbe3 CVE-2024-45113,0,0,9a4e89176a7b5c7d3845f7aafd6d39f3276ba5c23e86960f62b502204f186b6b,2024-09-13T16:56:53.673000 CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb546,2024-06-04T19:20:40.540000 CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000 -CVE-2024-45136,1,1,c9ad2ecb5aba03476e693f364218ac1e02907c0fc3349e68bd00e3e57272dbc9,2024-10-09T15:15:13.163000 -CVE-2024-45137,1,1,c532f6d28b470f19ed88150d3638d180f83be193ed8d709e9c53c69c0e6d2651,2024-10-09T15:15:13.373000 -CVE-2024-45138,1,1,9643d62ee569a15af59da4d4f77a741533114c7562d96218c0fbaa211e368315,2024-10-09T14:15:05.723000 -CVE-2024-45139,1,1,cbcf5efd84032046c32edff700f9e876f649b6cbfe5aa23904e94a43419fbfd1,2024-10-09T14:15:05.947000 +CVE-2024-45136,0,0,c9ad2ecb5aba03476e693f364218ac1e02907c0fc3349e68bd00e3e57272dbc9,2024-10-09T15:15:13.163000 +CVE-2024-45137,0,0,c532f6d28b470f19ed88150d3638d180f83be193ed8d709e9c53c69c0e6d2651,2024-10-09T15:15:13.373000 +CVE-2024-45138,0,0,9643d62ee569a15af59da4d4f77a741533114c7562d96218c0fbaa211e368315,2024-10-09T14:15:05.723000 +CVE-2024-45139,0,0,cbcf5efd84032046c32edff700f9e876f649b6cbfe5aa23904e94a43419fbfd1,2024-10-09T14:15:05.947000 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 -CVE-2024-45140,1,1,df4cd81f96f8444b21196a6bedce89f819ecd4b498ed204486540519a90dc290,2024-10-09T14:15:06.167000 -CVE-2024-45141,1,1,1fbf4d1f4e7cdfa6780ad6f5c4d7cc17bdfc9ca3d9f1200fb136b690aad804d9,2024-10-09T14:15:06.380000 -CVE-2024-45142,1,1,cca2a2d36f3a174f60fb893e7d834b5029d6fc31d6a5fea13111d6c379f3af88,2024-10-09T14:15:06.583000 -CVE-2024-45143,1,1,f53a00d9ea7fcf9e6680d47e9a33610e8a55c38027b5725cb1c2b87e282b756c,2024-10-09T14:15:06.783000 -CVE-2024-45144,1,1,c77cc8e3145c010c2698b406e4456870206bce15b9e6a16d5e1c20e3eeccc9b6,2024-10-09T14:15:06.973000 +CVE-2024-45140,0,0,df4cd81f96f8444b21196a6bedce89f819ecd4b498ed204486540519a90dc290,2024-10-09T14:15:06.167000 +CVE-2024-45141,0,0,1fbf4d1f4e7cdfa6780ad6f5c4d7cc17bdfc9ca3d9f1200fb136b690aad804d9,2024-10-09T14:15:06.380000 +CVE-2024-45142,0,0,cca2a2d36f3a174f60fb893e7d834b5029d6fc31d6a5fea13111d6c379f3af88,2024-10-09T14:15:06.583000 +CVE-2024-45143,0,0,f53a00d9ea7fcf9e6680d47e9a33610e8a55c38027b5725cb1c2b87e282b756c,2024-10-09T14:15:06.783000 +CVE-2024-45144,0,0,c77cc8e3145c010c2698b406e4456870206bce15b9e6a16d5e1c20e3eeccc9b6,2024-10-09T14:15:06.973000 CVE-2024-45145,0,0,b36d6bb4b4247eb059c115ad97c447cca0f70b08025fc2179ef91ba7e7a7f114,2024-10-09T10:15:03.283000 CVE-2024-45146,0,0,2a5b5a0d648806ca5e54b8bd1a0a8e9a0eaa835e972130f7015e02de53d4b2a8,2024-10-09T09:15:05.693000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-45150,0,0,bd12df0ca2dd5e008526d6f546a4cd15e1f7b87d2c471afa5048e25665848888,2024-10-09T09:15:06.210000 -CVE-2024-45152,1,1,148ff5ca6e5b548257f7595f40141b53f137dc764010dfe2834f6689ff458988,2024-10-09T14:15:07.183000 +CVE-2024-45152,0,0,148ff5ca6e5b548257f7595f40141b53f137dc764010dfe2834f6689ff458988,2024-10-09T14:15:07.183000 CVE-2024-45153,0,0,05c40a71199e1cd60b35af18f76fa03a1f83ce46a62e3e8f4fcd3f2716448b1e,2024-10-07T17:47:48.410000 CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000 CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000 @@ -260345,7 +260348,7 @@ CVE-2024-45175,0,0,4ada181a2aa083d471c5722f19453f1bfb3dcb4512c65292efacb2e8f687f CVE-2024-45176,0,0,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000 CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000 CVE-2024-45178,0,0,2894143084503cc7bb4d728541a98225973d7da963e85745983ffa8b8255b936,2024-09-05T17:44:56.007000 -CVE-2024-45179,0,1,b11e07ff02025f57194548ec28a9d4bc041b8822c6fcb2447bcedd8222dd668d,2024-10-09T14:35:11.783000 +CVE-2024-45179,0,0,b11e07ff02025f57194548ec28a9d4bc041b8822c6fcb2447bcedd8222dd668d,2024-10-09T14:35:11.783000 CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000 CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778caba,2024-09-13T19:55:54.477000 CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000 @@ -260467,7 +260470,7 @@ CVE-2024-45390,0,0,f118a2d25b69bf8b702fbe377dc1994f3c01013e248d64f677e301ab78b9e CVE-2024-45391,0,0,c0652f1ec0e9dea0f39468d3c42e674057f9b22af075a6d571376b54ca58cd8c,2024-09-12T20:13:30.917000 CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb2c0,2024-09-06T13:24:34.353000 CVE-2024-45393,0,0,6f436bc32d420db4f8aef33efc64d5a86243ff621c73802c298c0db31d80b7a3,2024-09-10T15:50:47.237000 -CVE-2024-45394,0,1,087a53dae86480e9cc9b0f35c92b2e1955ad080485b753f37f05c38b033a4e79,2024-10-09T15:15:13.600000 +CVE-2024-45394,0,0,087a53dae86480e9cc9b0f35c92b2e1955ad080485b753f37f05c38b033a4e79,2024-10-09T15:15:13.600000 CVE-2024-45395,0,0,5d56a4af61ec059101686b1e7cb37e5e2b811fdef7d02e3f80cc3ab9c9de60ec,2024-09-24T16:50:07.930000 CVE-2024-45398,0,0,7d0ffef7297178b253d2c7dc1d3134ea1f5d20b5e1c2ba29b34a3e96958f60bb,2024-09-25T19:20:52.527000 CVE-2024-45399,0,0,00e25ddf2914c9fa87aad2e5386f06040c0acda61d936c8ae5f89b710f3a24c9,2024-09-24T16:48:10.083000 @@ -260619,6 +260622,7 @@ CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000 CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000 +CVE-2024-45746,1,1,456fa8e435589edaec5c98ccc07b1ad6d4a9741267c9f2e15a199bdc3721ab2d,2024-10-09T17:15:19.727000 CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000 CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000 CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 @@ -260776,7 +260780,7 @@ CVE-2024-4620,0,0,1935a4a456c9356aa20baa9af9ee846c5d3912db31523d71d257746ce19dd7 CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa869820e,2024-07-03T02:07:50.963000 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 -CVE-2024-46237,1,1,05846efc047f2de6b417534734d2bcd13c80c1d7f999f8d8a5e5a6fc10c139f5,2024-10-09T14:15:07.393000 +CVE-2024-46237,0,0,05846efc047f2de6b417534734d2bcd13c80c1d7f999f8d8a5e5a6fc10c139f5,2024-10-09T14:15:07.393000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000 @@ -260794,11 +260798,15 @@ CVE-2024-46276,0,0,ba6c9d483af82dd2734a19e636bd58036683474d4934fc8937a305e4d99f4 CVE-2024-46278,0,0,7c449dca0e34520a80bfcea4a4b14e4c99ad837e71c1a2aabcd089bc8aa094e7,2024-10-07T20:35:10.653000 CVE-2024-46280,0,0,5a66b7ecdcd76d807c972a7ebea94a8133453c4877426c1300bbe2a7c6b81c87,2024-10-04T13:51:25.567000 CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000 +CVE-2024-46292,1,1,f668f35c9b3105a8ea4bc1a94ed9ac067bfb233c64e60de0b61e9f5339b6f0a3,2024-10-09T17:35:14.650000 CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a658f3,2024-10-04T13:51:25.567000 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 CVE-2024-46300,0,0,d1242a191b8ea8c2a0e9fbab7765f3d208830dd828d323e4edc4853d2473356e,2024-10-07T20:35:11.433000 +CVE-2024-46304,1,1,96095ed337116946e5acca0eb123cf46ee1e55f00555905587d08c10792565a6,2024-10-09T17:35:15.410000 +CVE-2024-46307,1,1,6ffb598605114a173ded49ed58aae98ef342192a18e7da411800d735c286818d,2024-10-09T17:15:19.813000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2b0a,2024-10-04T13:51:25.567000 +CVE-2024-46316,1,1,ec0f4e5c0079d4f3b513de5d4dd078b5d39c2e0a7212bd0e408b43bf21df5059,2024-10-09T16:15:04.487000 CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000 CVE-2024-46325,0,0,2552c217f6f2bafd1ae497da9a6104efc7773541d10c748bee2c01ded062ab22,2024-10-08T19:35:19.850000 CVE-2024-46327,0,0,d444c66c2d1131cacb5a6cc939ae8062aae08f60f0b531cdd6bc43039126a6e8,2024-09-30T12:46:20.237000 @@ -260827,7 +260835,7 @@ CVE-2024-46394,0,0,2516725e4bff704e46174a8f5632e7834a8075c579df9c6725759cf5ecdad CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000 CVE-2024-46409,0,0,aba2a412f8aa901356da8f12961372170796df83780b5d94df8dbeba2142d0ca,2024-10-07T19:37:28.597000 CVE-2024-4641,0,0,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000 -CVE-2024-46410,0,1,e37b825c118d0badc3497db4099a453a8428aa68e6f305ea5a190a15df7a463d,2024-10-09T15:35:16.780000 +CVE-2024-46410,0,0,e37b825c118d0badc3497db4099a453a8428aa68e6f305ea5a190a15df7a463d,2024-10-09T15:35:16.780000 CVE-2024-46419,0,0,75fafdfe43d678734223982a9d05d92176b9e138ef313759af24f79de1b289e9,2024-09-17T14:35:29.797000 CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000 CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe250aa,2024-09-17T14:35:30.557000 @@ -261108,13 +261116,13 @@ CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073 CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000 CVE-2024-46830,0,0,5a3220ccf0c3370380e51de1b5caff7b25885a9b9d75271a4ec592a9375f4960,2024-09-30T12:45:57.823000 CVE-2024-46831,0,0,14ae7f8e12870e945bdd58f18dc055e43068d59dc30de785d452dc677b096ef6,2024-10-02T14:26:13.807000 -CVE-2024-46832,0,1,9500a561ec78ff70567a5cc792b2712d0a90a52a1b57ccb55aa0f5ab873d1295,2024-10-09T15:51:20.700000 -CVE-2024-46833,0,1,0657a308e2ddf0f454bb83e3a67da91f0da06f0ae1cfdb4b1ba3cc3dae938ca0,2024-10-09T15:54:38.123000 -CVE-2024-46834,0,1,8cdcb26ce2103f4b18e883e0751a3cfdb0ebf9fdfff4b0a206fabac240ad13f2,2024-10-09T15:57:03.037000 +CVE-2024-46832,0,0,9500a561ec78ff70567a5cc792b2712d0a90a52a1b57ccb55aa0f5ab873d1295,2024-10-09T15:51:20.700000 +CVE-2024-46833,0,0,0657a308e2ddf0f454bb83e3a67da91f0da06f0ae1cfdb4b1ba3cc3dae938ca0,2024-10-09T15:54:38.123000 +CVE-2024-46834,0,0,8cdcb26ce2103f4b18e883e0751a3cfdb0ebf9fdfff4b0a206fabac240ad13f2,2024-10-09T15:57:03.037000 CVE-2024-46835,0,0,496f6218adc12a648799c8b8c9fb7dccdd2a7aad915e4acf068fab956eb83221,2024-10-02T14:24:18.930000 -CVE-2024-46836,0,1,74488ada38ec497002521c9faf54bb1d7745eed8cb6dc7f7cb5bd765a36cb57a,2024-10-09T15:47:55.187000 -CVE-2024-46837,0,1,217cb2bb3445379df9f064d6538fba86473ccedfb65164c97c110a9bee3668da,2024-10-09T15:37:51.653000 -CVE-2024-46838,0,1,d507066230d2b254b460338a0577f5ec9be3592ff943ff3fd03d5da3f91fa3ad,2024-10-09T15:35:40.827000 +CVE-2024-46836,0,0,74488ada38ec497002521c9faf54bb1d7745eed8cb6dc7f7cb5bd765a36cb57a,2024-10-09T15:47:55.187000 +CVE-2024-46837,0,0,217cb2bb3445379df9f064d6538fba86473ccedfb65164c97c110a9bee3668da,2024-10-09T15:37:51.653000 +CVE-2024-46838,0,0,d507066230d2b254b460338a0577f5ec9be3592ff943ff3fd03d5da3f91fa3ad,2024-10-09T15:35:40.827000 CVE-2024-46839,0,0,7b51c4cc9b8a1c4a261c35ca96d6737e1e24401d36c8422399074bd4a21b2f9b,2024-10-01T14:15:06.340000 CVE-2024-4684,0,0,76a2bcc81dc9a2c7f19544710090eea770016f263f5b8a63e7b8f826540bfd29,2024-06-04T19:20:46.347000 CVE-2024-46840,0,0,438fd38490f62196b9d4e802a4fa3ae68601a2b59be87ff1c08d24b5019a29c3,2024-10-08T18:15:07.857000 @@ -261150,8 +261158,8 @@ CVE-2024-46867,0,0,8316d7997f273d3e067642701a8234592f3f2c26a3648af1f12dc5cbdd0c2 CVE-2024-46868,0,0,f9213706fab3b425fd6d7b9c70ceaf5cede666ff7057d8fa56ee82d754aa07ed,2024-10-01T17:09:12.247000 CVE-2024-46869,0,0,9ed81572871432f968131373b48d9116fc414e30c1ec7495d6906513924c285a,2024-10-04T13:51:25.567000 CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000 -CVE-2024-46870,1,1,90be454f5a67963fcb2bbabf3e103ed373cbdda5cfc2cdef366d8e6183adc0ee,2024-10-09T14:15:07.463000 -CVE-2024-46871,1,1,00f34a2352ea79ff1dec46c62c2c48b695bb8fa1ffe78878af3d5d1dc93c9cd4,2024-10-09T14:15:07.533000 +CVE-2024-46870,0,0,90be454f5a67963fcb2bbabf3e103ed373cbdda5cfc2cdef366d8e6183adc0ee,2024-10-09T14:15:07.463000 +CVE-2024-46871,0,0,00f34a2352ea79ff1dec46c62c2c48b695bb8fa1ffe78878af3d5d1dc93c9cd4,2024-10-09T14:15:07.533000 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 CVE-2024-46886,0,0,8812d7e0ae6eb3236a15932b28dac95e2f77493c42909a76273589345ce9985c,2024-10-08T09:15:16.093000 CVE-2024-46887,0,0,33dfbb906ebcdd01d3cef078ce0ea7a694b53a51dbcf757cb80c0210bf26b788,2024-10-08T09:15:16.447000 @@ -261415,11 +261423,11 @@ CVE-2024-47418,0,0,081d746b22ffbdd8b799f4808bc76cae4e08fb9d14d385d0abe1cc0263249 CVE-2024-47419,0,0,d0cdbf286fc8933dcd9ef23a66fbcd5cbbdaedc63b14e3dd36cddcd2ce86eaa5,2024-10-09T10:15:06.480000 CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000 CVE-2024-47420,0,0,afe9fbe4da6181dcdd330642f5b24efa9bc0934e4a84c41f7c49815b4e444f73,2024-10-09T10:15:06.660000 -CVE-2024-47421,1,1,6433718b22c64e45a15e357f80762897f0b97ca861801403a54dfd0a40c3b69b,2024-10-09T15:15:13.977000 -CVE-2024-47422,1,1,6c57ef28a033da5fb7d439dc1de859b5468b9b46b8d3e1c2003c1a7d038cbe94,2024-10-09T15:15:14.190000 -CVE-2024-47423,1,1,44d9e50eef595133c36acd765dc0a35bcdb6b783e5decebaf3b7ab2633a7eb9b,2024-10-09T15:15:14.393000 -CVE-2024-47424,1,1,ad14d22a114b20d100eebde077c3ae2b5c530cf19b46cde5bb4e2ff294d934e6,2024-10-09T15:15:14.600000 -CVE-2024-47425,1,1,b75ace915d3c0ef7facc3d9fae16195a7924da3b6b229bd755ff1d9daf6362b0,2024-10-09T15:15:14.800000 +CVE-2024-47421,0,0,6433718b22c64e45a15e357f80762897f0b97ca861801403a54dfd0a40c3b69b,2024-10-09T15:15:13.977000 +CVE-2024-47422,0,0,6c57ef28a033da5fb7d439dc1de859b5468b9b46b8d3e1c2003c1a7d038cbe94,2024-10-09T15:15:14.190000 +CVE-2024-47423,0,0,44d9e50eef595133c36acd765dc0a35bcdb6b783e5decebaf3b7ab2633a7eb9b,2024-10-09T15:15:14.393000 +CVE-2024-47424,0,0,ad14d22a114b20d100eebde077c3ae2b5c530cf19b46cde5bb4e2ff294d934e6,2024-10-09T15:15:14.600000 +CVE-2024-47425,0,0,b75ace915d3c0ef7facc3d9fae16195a7924da3b6b229bd755ff1d9daf6362b0,2024-10-09T15:15:14.800000 CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 @@ -261507,24 +261515,24 @@ CVE-2024-47654,0,0,c063b2ef86115a996655e38ded9b00a5dbd609aea4e515001d1d61acc0e2d CVE-2024-47655,0,0,38268467637f3433ead865c4d53b98effdf5ad06b5c2f799470b492b88830a71,2024-10-04T13:50:43.727000 CVE-2024-47656,0,0,7a20585ec39bccdb1c36f63c7ddc6799bb573e47e81f7253c1057fbfa3e19cb8,2024-10-04T13:50:43.727000 CVE-2024-47657,0,0,fd6e9fac7740c0df68f13821033b31ca3440e5b3cb2262623db7046370d07e4d,2024-10-04T13:50:43.727000 -CVE-2024-47658,1,1,c7e7925d7623f0768c67ed5f8f020314ca2dcb81c77a7d845a862e4e1ad0d2a0,2024-10-09T14:15:07.603000 -CVE-2024-47659,1,1,381f593f3b1280f829daa31f9de252426c8f80a6ebf55c9d1f61889a94109836,2024-10-09T14:15:07.660000 +CVE-2024-47658,0,0,c7e7925d7623f0768c67ed5f8f020314ca2dcb81c77a7d845a862e4e1ad0d2a0,2024-10-09T14:15:07.603000 +CVE-2024-47659,0,0,381f593f3b1280f829daa31f9de252426c8f80a6ebf55c9d1f61889a94109836,2024-10-09T14:15:07.660000 CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000 -CVE-2024-47660,1,1,9f3e07e90c92a7cbb5ef6f85df2fd46e09c8a93ac4a27050d9830bd485257194,2024-10-09T14:15:07.730000 -CVE-2024-47661,1,1,589a3cd7eefd1bd48b7b590edb2e191028e38bad9c88da20865f4bee9c91e3ce,2024-10-09T15:15:15.020000 -CVE-2024-47662,1,1,56aab1a32d009dc785a60670614930b6b076a1f81d9fd782b6db102addff7ee1,2024-10-09T15:15:15.080000 -CVE-2024-47663,1,1,6374438e04ec6a4a2d038ae8bb709028960f71dc5c35b6eaa8d9498201c9b7c0,2024-10-09T15:15:15.150000 -CVE-2024-47664,1,1,b3371f5879bddc180255d808e4e8b3ebe53f62fdbec7442d8bfc651cac388fc7,2024-10-09T15:15:15.223000 -CVE-2024-47665,1,1,000f9f0d0ea35ebd91903a578c8aa6a224f3377cde860a2fbffaaacb0b3a24f4,2024-10-09T15:15:15.290000 -CVE-2024-47666,1,1,a1dccb6193925f591a887bc2ef23954e0e8d82af8c4a152a3fae5dad3ad4c229,2024-10-09T15:15:15.353000 -CVE-2024-47667,1,1,93fcd57a9e0833a47dd493be470518545169a4224f6cafb9c87bf70f91fb341d,2024-10-09T15:15:15.430000 -CVE-2024-47668,1,1,19b02ef43944d24db7bd00db3b9f4d4a0e446ab95bc898b4ee8d896d0bbea179,2024-10-09T15:15:15.513000 -CVE-2024-47669,1,1,a9a7f12e358926fcfce008f4f9e88f484b78dc546d08cf3c13bdf3549c6f3bf7,2024-10-09T15:15:15.590000 +CVE-2024-47660,0,0,9f3e07e90c92a7cbb5ef6f85df2fd46e09c8a93ac4a27050d9830bd485257194,2024-10-09T14:15:07.730000 +CVE-2024-47661,0,0,589a3cd7eefd1bd48b7b590edb2e191028e38bad9c88da20865f4bee9c91e3ce,2024-10-09T15:15:15.020000 +CVE-2024-47662,0,0,56aab1a32d009dc785a60670614930b6b076a1f81d9fd782b6db102addff7ee1,2024-10-09T15:15:15.080000 +CVE-2024-47663,0,0,6374438e04ec6a4a2d038ae8bb709028960f71dc5c35b6eaa8d9498201c9b7c0,2024-10-09T15:15:15.150000 +CVE-2024-47664,0,0,b3371f5879bddc180255d808e4e8b3ebe53f62fdbec7442d8bfc651cac388fc7,2024-10-09T15:15:15.223000 +CVE-2024-47665,0,0,000f9f0d0ea35ebd91903a578c8aa6a224f3377cde860a2fbffaaacb0b3a24f4,2024-10-09T15:15:15.290000 +CVE-2024-47666,0,0,a1dccb6193925f591a887bc2ef23954e0e8d82af8c4a152a3fae5dad3ad4c229,2024-10-09T15:15:15.353000 +CVE-2024-47667,0,0,93fcd57a9e0833a47dd493be470518545169a4224f6cafb9c87bf70f91fb341d,2024-10-09T15:15:15.430000 +CVE-2024-47668,0,0,19b02ef43944d24db7bd00db3b9f4d4a0e446ab95bc898b4ee8d896d0bbea179,2024-10-09T15:15:15.513000 +CVE-2024-47669,0,0,a9a7f12e358926fcfce008f4f9e88f484b78dc546d08cf3c13bdf3549c6f3bf7,2024-10-09T15:15:15.590000 CVE-2024-4767,0,0,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000 -CVE-2024-47670,1,1,afd53e5823970a142ba903c187b1a50f79323fbb628d3d9ac580ae16795b4c1a,2024-10-09T15:15:15.673000 -CVE-2024-47671,1,1,3cc5a20734d8279f03afcc664859b0157c6bbaf02410c89dc2cba6c08808aa01,2024-10-09T15:15:15.753000 -CVE-2024-47672,1,1,41a31ad2a96d5ad8daffaee8965f85d768314e1c4f67e7960c1d777001786e00,2024-10-09T15:15:15.827000 -CVE-2024-47673,1,1,08e0694ce8ba590faa47f709e66b3e60d25c2585ef6f17beb774e4608af676cd,2024-10-09T15:15:15.900000 +CVE-2024-47670,0,0,afd53e5823970a142ba903c187b1a50f79323fbb628d3d9ac580ae16795b4c1a,2024-10-09T15:15:15.673000 +CVE-2024-47671,0,0,3cc5a20734d8279f03afcc664859b0157c6bbaf02410c89dc2cba6c08808aa01,2024-10-09T15:15:15.753000 +CVE-2024-47672,0,0,41a31ad2a96d5ad8daffaee8965f85d768314e1c4f67e7960c1d777001786e00,2024-10-09T15:15:15.827000 +CVE-2024-47673,0,0,08e0694ce8ba590faa47f709e66b3e60d25c2585ef6f17beb774e4608af676cd,2024-10-09T15:15:15.900000 CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000 CVE-2024-4769,0,0,27e569a8d015b1733830e438c3e7532f74e5dc1a595d9d72a9cda524aaf6545e,2024-07-03T02:08:05.617000 CVE-2024-4770,0,0,9501f8bb52643b4bcadd7b11da17e463cda395ec382733177c6b60e7ef1c0b7b,2024-08-01T13:59:34.293000 @@ -261727,7 +261735,7 @@ CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b6 CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000 CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150c3,2024-06-11T17:08:33.350000 CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000 -CVE-2024-4941,0,0,13ca0e2a0167ec0b910e07ee313a5634910f0ad60753924b6a13637e3feff21f,2024-06-07T14:56:05.647000 +CVE-2024-4941,0,1,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000 CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000 CVE-2024-4943,0,0,c3255ca69e7d3076031772cbfca36198fc76d9c4ad7b4e1b0b2d1944b2bfd408,2024-05-21T12:37:59.687000 CVE-2024-4944,0,0,4c179510d1e03e5badefb2baa5976b22075fd8af2558d89d09a0401516cd83b3,2024-08-22T15:06:05.480000 @@ -261930,7 +261938,7 @@ CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da64 CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000 CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000 -CVE-2024-5179,0,0,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000 +CVE-2024-5179,0,1,ea665152b8c9953ad6e84eb904f7eac78af7e075a45f2a4da51451b13f6b9cb3,2024-10-09T16:57:08.317000 CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000 CVE-2024-5182,0,0,58b8232fd0b5e70f15eeeb5297ff44723ef92c555fd120d8b123a01ca786d63b,2024-08-27T17:30:21.127000 CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000 @@ -262024,7 +262032,7 @@ CVE-2024-5273,0,0,587a2914e0f865c25d5d15e724064b1f4f9344cb8686d6dfb37e01c9b03ba6 CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000 CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000 CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000 -CVE-2024-5277,0,1,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000 +CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000 CVE-2024-5278,0,0,070492ef57b88214566344e89a28a1f0ef4d4f18184d616c40ab3876a3b57140,2024-06-07T14:56:05.647000 CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000 CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000 @@ -262187,7 +262195,7 @@ CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3 CVE-2024-5449,0,0,c1e6c0786c1e275f994246efd4bba7bddfb8ded5af596514af2741d165623e37,2024-07-24T17:47:44.637000 CVE-2024-5450,0,0,ba91201206f4a01e8e7a35ee2afdc8918b7d2b1fa73a9e73f31dd44f37e43122,2024-08-01T13:59:46.483000 CVE-2024-5451,0,0,2896975541f1deb7d32c27fb696c9ed10757c5f40f89d620628d7346403ef637,2024-06-25T18:50:42.040000 -CVE-2024-5452,0,1,66b11dbcfebac0ddad18aec12cabfef89f1afc1497c8d7d493f48d7decc8e4fe,2024-10-09T14:57:27.450000 +CVE-2024-5452,0,0,66b11dbcfebac0ddad18aec12cabfef89f1afc1497c8d7d493f48d7decc8e4fe,2024-10-09T14:57:27.450000 CVE-2024-5453,0,0,b20a0834ca5689b452f6b7173de63ab33385cf72d5d8c59a0cf15e703dd6a33b,2024-06-11T17:34:52.263000 CVE-2024-5455,0,0,504a2312040d893e95d789f867e1d4122509ea9da589bac420b384edcb7af3cf,2024-07-17T13:46:09.660000 CVE-2024-5456,0,0,4fbbd7e22723b0ac292a15510bd5e2f1843cb88c35dba173a43ab7680f62380a,2024-07-09T18:19:14.047000 @@ -262211,7 +262219,7 @@ CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000 CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000 CVE-2024-5481,0,0,32222ebb3f7a972393fb918a0cdb6b7e38cf91a107006665f6c1b1bad41a3e4f,2024-06-11T18:00:09.740000 -CVE-2024-5482,0,0,3b1b42d732a855ed8e91ef26579f45fec6ebdee965d18872f2c0403904f8cdcc,2024-06-07T14:56:05.647000 +CVE-2024-5482,0,1,eb50f0cf1a3120c83387a4df17ab7c63b8028866e5ff820042c21cc93bde6e0f,2024-10-09T16:12:24.527000 CVE-2024-5483,0,0,2e97255179d42c1fdc159b28df8a118b6b7a66fe00e7310d283bd122fc23ff3b,2024-06-11T17:19:17.143000 CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,5ff776ceb9b311264eb0a3fd1aecab1cf4920b9e3fce511521464a36e3b91a61,2024-06-04T16:57:41.053000 @@ -263691,9 +263699,9 @@ CVE-2024-7288,0,0,ce128fba82f710d2fd0c96fce3ed58ae6ba7550cb19d04b8a2d7b8e427ff3a CVE-2024-7289,0,0,6b18fe26b5b26ad6475bd507b3c2a7b6582d96d6d346bf45be6ab6646e91fd65,2024-08-13T14:53:09.637000 CVE-2024-7290,0,0,b7cc572b30062b1b5d10bc08d69cddffa31fb5f05e0fc8c35fce33ff6506b95c,2024-08-13T14:53:34.777000 CVE-2024-7291,0,0,298cd3a818c66e9bf797d2d090f42649293656283b8daab213f19385b28931e8,2024-08-05T12:41:45.957000 -CVE-2024-7292,1,1,10e293cdee1e14c92b7e83a936b36346b8d213d5cae5479bf4063a49d757bc18,2024-10-09T15:15:15.970000 -CVE-2024-7293,1,1,830a171bb1269d079493f3fb1fe19f9bdadcafcb676ceb9ee2a6b1f12bb25407,2024-10-09T15:15:16.200000 -CVE-2024-7294,1,1,57635030dd3bfcb9bd930056db2f8844c562f10b822862ca673dbdcb1b7550dd,2024-10-09T15:15:16.463000 +CVE-2024-7292,0,0,10e293cdee1e14c92b7e83a936b36346b8d213d5cae5479bf4063a49d757bc18,2024-10-09T15:15:15.970000 +CVE-2024-7293,0,0,830a171bb1269d079493f3fb1fe19f9bdadcafcb676ceb9ee2a6b1f12bb25407,2024-10-09T15:15:16.200000 +CVE-2024-7294,0,0,57635030dd3bfcb9bd930056db2f8844c562f10b822862ca673dbdcb1b7550dd,2024-10-09T15:15:16.463000 CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000 CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000 CVE-2024-7300,0,0,ec5bc420e71b7c17438e33b04329f442535c8be80d5b4025cfe5a0c36aea8bb7,2024-08-19T14:15:23.360000 @@ -264133,7 +264141,7 @@ CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277 CVE-2024-7836,0,0,7e60d885d310741686f6c1eeb7bb5889e64eb59bcb33504b8c9e01388f42accf,2024-09-27T12:53:58.200000 CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000 CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 -CVE-2024-7840,1,1,3d047537f440a51481e8ca0bc0fb1a7a2f8b60d7801b5e19f56ef246f0737240,2024-10-09T15:15:16.687000 +CVE-2024-7840,0,0,3d047537f440a51481e8ca0bc0fb1a7a2f8b60d7801b5e19f56ef246f0737240,2024-10-09T15:15:16.687000 CVE-2024-7841,0,0,30d01d8bbe3d144bba2b7827240fa327034b88590168a3760f5fd6645e24392a,2024-08-21T14:12:12.943000 CVE-2024-7842,0,0,6f597ddda6138d9acc81d07fc2eafe7775fb8cb17d6e8df28c226b7f95417689,2024-08-21T14:13:38.923000 CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca1839,2024-08-21T14:13:11.157000 @@ -264265,8 +264273,8 @@ CVE-2024-8006,0,0,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db CVE-2024-8007,0,0,31efab1ff2bdd67996604f02ecd2084f262495a161d3f96e0300d65972c02a8d,2024-09-23T17:15:13.813000 CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000 CVE-2024-8012,0,0,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000 -CVE-2024-8014,1,1,8010f34247a3098f4015e0db98ec51e47b6deee7f9f8eb01a840ccf2728becb9,2024-10-09T15:15:16.883000 -CVE-2024-8015,1,1,c8ddc6ab2a275b576a5d1df1610c5a2969775aa218269aeac45710287223b3a5,2024-10-09T15:15:17.097000 +CVE-2024-8014,0,0,8010f34247a3098f4015e0db98ec51e47b6deee7f9f8eb01a840ccf2728becb9,2024-10-09T15:15:16.883000 +CVE-2024-8015,0,0,c8ddc6ab2a275b576a5d1df1610c5a2969775aa218269aeac45710287223b3a5,2024-10-09T15:15:17.097000 CVE-2024-8016,0,0,2657510d64afe84d5852969b1e9344475f01e752907a5430dff930bc1f486129,2024-09-03T14:51:16.470000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 @@ -264284,7 +264292,7 @@ CVE-2024-8044,0,0,61e1bceca8faf5a6cfa821e4bfd7d9ccef26e7d775d42e669a954225ae8e5d CVE-2024-8045,0,0,4f33bec2129e516f0590350db62def0ffeb2e64cb03de1e46d8b3d52953002f0,2024-09-25T19:22:03.157000 CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000 CVE-2024-8047,0,0,b09ff33da28d13c746e9dd8622cb16da9ea9a8911cc13c3fef8877b81efca550,2024-09-27T21:25:08.523000 -CVE-2024-8048,1,1,00054d1c6f6a9e6dd763dae957e150d3317721cb4154b6397664d36e193bf881,2024-10-09T15:15:17.317000 +CVE-2024-8048,0,0,00054d1c6f6a9e6dd763dae957e150d3317721cb4154b6397664d36e193bf881,2024-10-09T15:15:17.317000 CVE-2024-8051,0,0,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934c5,2024-09-27T18:19:41.863000 CVE-2024-8052,0,0,d36ff2157e56024767ea82c9c1b8c76ab39601d237dbfd50c7fb1e6eeba7daeb,2024-09-27T16:55:57.383000 CVE-2024-8054,0,0,f7372d07d80e2782b99a1ec78381d10ed3eddb2361d69efd0f5544951feb686d,2024-09-27T21:29:57.607000 @@ -264856,7 +264864,7 @@ CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000 -CVE-2024-8983,0,0,f0ea9da5ebf59a485ddd81e417437f9b578ee5729e6aaf8f07778c3ac59a8a2a,2024-10-08T06:15:02.490000 +CVE-2024-8983,0,1,b5ad10e9e9fe7aabd9cdc2054c7af15f8a7e59c36886f8fb214efeae5019cab1,2024-10-09T16:35:09.290000 CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000 CVE-2024-8989,0,0,caae46233d26ee2b67df93becf3adf518208e6bbacfb542b8b2dd6d9f605994c,2024-10-04T13:51:25.567000 CVE-2024-8990,0,0,ebe58ed4a084d59384bf44303a373b31562e7163a1320c584d218212811f287c,2024-10-04T13:51:25.567000 @@ -264873,7 +264881,7 @@ CVE-2024-9009,0,0,8ca9aa7668c5d5c77c4f8dc75f965a1fc61562deadeb769eddb6e3d475ae86 CVE-2024-9011,0,0,31757df34dd4fee90035c8c1e734eec12ab6ab10926115bc714ff7e9ad5eeaab,2024-09-25T17:48:14.820000 CVE-2024-9014,0,0,a8e29b928e7c02e09a31b50dee33eaa8cea5cb50c9cc022c5089f67468915a88,2024-09-26T13:32:55.343000 CVE-2024-9018,0,0,e176c873e94bd3e2c4b29c05a28da23ed581266b7e7463040882baa285f3a6c4,2024-10-07T19:20:48.293000 -CVE-2024-9021,0,0,0bef421d77ccd7d579461a0ddfe317af0ec0cde75efa85454e6303c09714e592,2024-10-08T06:15:02.693000 +CVE-2024-9021,0,1,93698023032d4eb246e479be9f6d24aecd12130762d8d7646a36600ee90ad452,2024-10-09T16:35:09.457000 CVE-2024-9023,0,0,8856d7ffdca739d2c0d1b85fb1ee05faeaf6947167077ac20feaa24f6c509db2,2024-10-01T14:39:38.370000 CVE-2024-9024,0,0,29f2f073ee82aef300cee3fd954ac6dc4243aa67d5082fca2a65737992da04c1,2024-10-02T18:02:59.683000 CVE-2024-9025,0,0,8c34a0621e4e149deefb96042ae2c7c0174789fb7b5db2c9c1ef1c4077be46cb,2024-10-01T13:44:23.667000 @@ -264994,7 +265002,7 @@ CVE-2024-9281,0,0,c727181324f48d332ad9d5a9c59aeaca5ded3de24b59d196d37c8fad927c50 CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843fce,2024-10-04T18:33:38.293000 CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000 -CVE-2024-9286,1,1,4420cd04b235e214121fb32ef8ac538bba1103645d2000de9ff6496dd6614897,2024-10-09T14:35:12.913000 +CVE-2024-9286,0,0,4420cd04b235e214121fb32ef8ac538bba1103645d2000de9ff6496dd6614897,2024-10-09T14:35:12.913000 CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000 CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000 CVE-2024-9292,0,0,1dc4c8842dee86f27be3f18468601778bd93091d71bf3712c664e494938097d8,2024-10-08T06:15:02.773000 @@ -265075,6 +265083,16 @@ CVE-2024-9449,0,0,a97c6d10c8b04c0b2ba9306e37a8440eda5112028d07f60f30bea1d9431c3f CVE-2024-9451,0,0,61aa4f71fe0ab792c97d101a7739a4f3bc5141915892cc9a79adc1735531429e,2024-10-09T08:15:05.160000 CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 +CVE-2024-9463,1,1,0ee19fedca19bee0e7b33506ffb5e9f1133651942238f2a8ab190c3110df9a8c,2024-10-09T17:15:19.973000 +CVE-2024-9464,1,1,decabf11891e8d6957ed2100e25b9b071555aa6bb099338ef08362234d545b18,2024-10-09T17:15:20.170000 +CVE-2024-9465,1,1,c1362683529b56c77eb6e63f3cc609da7998fec9215e0e8e29015777ab0ae535,2024-10-09T17:15:20.287000 +CVE-2024-9466,1,1,09c9a12020e6596ac1fde266827047a56272aca5937181d3269aa14a2ab90eb5,2024-10-09T17:15:20.400000 +CVE-2024-9467,1,1,e0aca1273987e727ec4e97dfe1bf13684e49f93a4de7d62ac03fba0b190fc98d,2024-10-09T17:15:20.517000 +CVE-2024-9468,1,1,8e6702e737f362c6fdcd36eca73fc028c9f11c62bfa56f22d75f735e050539c8,2024-10-09T17:15:20.637000 +CVE-2024-9469,1,1,d9b6f661b9e1322b3b093a5ae970d853aa8691c848e351552d3696e45e6311d1,2024-10-09T17:15:20.770000 +CVE-2024-9470,1,1,0797df17ec09d3f69674ab049b6f850a5388d56caf69a4c5de1caee228001ca0,2024-10-09T17:15:20.907000 +CVE-2024-9471,1,1,5c85e26a255195a2b8178ac9ccac4f652d703ef47327213ff2979210ae308091,2024-10-09T17:15:21.090000 +CVE-2024-9473,1,1,fb59c7f42b76f069513bc8197e933394d06e8e6b1a793f603483982a8fa6a0d6,2024-10-09T17:15:21.230000 CVE-2024-9481,0,0,d47799c935f3894a1eb77a57851e2857614dcde60b18ca54bd2e7df5819c5f83,2024-10-04T13:50:43.727000 CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c7e,2024-10-04T13:50:43.727000 CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000 @@ -265114,13 +265132,13 @@ CVE-2024-9571,0,0,875a4a44417fabed8eda23f7f9f70cde202fd7e807f9d44c2058c5256366a8 CVE-2024-9572,0,0,6aa8ec5096cffb49c05ffcb187e769f5454844eed5ebf1e91e8e45ef57650b96,2024-10-08T18:45:03.117000 CVE-2024-9573,0,0,58c75dd5695e86f3dd5971604e3d0b5f4fa9518dd900d56e54c2dcc37c5c3326,2024-10-08T18:45:09.057000 CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df72,2024-10-08T18:45:13.147000 -CVE-2024-9575,0,1,5319fb13c91be15843abb76d87e6d17457d37aebb68186f1a71e2b47b9eefe17,2024-10-09T14:35:13.220000 +CVE-2024-9575,0,0,5319fb13c91be15843abb76d87e6d17457d37aebb68186f1a71e2b47b9eefe17,2024-10-09T14:35:13.220000 CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03f5,2024-10-07T17:47:48.410000 -CVE-2024-9602,0,0,be3311a6c7e910ed5bc47bf36f941c8a0fb9276c4744df87d5ef4ab5062ab1de,2024-10-08T23:15:12.947000 -CVE-2024-9603,0,0,45ccb513db355ca029c1faba5c664e2ded2aa843837e1d077dad481e1915a6c8,2024-10-08T23:15:13.040000 +CVE-2024-9602,0,1,13c5133d85587ec02f04ab3df6b135286d0f9133ef132335e7faeadbfb7036e6,2024-10-09T17:35:16.980000 +CVE-2024-9603,0,1,5064a175167ae9dbaab5d5f0ba6b6e0d26b4de70a429a695addd7ebd760abbdf,2024-10-09T16:35:09.623000 CVE-2024-9620,0,0,0379fb1d0864218f96bae79eafc674616cceed6a1d6b1c374718286d73008692,2024-10-08T17:15:57.357000 CVE-2024-9621,0,0,93a648e082c2d430d057ddc9e3ada713aaa0a2bb50686998ccd1adc379bccdce,2024-10-08T17:15:57.573000 CVE-2024-9622,0,0,c63b888866eff50e6fa5697d58bf1e64edc668dfb35cefc907fc3210c84ae5d9,2024-10-08T17:15:57.790000 -CVE-2024-9671,1,1,f49c886ce75776b8468067e0383f68033c06188472cd5b55ea14fd7e423e32a2,2024-10-09T15:15:17.513000 -CVE-2024-9675,1,1,32e8840bd27965b8df5e5b7176aa0ce26bda0a9f22dcbac8c66cb0601f52b1b1,2024-10-09T15:15:17.837000 -CVE-2024-9680,0,0,0412df6875e3ec499aafbc3c4e100d08d00fc8546341bd2201e9cd3ad3fabc11,2024-10-09T13:15:12.090000 +CVE-2024-9671,0,0,f49c886ce75776b8468067e0383f68033c06188472cd5b55ea14fd7e423e32a2,2024-10-09T15:15:17.513000 +CVE-2024-9675,0,0,32e8840bd27965b8df5e5b7176aa0ce26bda0a9f22dcbac8c66cb0601f52b1b1,2024-10-09T15:15:17.837000 +CVE-2024-9680,0,1,1073a61fe81991e41ed256928cc5d8d5bc03a3ffd6b7dabd943fe9be59020a5c,2024-10-09T16:35:10.390000