From 0880c8e799c3bfbdaeca9020f92e84781a3b07ee Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 11 Oct 2024 16:03:19 +0000 Subject: [PATCH] Auto-Update: 2024-10-11T16:00:18.219746+00:00 --- CVE-2021/CVE-2021-35xx/CVE-2021-3538.json | 7 +- CVE-2023/CVE-2023-393xx/CVE-2023-39363.json | 66 +++++++---- CVE-2024/CVE-2024-20xx/CVE-2024-2032.json | 66 ++++++++++- CVE-2024/CVE-2024-20xx/CVE-2024-2035.json | 67 ++++++++++- CVE-2024/CVE-2024-21xx/CVE-2024-2171.json | 57 ++++++++- CVE-2024/CVE-2024-22xx/CVE-2024-2213.json | 69 ++++++++++- CVE-2024/CVE-2024-23xx/CVE-2024-2383.json | 57 ++++++++- CVE-2024/CVE-2024-250xx/CVE-2024-25092.json | 57 ++++++++- CVE-2024/CVE-2024-256xx/CVE-2024-25622.json | 64 ++++++++++ CVE-2024/CVE-2024-259xx/CVE-2024-25929.json | 47 +++++++- CVE-2024/CVE-2024-29xx/CVE-2024-2928.json | 69 ++++++++++- CVE-2024/CVE-2024-30xx/CVE-2024-3099.json | 62 +++++++++- CVE-2024/CVE-2024-341xx/CVE-2024-34122.json | 40 ++++++- CVE-2024/CVE-2024-418xx/CVE-2024-41818.json | 40 ++++++- CVE-2024/CVE-2024-453xx/CVE-2024-45396.json | 60 ++++++++++ CVE-2024/CVE-2024-453xx/CVE-2024-45397.json | 64 ++++++++++ CVE-2024/CVE-2024-454xx/CVE-2024-45402.json | 60 ++++++++++ CVE-2024/CVE-2024-454xx/CVE-2024-45403.json | 68 +++++++++++ CVE-2024/CVE-2024-470xx/CVE-2024-47074.json | 82 +++++++++++++ CVE-2024/CVE-2024-475xx/CVE-2024-47534.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47830.json | 60 ++++++++++ CVE-2024/CVE-2024-478xx/CVE-2024-47875.json | 68 +++++++++++ CVE-2024/CVE-2024-66xx/CVE-2024-6657.json | 56 +++++++++ CVE-2024/CVE-2024-70xx/CVE-2024-7006.json | 30 ++++- CVE-2024/CVE-2024-85xx/CVE-2024-8530.json | 56 +++++++++ CVE-2024/CVE-2024-85xx/CVE-2024-8531.json | 56 +++++++++ CVE-2024/CVE-2024-87xx/CVE-2024-8755.json | 56 +++++++++ CVE-2024/CVE-2024-90xx/CVE-2024-9002.json | 56 +++++++++ CVE-2024/CVE-2024-98xx/CVE-2024-9869.json | 16 +++ README.md | 74 ++++++------ _state.csv | 124 +++++++++++--------- 31 files changed, 1591 insertions(+), 169 deletions(-) create mode 100644 CVE-2024/CVE-2024-256xx/CVE-2024-25622.json create mode 100644 CVE-2024/CVE-2024-453xx/CVE-2024-45396.json create mode 100644 CVE-2024/CVE-2024-453xx/CVE-2024-45397.json create mode 100644 CVE-2024/CVE-2024-454xx/CVE-2024-45402.json create mode 100644 CVE-2024/CVE-2024-454xx/CVE-2024-45403.json create mode 100644 CVE-2024/CVE-2024-470xx/CVE-2024-47074.json create mode 100644 CVE-2024/CVE-2024-478xx/CVE-2024-47830.json create mode 100644 CVE-2024/CVE-2024-478xx/CVE-2024-47875.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6657.json create mode 100644 CVE-2024/CVE-2024-85xx/CVE-2024-8530.json create mode 100644 CVE-2024/CVE-2024-85xx/CVE-2024-8531.json create mode 100644 CVE-2024/CVE-2024-87xx/CVE-2024-8755.json create mode 100644 CVE-2024/CVE-2024-90xx/CVE-2024-9002.json create mode 100644 CVE-2024/CVE-2024-98xx/CVE-2024-9869.json diff --git a/CVE-2021/CVE-2021-35xx/CVE-2021-3538.json b/CVE-2021/CVE-2021-35xx/CVE-2021-3538.json index 6754ea9f566..f6b9262bc3f 100644 --- a/CVE-2021/CVE-2021-35xx/CVE-2021-3538.json +++ b/CVE-2021/CVE-2021-35xx/CVE-2021-3538.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3538", "sourceIdentifier": "secalert@redhat.com", "published": "2021-06-02T14:15:09.993", - "lastModified": "2021-06-14T13:37:17.353", + "lastModified": "2024-10-11T15:23:06.737", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -95,9 +95,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:go.uuid_project:go.uuid:*:*:*:*:*:*:*:*", - "versionEndExcluding": "1.2", - "matchCriteriaId": "4585CCC5-D435-4978-86BA-6BE70BF425B5" + "criteria": "cpe:2.3:a:satori:uuid:-:*:*:*:*:go:*:*", + "matchCriteriaId": "AB02B571-6BC5-4D0E-AC19-46AEB20E5B0A" } ] } diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39363.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39363.json index ad87254928e..67cf009fd27 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39363.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39363.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39363", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-07T19:15:11.873", - "lastModified": "2023-09-18T21:15:55.163", + "lastModified": "2024-10-11T14:15:05.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "ATTACKED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + } + } + ], "cvssMetricV31": [ { "source": "nvd@nist.gov", @@ -32,26 +76,6 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 - }, - { - "source": "security-advisories@github.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", - "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 5.9, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 2.2, - "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2032.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2032.json index 0c449a3f80d..b3ff7ca38b3 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2032.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2032", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:53.060", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-11T14:22:36.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 2.5 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.55.5", + "matchCriteriaId": "E8D29AD1-72A6-48F0-97BB-824EB4A40338" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zenml-io/zenml/commit/afcaf741ef9114c9b32f722f101b97de3d8d147b", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/6199cd5d-611f-4ea9-96c5-52a952ba5a56", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2035.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2035.json index 0bd775b9ab3..026ccc22fc3 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2035.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2035", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:53.313", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-11T14:20:05.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security@huntr.dev", "type": "Secondary", @@ -51,14 +83,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.56.2", + "matchCriteriaId": "B39C79D8-E418-4820-A799-CE4633861C93" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zenml-io/zenml/commit/b95f083efffa56831cd41d8ed536aeb0b6038fa3", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/1cfc6493-082e-4229-9f2f-496801a6557c", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2171.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2171.json index 30d8a3e6c6c..ee34d1da27c 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2171.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2171.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2171", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:53.647", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-11T14:15:32.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.56.2", + "matchCriteriaId": "B39C79D8-E418-4820-A799-CE4633861C93" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zenml-io/zenml/commit/68bcb3ba60cba9729c9713a49c39502d40fb945e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/cee06a28-7e3b-460b-b504-69add838ebe8", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2213.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2213.json index e80b6a975a0..f3dca76a7ac 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2213.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2213", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:53.890", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-11T15:34:13.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +83,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.56.3", + "matchCriteriaId": "0A24ABC9-62F4-4AAF-B7C3-C14F607AD79F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zenml-io/zenml/commit/58cb3d987372c91eb605853c35325701733337c2", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/8f5534ac-fd08-4b8b-8c2e-35949aa36e48", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2383.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2383.json index d01945cc9cd..d807326a0c4 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2383.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2383.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2383", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:54.970", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-11T15:11:36.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.56.3", + "matchCriteriaId": "0A24ABC9-62F4-4AAF-B7C3-C14F607AD79F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zenml-io/zenml/commit/f863fde1269bc355951f8cfc826c0244d88ad5e9", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/22d26f5a-c0ae-4344-aa7d-08ff5ada3963", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25092.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25092.json index e5c65807d5f..1ba091aa3c6 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25092.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25092.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25092", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-09T11:15:49.720", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-11T14:01:36.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xlplugins:nextmove:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "2.18.0", + "matchCriteriaId": "24709135-E5BD-4D11-A090-D6BD44DE1BA2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woo-thank-you-page-nextmove-lite/wordpress-nextmove-lite-plugin-2-17-0-subscriber-arbitrary-plugin-installation-activation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json new file mode 100644 index 00000000000..534f73cd80d --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-25622", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-11T15:15:03.947", + "lastModified": "2024-10-11T15:15:03.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The configuration directives provided by the headers handler allows users to modify the response headers being sent by h2o. The configuration file of h2o has scopes, and the inner scopes (e.g., path level) are expected to inherit the configuration defined in outer scopes (e.g., global level). However, if a header directive is used in the inner scope, all the definition in outer scopes are ignored. This can lead to headers not being modified as expected. Depending on the headers being added or removed unexpectedly, this behavior could lead to unexpected client behavior. This vulnerability is fixed in commit 123f5e2b65dcdba8f7ef659a00d24bd1249141be." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/h2o/h2o/issues/3332", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/h2o/h2o/security/advisories/GHSA-5m7v-cj65-h6pj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25929.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25929.json index 70c29e29eb0..2a3d98ab33c 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25929.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25929.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25929", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-09T11:15:49.947", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-11T14:14:03.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:multivendorx:product_catalog_mode_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.0.6", + "matchCriteriaId": "1CCC4D99-EC1C-4647-94A7-C10BF3B491A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woocommerce-catalog-enquiry/wordpress-product-catalog-mode-for-woocommerce-plugin-5-0-5-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2928.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2928.json index 5b68afaf1ec..f45ce5b1137 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2928.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2928.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2928", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:55.680", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-11T15:28:03.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +83,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.11.3", + "matchCriteriaId": "C3A84D8C-5A9A-481D-9EF8-55C0B3A03F4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mlflow/mlflow/commit/96f0b573a73d8eedd6735a2ce26e08859527be07", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/19bf02d7-6393-4a95-b9d0-d6d4d2d8c298", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3099.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3099.json index ad9aca35303..b8c334ce5fd 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3099.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3099", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:59.393", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-11T15:07:16.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +83,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F18F1880-033C-4E18-913C-6C5356427ABB" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/8d96374a-ce8d-480e-9cb0-0a7e5165c24a", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34122.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34122.json index 872e0a6f40a..6451fa2f57c 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34122.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34122", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-02T14:15:13.000", - "lastModified": "2024-07-02T17:44:45.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-11T15:01:24.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:-:*:*:*:*:edge:*:*", + "matchCriteriaId": "CC26933C-FE7E-45A1-938B-3CAF95E923F7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.2592.81", + "matchCriteriaId": "0AC5F5EC-25BE-4162-BA1D-D19A40157148" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34122", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41818.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41818.json index 185fe2c1121..bac0785b91a 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41818.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41818.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41818", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-29T16:15:05.570", - "lastModified": "2024-09-11T16:09:46.303", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-11T15:15:04.190", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,13 +36,43 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security-advisories@github.com", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -76,6 +106,10 @@ "Issue Tracking" ] }, + { + "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/ba5f35e7680468acd7906eaabb2f69e28ed8b2aa", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/d0bfe8a3a2813a185f39591bbef222212d856164", "source": "security-advisories@github.com", diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json new file mode 100644 index 00000000000..8b1b9225296 --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45396", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-11T15:15:04.457", + "lastModified": "2024-10-11T15:15:04.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d720707 is susceptible to a denial-of-service attack. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using quicly. The vulnerability is addressed with commit 2a95896104901589c495bc41460262e64ffcad5c." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h2o/quicly/commit/2a95896104901589c495bc41460262e64ffcad5c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/h2o/quicly/security/advisories/GHSA-mp3c-h5gg-mm6p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json new file mode 100644 index 00000000000..c9a4b4f9527 --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-45397", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-11T15:15:04.690", + "lastModified": "2024-10-11T15:15:04.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When an HTTP request using TLS/1.3 early data on top of TCP Fast Open or QUIC 0-RTT packets is received and the IP-address-based access control is used, the access control does not detect and prohibit HTTP requests conveyed by packets with a spoofed source address. This behavior allows attackers on the network to execute HTTP requests from addresses that are otherwise rejected by the address-based access control. The vulnerability has been addressed in commit 15ed15a. Users may disable the use of TCP FastOpen and QUIC to mitigate the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h2o/h2o/commit/15ed15a2efb83a77bb4baaa5a119e639c2f6898a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/h2o/h2o/security/advisories/GHSA-jf2c-xjcp-wg4c", + "source": "security-advisories@github.com" + }, + { + "url": "https://h2o.examp1e.net/configure/http3_directives.html", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json new file mode 100644 index 00000000000..51d61044cd6 --- /dev/null +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45402", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-11T15:15:04.903", + "lastModified": "2024-10-11T15:15:04.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Picotls is a TLS protocol library that allows users select different crypto backends based on their use case. When parsing a spoofed TLS handshake message, picotls (specifically, bindings within picotls that call the crypto libraries) may attempt to free the same memory twice. This double free occurs during the disposal of multiple objects without any intervening calls to malloc Typically, this triggers the malloc implementation to detect the error and abort the process. However, depending on the internals of malloc and the crypto backend being used, the flaw could potentially lead to a use-after-free scenario, which might allow for arbitrary code execution. The vulnerability is addressed with commit 9b88159ce763d680e4a13b6e8f3171ae923a535d." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h2o/picotls/commit/9b88159ce763d680e4a13b6e8f3171ae923a535d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/h2o/picotls/security/advisories/GHSA-w7c8-wjx9-vvvv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json new file mode 100644 index 00000000000..4e251d8169a --- /dev/null +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-45403", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-11T15:15:05.123", + "lastModified": "2024-10-11T15:15:05.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When h2o is configured as a reverse proxy and HTTP/3 requests are cancelled by the client, h2o might crash due to an assertion failure. The crash can be exploited by an attacker to mount a Denial-of-Service attack. By default, the h2o standalone server automatically restarts, minimizing the impact. However, HTTP requests that were served concurrently will still be disrupted. The vulnerability has been addressed in commit 1ed32b2. Users may disable the use of HTTP/3 to mitigate the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h2o/h2o/commit/16b13eee8ad7895b4fe3fcbcabee53bd52782562", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/h2o/h2o/commit/1ed32b23f999acf0c5029f09c8525f93eb1d354c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/h2o/h2o/security/advisories/GHSA-4xp5-3jhc-3m92", + "source": "security-advisories@github.com" + }, + { + "url": "https://h2o.examp1e.net/configure/http3_directives.html", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json new file mode 100644 index 00000000000..c5b73e3e94f --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-47074", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-11T15:15:05.353", + "lastModified": "2024-10-11T15:15:05.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DataEase is an open source data visualization analysis tool. In Dataease, the PostgreSQL data source in the data source function can customize the JDBC connection parameters and the PG server target to be connected. In backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, PgConfiguration class don't filter any parameters, directly concat user input. So, if the attacker adds some parameters in JDBC url, and connect to evil PG server, the attacker can trigger the PG jdbc deserialization vulnerability, and eventually the attacker can execute through the deserialization vulnerability system commands and obtain server privileges. The vulnerability has been fixed in v1.18.25." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dataease/dataease/commit/86eafc4d77f0bbc0eaa7fc58e5076a085257f259", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dataease/dataease/security/advisories/GHSA-jgg7-w629-wcpc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47534.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47534.json index 9d6da079d83..dd03eb18eb1 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47534.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47534.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47534", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-01T16:15:09.857", - "lastModified": "2024-10-04T13:51:25.567", + "lastModified": "2024-10-11T15:15:05.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -100,6 +100,10 @@ "url": "https://github.com/theupdateframework/go-tuf/blob/f95222bdd22d2ac4e5b8ed6fe912b645e213c3b5/metadata/metadata.go#L565-L580", "source": "security-advisories@github.com" }, + { + "url": "https://github.com/theupdateframework/go-tuf/commit/edc30b474f5afd4cc603e17149704d5aa605151d", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/theupdateframework/go-tuf/commit/f36420caba9edbfdfd64f95a9554c0836d9cf819", "source": "security-advisories@github.com" diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json new file mode 100644 index 00000000000..1d62e7819f2 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47830", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-11T15:15:05.613", + "lastModified": "2024-10-11T15:15:05.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Plane is an open-source project management tool. Plane uses the ** wildcard support to retrieve the image from any hostname as in /web/next.config.js. This may permit an attacker to induce the server side into performing requests to unintended locations. This vulnerability is fixed in 0.23.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/makeplane/plane/commit/b9f78ba42b70461c8c1d26638fa8b9beef6a96a1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/makeplane/plane/security/advisories/GHSA-39gx-38xf-c348", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47875.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47875.json new file mode 100644 index 00000000000..bd80b33a3c2 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47875.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-47875", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-11T15:15:05.860", + "lastModified": "2024-10-11T15:15:05.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cure53/DOMPurify/blob/0ef5e537a514f904b6aa1d7ad9e749e365d7185f/test/test-suite.js#L2098", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cure53/DOMPurify/commit/0ef5e537a514f904b6aa1d7ad9e749e365d7185f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cure53/DOMPurify/commit/6ea80cd8b47640c20f2f230c7920b1f4ce4fdf7a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cure53/DOMPurify/security/advisories/GHSA-gx9m-whjm-85jf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6657.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6657.json new file mode 100644 index 00000000000..e6aeaa115ac --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6657.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6657", + "sourceIdentifier": "product-security@silabs.com", + "published": "2024-10-11T14:15:05.770", + "lastModified": "2024-10-11T14:15:05.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A denial of service may be caused to a single peripheral device in a BLE network when multiple central \ndevices continuously connect and disconnect to the peripheral. A hard reset is required to recover the peripheral device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-821" + } + ] + } + ], + "references": [ + { + "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm00000E9IIbIAN?operationContext=S1", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json index 28a0992f310..fd2f46ff287 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7006", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-12T13:38:40.577", - "lastModified": "2024-09-06T17:15:17.387", - "vulnStatus": "Modified", + "lastModified": "2024-10-11T14:39:13.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,8 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libtiff:libtiff:4.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A8246A12-73A8-4171-847E-D894E0B17DAE" + "criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5.1", + "versionEndIncluding": "4.6.0", + "matchCriteriaId": "990756E5-66EA-41E0-8C61-0BF877443C50" } ] } @@ -112,6 +114,21 @@ "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2D1E1C3E-0188-43C3-8911-858B5D7A2965" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "71DDE212-1018-4554-9C06-4908442DE134" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C" } ] } @@ -121,7 +138,10 @@ "references": [ { "url": "https://access.redhat.com/errata/RHSA-2024:6360", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-7006", diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8530.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8530.json new file mode 100644 index 00000000000..17a875c9d6e --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8530.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8530", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-10-11T14:15:05.970", + "lastModified": "2024-10-11T14:15:05.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-306: Missing Authentication for Critical Function vulnerability exists that could\ncause exposure of private data when an already generated \u201clogcaptures\u201d archive is accessed\ndirectly by HTTPS." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-282-01.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8531.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8531.json new file mode 100644 index 00000000000..58a48b72b3b --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8531.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8531", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-10-11T14:15:06.173", + "lastModified": "2024-10-11T14:15:06.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that could\ncompromise the Data Center Expert software when an upgrade bundle is manipulated to\ninclude arbitrary bash scripts that are executed as root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-282-01.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8755.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8755.json new file mode 100644 index 00000000000..74d9786de39 --- /dev/null +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8755.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8755", + "sourceIdentifier": "security@progress.com", + "published": "2024-10-11T15:15:06.150", + "lastModified": "2024-10-11T15:15:06.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects:\n\n\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://support.kemptechnologies.com/hc/en-us/articles/30297374715661-LoadMaster-Security-Vulnerability-CVE-2024-8755", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9002.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9002.json new file mode 100644 index 00000000000..cce45adf901 --- /dev/null +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9002.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9002", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-10-11T14:15:06.397", + "lastModified": "2024-10-11T14:15:06.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-269: Improper Privilege Management vulnerability exists that could cause unauthorized\naccess, loss of confidentiality, integrity, and availability of the workstation when non-admin\nauthenticated user tries to perform privilege escalation by tampering with the binaries" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-282-03.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9869.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9869.json new file mode 100644 index 00000000000..4d10da43939 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9869.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-9869", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-11T15:15:06.500", + "lastModified": "2024-10-11T15:15:06.500", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/README.md b/README.md index e69c20a18d3..bcaa6a6faf7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-11T14:00:17.361688+00:00 +2024-10-11T16:00:18.219746+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-11T13:57:18.657000+00:00 +2024-10-11T15:34:13.917000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265318 +265332 ``` ### CVEs added in the last Commit -Recently added CVEs: `30` +Recently added CVEs: `14` -- [CVE-2024-48987](CVE-2024/CVE-2024-489xx/CVE-2024-48987.json) (`2024-10-11T13:15:16.197`) -- [CVE-2024-5005](CVE-2024/CVE-2024-50xx/CVE-2024-5005.json) (`2024-10-11T13:15:16.317`) -- [CVE-2024-6971](CVE-2024/CVE-2024-69xx/CVE-2024-6971.json) (`2024-10-11T13:15:16.537`) -- [CVE-2024-7514](CVE-2024/CVE-2024-75xx/CVE-2024-7514.json) (`2024-10-11T13:15:16.800`) -- [CVE-2024-8913](CVE-2024/CVE-2024-89xx/CVE-2024-8913.json) (`2024-10-11T13:15:17.040`) -- [CVE-2024-8970](CVE-2024/CVE-2024-89xx/CVE-2024-8970.json) (`2024-10-11T13:15:17.270`) -- [CVE-2024-9051](CVE-2024/CVE-2024-90xx/CVE-2024-9051.json) (`2024-10-11T13:15:17.477`) -- [CVE-2024-9164](CVE-2024/CVE-2024-91xx/CVE-2024-9164.json) (`2024-10-11T13:15:17.700`) -- [CVE-2024-9211](CVE-2024/CVE-2024-92xx/CVE-2024-9211.json) (`2024-10-11T13:15:17.883`) -- [CVE-2024-9221](CVE-2024/CVE-2024-92xx/CVE-2024-9221.json) (`2024-10-11T13:15:18.100`) -- [CVE-2024-9232](CVE-2024/CVE-2024-92xx/CVE-2024-9232.json) (`2024-10-11T13:15:18.313`) -- [CVE-2024-9234](CVE-2024/CVE-2024-92xx/CVE-2024-9234.json) (`2024-10-11T13:15:18.530`) -- [CVE-2024-9346](CVE-2024/CVE-2024-93xx/CVE-2024-9346.json) (`2024-10-11T13:15:18.740`) -- [CVE-2024-9436](CVE-2024/CVE-2024-94xx/CVE-2024-9436.json) (`2024-10-11T13:15:18.947`) -- [CVE-2024-9507](CVE-2024/CVE-2024-95xx/CVE-2024-9507.json) (`2024-10-11T13:15:19.160`) -- [CVE-2024-9538](CVE-2024/CVE-2024-95xx/CVE-2024-9538.json) (`2024-10-11T13:15:19.373`) -- [CVE-2024-9543](CVE-2024/CVE-2024-95xx/CVE-2024-9543.json) (`2024-10-11T13:15:19.577`) -- [CVE-2024-9586](CVE-2024/CVE-2024-95xx/CVE-2024-9586.json) (`2024-10-11T13:15:19.823`) -- [CVE-2024-9587](CVE-2024/CVE-2024-95xx/CVE-2024-9587.json) (`2024-10-11T13:15:20.043`) -- [CVE-2024-9610](CVE-2024/CVE-2024-96xx/CVE-2024-9610.json) (`2024-10-11T13:15:20.257`) -- [CVE-2024-9611](CVE-2024/CVE-2024-96xx/CVE-2024-9611.json) (`2024-10-11T13:15:20.487`) -- [CVE-2024-9616](CVE-2024/CVE-2024-96xx/CVE-2024-9616.json) (`2024-10-11T13:15:20.703`) -- [CVE-2024-9707](CVE-2024/CVE-2024-97xx/CVE-2024-9707.json) (`2024-10-11T13:15:21.233`) -- [CVE-2024-9855](CVE-2024/CVE-2024-98xx/CVE-2024-9855.json) (`2024-10-11T13:15:21.460`) -- [CVE-2024-9856](CVE-2024/CVE-2024-98xx/CVE-2024-9856.json) (`2024-10-11T13:15:21.883`) +- [CVE-2024-25622](CVE-2024/CVE-2024-256xx/CVE-2024-25622.json) (`2024-10-11T15:15:03.947`) +- [CVE-2024-45396](CVE-2024/CVE-2024-453xx/CVE-2024-45396.json) (`2024-10-11T15:15:04.457`) +- [CVE-2024-45397](CVE-2024/CVE-2024-453xx/CVE-2024-45397.json) (`2024-10-11T15:15:04.690`) +- [CVE-2024-45402](CVE-2024/CVE-2024-454xx/CVE-2024-45402.json) (`2024-10-11T15:15:04.903`) +- [CVE-2024-45403](CVE-2024/CVE-2024-454xx/CVE-2024-45403.json) (`2024-10-11T15:15:05.123`) +- [CVE-2024-47074](CVE-2024/CVE-2024-470xx/CVE-2024-47074.json) (`2024-10-11T15:15:05.353`) +- [CVE-2024-47830](CVE-2024/CVE-2024-478xx/CVE-2024-47830.json) (`2024-10-11T15:15:05.613`) +- [CVE-2024-47875](CVE-2024/CVE-2024-478xx/CVE-2024-47875.json) (`2024-10-11T15:15:05.860`) +- [CVE-2024-6657](CVE-2024/CVE-2024-66xx/CVE-2024-6657.json) (`2024-10-11T14:15:05.770`) +- [CVE-2024-8530](CVE-2024/CVE-2024-85xx/CVE-2024-8530.json) (`2024-10-11T14:15:05.970`) +- [CVE-2024-8531](CVE-2024/CVE-2024-85xx/CVE-2024-8531.json) (`2024-10-11T14:15:06.173`) +- [CVE-2024-8755](CVE-2024/CVE-2024-87xx/CVE-2024-8755.json) (`2024-10-11T15:15:06.150`) +- [CVE-2024-9002](CVE-2024/CVE-2024-90xx/CVE-2024-9002.json) (`2024-10-11T14:15:06.397`) +- [CVE-2024-9869](CVE-2024/CVE-2024-98xx/CVE-2024-9869.json) (`2024-10-11T15:15:06.500`) ### CVEs modified in the last Commit -Recently modified CVEs: `10` +Recently modified CVEs: `15` -- [CVE-2023-31080](CVE-2023/CVE-2023-310xx/CVE-2023-31080.json) (`2024-10-11T13:47:12.113`) -- [CVE-2023-34003](CVE-2023/CVE-2023-340xx/CVE-2023-34003.json) (`2024-10-11T13:52:06.707`) -- [CVE-2024-0520](CVE-2024/CVE-2024-05xx/CVE-2024-0520.json) (`2024-10-11T13:30:31.167`) -- [CVE-2024-1880](CVE-2024/CVE-2024-18xx/CVE-2024-1880.json) (`2024-10-11T13:23:56.230`) -- [CVE-2024-24716](CVE-2024/CVE-2024-247xx/CVE-2024-24716.json) (`2024-10-11T13:57:18.657`) -- [CVE-2024-42062](CVE-2024/CVE-2024-420xx/CVE-2024-42062.json) (`2024-10-11T13:26:48.907`) -- [CVE-2024-45932](CVE-2024/CVE-2024-459xx/CVE-2024-45932.json) (`2024-10-11T13:21:12.003`) -- [CVE-2024-46446](CVE-2024/CVE-2024-464xx/CVE-2024-46446.json) (`2024-10-11T13:04:46.337`) -- [CVE-2024-5505](CVE-2024/CVE-2024-55xx/CVE-2024-5505.json) (`2024-10-11T13:33:54.853`) -- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-10-11T13:15:21.013`) +- [CVE-2021-3538](CVE-2021/CVE-2021-35xx/CVE-2021-3538.json) (`2024-10-11T15:23:06.737`) +- [CVE-2023-39363](CVE-2023/CVE-2023-393xx/CVE-2023-39363.json) (`2024-10-11T14:15:05.430`) +- [CVE-2024-2032](CVE-2024/CVE-2024-20xx/CVE-2024-2032.json) (`2024-10-11T14:22:36.100`) +- [CVE-2024-2035](CVE-2024/CVE-2024-20xx/CVE-2024-2035.json) (`2024-10-11T14:20:05.590`) +- [CVE-2024-2171](CVE-2024/CVE-2024-21xx/CVE-2024-2171.json) (`2024-10-11T14:15:32.983`) +- [CVE-2024-2213](CVE-2024/CVE-2024-22xx/CVE-2024-2213.json) (`2024-10-11T15:34:13.917`) +- [CVE-2024-2383](CVE-2024/CVE-2024-23xx/CVE-2024-2383.json) (`2024-10-11T15:11:36.580`) +- [CVE-2024-25092](CVE-2024/CVE-2024-250xx/CVE-2024-25092.json) (`2024-10-11T14:01:36.157`) +- [CVE-2024-25929](CVE-2024/CVE-2024-259xx/CVE-2024-25929.json) (`2024-10-11T14:14:03.307`) +- [CVE-2024-2928](CVE-2024/CVE-2024-29xx/CVE-2024-2928.json) (`2024-10-11T15:28:03.530`) +- [CVE-2024-3099](CVE-2024/CVE-2024-30xx/CVE-2024-3099.json) (`2024-10-11T15:07:16.690`) +- [CVE-2024-34122](CVE-2024/CVE-2024-341xx/CVE-2024-34122.json) (`2024-10-11T15:01:24.393`) +- [CVE-2024-41818](CVE-2024/CVE-2024-418xx/CVE-2024-41818.json) (`2024-10-11T15:15:04.190`) +- [CVE-2024-47534](CVE-2024/CVE-2024-475xx/CVE-2024-47534.json) (`2024-10-11T15:15:05.490`) +- [CVE-2024-7006](CVE-2024/CVE-2024-70xx/CVE-2024-7006.json) (`2024-10-11T14:39:13.093`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 92c665190c1..cd3b3d59c0d 100644 --- a/_state.csv +++ b/_state.csv @@ -178432,7 +178432,7 @@ CVE-2021-35369,0,0,1aa0b1c1e665d6a983379b660edccedb64966fbb116db4522078f9b77de42 CVE-2021-3537,0,0,87e695f9d46c903f76860906f0c50ff7e815e14dbc9752fc0913ffb6f759273a,2023-11-07T03:38:05.560000 CVE-2021-35370,0,0,0a9a9fa52692fb7f577e94328f399f4246b05bf65a835d01457d945e9aa379d2,2023-03-07T02:54:41.090000 CVE-2021-35377,0,0,85543550addbe3af8ad1c78ba6257c21d49294ea490f8b5695b691e2a50d40c3,2023-03-13T18:46:09.380000 -CVE-2021-3538,0,0,a73b3b30a515d7e004d2db8c1e34dd5c7c8561358ab808f9d937723ce96721b2,2021-06-14T13:37:17.353000 +CVE-2021-3538,0,1,9fcf8a8870a20060d6236de3bac55436ce6b203f97ed4ad02b176ddb1cace2e6,2024-10-11T15:23:06.737000 CVE-2021-35380,0,0,8dd04051f10fe48a6eecbb9d493fa2f97d1bd38436fcede090d882c8da90a356,2022-04-25T14:10:01.120000 CVE-2021-35387,0,0,64486451a891a8dbc088ec57fedc7ab51bd311d1f182e63a79e5e106efb5dd7d,2023-11-14T16:22:52.857000 CVE-2021-35388,0,0,32ab42956e0d72f13ab01f0d287315414a29596ccb73227b505ee7a95b7d55ca,2023-11-14T16:22:52.857000 @@ -223488,7 +223488,7 @@ CVE-2023-31077,0,0,4668fc1d6f27794e62a31b7d385044567b1b34526c6150131ce1b8d9c1e11 CVE-2023-31078,0,0,d477b2a0d1d7512bc944d11c939c16666f8944d055bf400150fd628339734a71,2023-11-15T18:54:15.437000 CVE-2023-31079,0,0,a7d7220b6871bdb0c093fb44eef3bf42cda4a6a85ea300232160e7972f2f6f0b,2023-08-22T00:57:29.870000 CVE-2023-3108,0,0,065368c6e6b13b2663cc13a29c28eb06fd9d507160d711de3867570b19d0b465,2023-07-20T01:56:37.593000 -CVE-2023-31080,0,1,1cd5dfab895a6eabff89bfcca1b027d82edf509322a5253933e58c9a821d44a3,2024-10-11T13:47:12.113000 +CVE-2023-31080,0,0,1cd5dfab895a6eabff89bfcca1b027d82edf509322a5253933e58c9a821d44a3,2024-10-11T13:47:12.113000 CVE-2023-31081,0,0,09395963ade62990d50b9352440c5c46a40602c90f7d53b901c3fbe6b973525b,2024-03-25T01:15:53.953000 CVE-2023-31082,0,0,dc03e713ed8f4ea8f933a310fab3cf2bcaf3002ea26d13546abb3f5dfdcaab54,2024-08-02T15:16:00.853000 CVE-2023-31083,0,0,45f3b978206ba9e206b8ac089194e641ccfbe0361deb2f33d2c497f08508f91b,2024-03-25T01:15:54.100000 @@ -225751,7 +225751,7 @@ CVE-2023-33997,0,0,23029bc0a199d37580bdd783c305bf8857a9c030f70ff213bc693967a7518 CVE-2023-34000,0,0,e78713cb93af9e8807d10a6226765c0ffb4131ac6c576e6f9bf5b718be3e738f,2023-06-21T21:06:14.600000 CVE-2023-34001,0,0,899b016dace5dd55b02d2783a468aea32aeda2a6f910510d25bae7ea93e15f24,2024-06-04T16:57:41.053000 CVE-2023-34002,0,0,01b02b0840bddbb8728afe94693e37d50c1d02cedae09524a28d1c5500979f97,2023-11-15T02:26:37.500000 -CVE-2023-34003,0,1,1957b5cd753d9b0acddfabf009b4e26acba58885b47af4fb498cdead309fd666,2024-10-11T13:52:06.707000 +CVE-2023-34003,0,0,1957b5cd753d9b0acddfabf009b4e26acba58885b47af4fb498cdead309fd666,2024-10-11T13:52:06.707000 CVE-2023-34004,0,0,b8dd614e62887c7ad346a1138027f9fcaa1310bb84003ddc6de44b7748508361,2023-09-01T12:20:23.520000 CVE-2023-34005,0,0,9da2c350ea033d78b4c6d01ba16825ba15dec740b0ecf882038702f26edb9169,2023-07-26T00:37:17.753000 CVE-2023-34006,0,0,e127b9ef26a23f0afd5a58ecb97030896a46a4aa7de7b49f72279773941ab7bd,2023-06-28T07:21:30.410000 @@ -229759,7 +229759,7 @@ CVE-2023-3936,0,0,e339c49ee17f165e3cb8ed45182ad41c7e36f7e97fecd7d4447b10663f2038 CVE-2023-39360,0,0,87e6492a0425ebb016d8564aa5e1d50c9cdb809bdd070d970e61626613170aeb,2024-03-18T20:15:07.390000 CVE-2023-39361,0,0,04caaf8d8e77bc7b5b8a00ed313f7bdb09652628f5a728d6df8da8ba16e5255f,2024-03-18T20:15:07.513000 CVE-2023-39362,0,0,60ffa7af0a4ef2b014e79fd7f0276e7809662d726d48b41034cba4043a526fa1,2024-03-18T20:15:07.610000 -CVE-2023-39363,0,0,cdafe04feceb7aef9d79da8f2d6251fc4ad9ee5e8118b7c062dd737781bd3da3,2023-09-18T21:15:55.163000 +CVE-2023-39363,0,1,11458520a1a6fbf4070cd7913c097b57717dfc60b84f06a01f4be49102ea3044,2024-10-11T14:15:05.430000 CVE-2023-39364,0,0,8bd21e556c99c1e5dc5a521ac8fd9c74528a948dddf53984ff920a0fe035c0e9,2024-03-18T20:15:07.727000 CVE-2023-39365,0,0,3d7e7e864e7dc4bbec36f0e9050414ccd03043634ef42b15757e6fc65313b280,2024-03-18T20:15:07.827000 CVE-2023-39366,0,0,b6e399e516093f9b22303beb5d6e007a21d46ed194c2479afb380ce880781427,2023-11-09T05:15:10.317000 @@ -231956,7 +231956,7 @@ CVE-2023-4213,0,0,21c428add2eda2eb8d9843e8f25c420113e0faf0f2737e6835262686538173 CVE-2023-42130,0,0,0241b38800c234ec8e4a2ff16f40e83d68c56ec86a9b4257cd78b46e40a43fab,2024-09-18T19:15:36.470000 CVE-2023-42131,0,0,4e0f01a335565af1d2caffbcb3515b0a5bc3abdb5520eb1e67adabde374601fe,2024-09-18T19:15:36.553000 CVE-2023-42132,0,0,b3614605e58c2ad6bb3381e3dd9a9ae21953bc0309c61010e3af35ddfe93114f,2023-10-03T20:56:24.067000 -CVE-2023-42133,1,1,af5e56659245d888956ffab722dc3e53b1277918d2fce2e5939ff12d4c40a42d,2024-10-11T13:15:15.190000 +CVE-2023-42133,0,0,af5e56659245d888956ffab722dc3e53b1277918d2fce2e5939ff12d4c40a42d,2024-10-11T13:15:15.190000 CVE-2023-42134,0,0,4ee57071d16fbebb2fd73b2c73a537f320f9d80ad77a4c87162327571d527be7,2024-01-19T16:14:39.460000 CVE-2023-42135,0,0,afc51742bb55c141f44e3c071a949b928f7fc168a8f3df1a2cc739282f45f1b6,2024-10-10T16:15:05.690000 CVE-2023-42136,0,0,3cb425be70508b6a679f0aab3db264515ab3c51689b6da64cb1007c415646915,2024-10-10T16:15:05.880000 @@ -241695,7 +241695,7 @@ CVE-2024-0516,0,0,76e96ba9ee813b87f0e64f73d14f08314088e66ef53cbaeb18e54d07017b5c CVE-2024-0517,0,0,9618523908eeb037c032acd1ead112d0f3103d9a7549c199a93df761ae93656b,2024-01-22T19:53:16.533000 CVE-2024-0518,0,0,06cfe0138669d1b5b40a81316c7b8388ecfb6c3e22ceca04d1f26bac47601569,2024-07-03T01:44:45.150000 CVE-2024-0519,0,0,6f6a6c52cbde63db862ed619fbe04bbbee4daea8ca4a6292cdcf0ce6eafddcc8,2024-08-14T19:40:57.177000 -CVE-2024-0520,0,1,b8a25be82a603a70c2e57673930ebfb29e6686c5b0cc11b1afd5d43d4b9e00bd,2024-10-11T13:30:31.167000 +CVE-2024-0520,0,0,b8a25be82a603a70c2e57673930ebfb29e6686c5b0cc11b1afd5d43d4b9e00bd,2024-10-11T13:30:31.167000 CVE-2024-0521,0,0,e85b6964f0221325387cd519d13caf00b8f4ad2c55d80f6377a71c0ac9b1d7d2,2024-01-29T15:26:35.300000 CVE-2024-0522,0,0,6b7010388e77d89349419d2819d60b201dda8336d2d142905f9025c623dec01a,2024-05-17T02:34:43.397000 CVE-2024-0523,0,0,08a14d878b5428d89eb90376cecc1cd7daa715ec91e9ddafae1bbb46a6f1c328,2024-05-17T02:34:43.537000 @@ -242967,7 +242967,7 @@ CVE-2024-1876,0,0,e8e0571c659b0fa787427894c4b874422cd76362527c553c866da3c23dcf78 CVE-2024-1877,0,0,09157f9013db70d521489400dd1dde0f5e6230674417516b655a173f324787df,2024-05-17T02:35:39.957000 CVE-2024-1878,0,0,000003838e237dba5dd43a619ef99a4488543c4c7093fec65257742365e28ce9,2024-05-17T02:35:40.047000 CVE-2024-1879,0,0,01f8ee5b9df6ab7642ee2bd3dfb26155544416292db09c2b712346021c0ed07c,2024-09-24T13:54:22.813000 -CVE-2024-1880,0,1,b1037510a41f7d21d3ee430904d50af4a089982759432138f7a1c232b9f255de,2024-10-11T13:23:56.230000 +CVE-2024-1880,0,0,b1037510a41f7d21d3ee430904d50af4a089982759432138f7a1c232b9f255de,2024-10-11T13:23:56.230000 CVE-2024-1881,0,0,c3dc9cbb4f299764c6db7af9250664f63720297c862a9a0180254f189ca7f940,2024-10-08T21:38:34.493000 CVE-2024-1882,0,0,260fd7f45d858edb6f067ba53f534293241a43fbd31baa88c2bd24a370e87eb7,2024-09-26T04:15:07.377000 CVE-2024-1883,0,0,7d218b22e2f53c9af6f7c239b17390f5535af26fac5a27a6b90eb23c0d34d99e,2024-09-26T04:15:07.480000 @@ -243266,7 +243266,7 @@ CVE-2024-20316,0,0,1089bd3d53e5b2c49a8770723814eaf98c1e5899b4afab359e71b3645406a CVE-2024-20317,0,0,8b87f36589e7cdd5f7730f5c5346b2cb66a37c28f5a388ccb075cca1b9909da0,2024-10-03T17:58:40.703000 CVE-2024-20318,0,0,41adde3fb857f9cea03517c6a4e2f4dbc032d61fb88e0a42b8543d819f5a2d70,2024-03-13T18:15:58.530000 CVE-2024-20319,0,0,0a1466563a9818d205ff8725c3cf2a5afe9d75f3720a76315e91f8e81770c747,2024-03-13T18:15:58.530000 -CVE-2024-2032,0,0,6c9fab941a4b444e93407737c1e5c294d8f201f8109308d2a41aae9e970336f2,2024-06-07T14:56:05.647000 +CVE-2024-2032,0,1,90e70481e24ddb603fe99e90934f16c2045c18d44a931f457f5614f379885675,2024-10-11T14:22:36.100000 CVE-2024-20320,0,0,fd0786fa2f7ef51279d0c4fc73d926adfc689f7fdd27a0ba95adedfd6d2d5266,2024-03-13T18:15:58.530000 CVE-2024-20321,0,0,9f164e85a915a5a4f862704d6bb8cef452f44797e3d6049905a588daf1644aa7,2024-03-04T22:45:23.647000 CVE-2024-20322,0,0,5515197bc9b4076f0571c114c5eb66a73e81fb48b28f32d0ba7271f33bf23fb1,2024-03-13T18:15:58.530000 @@ -243290,7 +243290,7 @@ CVE-2024-20345,0,0,e5a5f742b4ff4031a273ec9fe2b2ad050940d29d6b880414ea07f31d237ee CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657528,2024-03-06T21:42:54.697000 CVE-2024-20347,0,0,b7a6ed5ce0c3cf37e0f41269507973b9ad509f6fe22a9ad105d991e5f0ee5809,2024-04-03T17:24:18.150000 CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000 -CVE-2024-2035,0,0,110d7e573a79ae4fed8a8a9d020094f1c8f635a8a07029ac6a9636d645716be8,2024-06-07T14:56:05.647000 +CVE-2024-2035,0,1,216279b16f620c2ff4b0a8961dd1dd14e0bafebc256a395c018effc533e0c28d,2024-10-11T14:20:05.590000 CVE-2024-20350,0,0,ce1cacdaf13a845b8d98c0a6a0f4f6a156cfd7f19262d1a8cb538a5177cf3a48,2024-09-26T13:32:02.803000 CVE-2024-20352,0,0,b6df069392724fdc834a80403afd09f590785680a76232df596c3f6fea90f0b6,2024-04-03T17:24:18.150000 CVE-2024-20353,0,0,e2f72ffa3936c97cc6267050a0bce7d53259a8a25c98d8322d782dc399b18d7e,2024-04-26T15:22:27.803000 @@ -244248,7 +244248,7 @@ CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957 CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000 CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000 CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000 -CVE-2024-21534,1,1,e9a2fb876451236a63c5658427831aeaad2a3c760a252645fbb31cc597f5996c,2024-10-11T13:15:15.667000 +CVE-2024-21534,0,0,e9a2fb876451236a63c5658427831aeaad2a3c760a252645fbb31cc597f5996c,2024-10-11T13:15:15.667000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 @@ -244359,7 +244359,7 @@ CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c3 CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000 CVE-2024-21690,0,0,63aa6e78c909be7fa5e5f93bbdaf8524fe66cd24db06ace89e57fd339e74e16d,2024-08-21T17:25:08.560000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 -CVE-2024-2171,0,0,e9c79cd9676afcf55166b18cc4887c5a70983811183f36611429f962ee8d8a26,2024-06-07T14:56:05.647000 +CVE-2024-2171,0,1,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000 CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000 CVE-2024-21722,0,0,d14653ceeea554498f54b290b2aca83cfb5fff4d83fdd9da44383d93a67c6521,2024-02-29T13:49:29.390000 CVE-2024-21723,0,0,c123a68ae41218e084e71266e368c668840ae873b9865a9853aeca12024bce7b,2024-02-29T13:49:29.390000 @@ -244663,7 +244663,7 @@ CVE-2024-22126,0,0,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6 CVE-2024-22127,0,0,a93c2036d31e75652d8f4eeafd412b70336432f9ad8255c87f034d5f74373945,2024-09-26T19:15:06.897000 CVE-2024-22128,0,0,867f07a0106f89603e780ece7b7a835f530d6c4dbff3b43b95585dfd576bd64e,2024-02-13T14:01:40.577000 CVE-2024-22129,0,0,f98c249f22037a19179779366a2c80b4076872a899c468771d964e4af4fceb0b,2024-02-13T14:01:40.577000 -CVE-2024-2213,0,0,7fd551058f046d77eb1a4cf2d0d948758135ebe94e3b98da926a348ec52ecf83,2024-06-07T14:56:05.647000 +CVE-2024-2213,0,1,f67e62c176cc50eea5691c81fd80a750d99ec2626a8cb82c5910f3ff3bb4b956,2024-10-11T15:34:13.917000 CVE-2024-22130,0,0,5ed0ed7580c6b16e4b4d4465f7bd620f9bc720fd41b6a14f15023a4623d35141,2024-02-13T14:01:40.577000 CVE-2024-22131,0,0,5d57fdc8574f410d9e8b9e92818f8dc89d84e4b8696d16ecf9571f3e333a1aa5,2024-02-13T14:01:40.577000 CVE-2024-22132,0,0,54e54d90c1a6eccad4526c21ce60d5380b28635e494938ddcd8287edd9000207,2024-02-13T14:01:40.577000 @@ -245859,7 +245859,7 @@ CVE-2024-23826,0,0,0e19bb73496b56241ec1393e830256f0e651e66f2aeb56d305bbed867dcf5 CVE-2024-23827,0,0,88cd36b23e4c9b06278751a6ce065ce9e9148c4ed002cd1a1018fa7cdb9d0f0d,2024-02-08T16:42:39.110000 CVE-2024-23828,0,0,12c264e511fd276a0815fd8fa2c90d2715bd4b8a7c7e80a8971f8b69c2e16283,2024-02-08T01:52:59.010000 CVE-2024-23829,0,0,d20e51dffa2680891d1f56892d162957e9eb02a78ee8014771cc2f205a6c1359,2024-02-09T03:15:09.727000 -CVE-2024-2383,0,0,5baaecb0a63919d5306bee01ae70faa1d7c0f2faffd66b4577bb26ae97e32397,2024-06-07T14:56:05.647000 +CVE-2024-2383,0,1,585ce3a48313228947e40f9e72b94221ce0a7d581a1242a34676aeed0a2812e6,2024-10-11T15:11:36.580000 CVE-2024-23830,0,0,baf51b255b1d611a2691efce00c0d171805679867f73d6b48c17ea5c48d6f748,2024-02-22T19:07:37.840000 CVE-2024-23831,0,0,85dc29d4c69ed89d07f94e734e98d7fea8d9a8dd87844133c4b3378b980f85af,2024-02-10T01:43:51.527000 CVE-2024-23832,0,0,2c53e6677810065a49b3c27a486b6f9b7ab7331e27ed402ea99d5e5d9c4aaa28,2024-02-09T20:21:45.317000 @@ -246316,7 +246316,7 @@ CVE-2024-24712,0,0,3ce82ed3dbba4a1266ae48850a7e5d1eba1e2e33ca5bffdc98a0db24ee30e CVE-2024-24713,0,0,52afc21d6224568c6697d808bc9a47c19a481881c687daeca2410c820000a3c3,2024-02-16T15:48:04.237000 CVE-2024-24714,0,0,9830caf628a09779e02281df3c0926b55f872fdfc96b7c09f63ab4c7aaa34ee8,2024-02-26T16:32:25.577000 CVE-2024-24715,0,0,df613a0629c25698f31c95093d6a5baf856fd321ac48e0920cbbf12ecbcaf49a,2024-05-17T18:36:05.263000 -CVE-2024-24716,0,1,03218f90a32026e3929c445b132b8d6e3cf6f6f12e62ba420a78f461a5bb74f0,2024-10-11T13:57:18.657000 +CVE-2024-24716,0,0,03218f90a32026e3929c445b132b8d6e3cf6f6f12e62ba420a78f461a5bb74f0,2024-10-11T13:57:18.657000 CVE-2024-24717,0,0,1e08cae8189f922d5322db91237b1bb9b993f8def8bb3809529f3fb6b7d2943a,2024-02-16T15:52:02.283000 CVE-2024-24718,0,0,78df8cc0c25494eef903251158c69eb3ea4405c30df26d203bbb903d68a110cb,2024-03-26T12:55:05.010000 CVE-2024-24719,0,0,128db11816302a7b9f59f8f63502e5f473a1559ee5ef8793bf52ae1d8f696645,2024-03-26T12:55:05.010000 @@ -246631,7 +246631,7 @@ CVE-2024-25089,0,0,e665d40e71849b52a984e51750a3ed30341c4f9c0766ccd2a466247b89c7c CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000 CVE-2024-25090,0,0,f85b3bcd033b385efb1c9f266ce72e41f2e2d9369cf294e95ea532fc1e35d52c,2024-08-16T17:56:31.230000 CVE-2024-25091,0,0,d822656b63074e0c8fc140e02cdc2082434684ada7eeff085f5eee9f7616d66b,2024-08-05T19:35:03.780000 -CVE-2024-25092,0,0,55e91ecfcb32027bf20dfb700d408bcea15ef7678965bccf4e36ec7f97531eb0,2024-06-10T02:52:08.267000 +CVE-2024-25092,0,1,56f6a1654ad546d6f817b6de3fa6c216c372bd5e8d2b8a33a240aba29f82d83b,2024-10-11T14:01:36.157000 CVE-2024-25093,0,0,b8e6c12d6bc03129058956c6365ec4ac1bf71d6b0585045592f329dee7756d25,2024-02-29T13:49:29.390000 CVE-2024-25094,0,0,ad3e5b0466772b712a14a0bddac43dd4f4819c3d63cbd9b0815d48c9b0e7e172,2024-02-29T13:49:29.390000 CVE-2024-25095,0,0,bb6cc09068dcd9cfe15336a730699bbb76ab1600e21b01f93afff7d69f965730,2024-06-11T14:28:47.063000 @@ -246966,6 +246966,7 @@ CVE-2024-25618,0,0,521c40d6483be23c844eadaa045ad9d81526af9d0f0bb15136fa0c5a206a3 CVE-2024-25619,0,0,8779b5460540f75c401ccd25f8dbe7701a4130884fad041c3d9ce354daffff0f,2024-02-15T06:23:39.303000 CVE-2024-2562,0,0,19a87309d0aee720c095694c940b1c491bc221c82ab64cac6db44d1a3b485bf7,2024-05-17T02:38:19.323000 CVE-2024-25620,0,0,300c4d5071efb47a78a0fb6f763869e8a3b4f9eb84a3a8b58578d91ae7032adc,2024-02-15T06:23:39.303000 +CVE-2024-25622,1,1,5b63bd8ab3671727fc4934263e53e235153dc89d47440a1ef7a84ade69598f31,2024-10-11T15:15:03.947000 CVE-2024-25623,0,0,f8aa2dcefcad5cecc7d7e57a874064d3a0b27ee38334e8a58338063ed42280e1,2024-02-20T19:50:53.960000 CVE-2024-25624,0,0,f71711e300e3eaed808809e7a9b2c0205a6a35fe783a8ef447c3f23895a43c9c,2024-04-25T17:24:59.967000 CVE-2024-25625,0,0,aeab25de3fe3426b54f1a4e56db1601e91367a113c3d5e8c5bad9b4b6dbc113e,2024-02-20T19:50:53.960000 @@ -247172,7 +247173,7 @@ CVE-2024-25925,0,0,22f9ec8621282e1a8a1afbc1eb92d4312535423b9dcf0bada4274d43ed2f2 CVE-2024-25926,0,0,4391b0a06332370eae56811249ca3e41fbdb4ddd43556fe255f0310a21e6ff0c,2024-03-27T12:29:30.307000 CVE-2024-25927,0,0,925620cd9b38dcdda82c5dc23471163f79f192ef57aac2bbe126924d650c3754,2024-02-28T14:06:45.783000 CVE-2024-25928,0,0,fd24c28c5a2106d771e03de6727087950c7f1273f0c987997f5bb867af2abd16,2024-07-08T10:15:03.440000 -CVE-2024-25929,0,0,f2f0a86db6975c9fd3629b3f2bf48224559e3a6c49eb7650799828c64ae145e4,2024-06-10T02:52:08.267000 +CVE-2024-25929,0,1,480ee3dd4150dfd79792ad84012452e1d8bc7873232886fdf5f92a705e92d1a5,2024-10-11T14:14:03.307000 CVE-2024-2593,0,0,48ef9ed3bc84639488e2982ab4982794cf82c836e8a371e79709a362c958dc80,2024-03-18T19:40:00.173000 CVE-2024-25930,0,0,7e8d22fed1f68607862d17657ef4ed84dea59def55af9cfaaea63955bf9a222a,2024-02-29T13:49:29.390000 CVE-2024-25931,0,0,f3d7891ece428c86c8c7b41314dd3c18ec196061975145f8b4d656b5f007d9dc,2024-02-29T13:49:29.390000 @@ -249798,7 +249799,7 @@ CVE-2024-29273,0,0,c5afb013b946ae2c73d92fcbdb0c49112c4146cc606c2998618843bfb65ff CVE-2024-29275,0,0,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000 CVE-2024-29276,0,0,3fe0ff3115a6de0b961257e7bc711a82773397cfe1f1f315880654f9d5c4ac13,2024-08-20T15:35:05.580000 CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734adfd,2024-08-01T13:49:28.357000 -CVE-2024-2928,0,0,3c94f78fdc9693c8d4fbabf25517e239d8aeb55c719006a8f637d8f4c525f953,2024-06-07T14:56:05.647000 +CVE-2024-2928,0,1,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000 CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000 CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000 CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000 @@ -250982,7 +250983,7 @@ CVE-2024-30986,0,0,50bf73db50b86d4c968284f5c4b0e8d0b6efe4fcd4367f443266d913e675f CVE-2024-30987,0,0,d1d62de096c2c3115b43f8fcf5757229f772e23999bb93b7a966e16e64b7f7a4,2024-08-01T13:50:36.050000 CVE-2024-30988,0,0,01d0dacd03ce1e26e7a1a12da7c9a8997536bc1daebf62cfd5619e9d35194abd,2024-08-01T13:50:36.877000 CVE-2024-30989,0,0,e9ad3f0fd7b020db169e00582a63ad0d4a4ddd2830c93dde81a132eb7fa9369b,2024-07-03T01:54:32.110000 -CVE-2024-3099,0,0,df7fc1fafeab5e6abe2dc41108eea9b5e0baaaf382657013f126d487be466964,2024-06-07T14:56:05.647000 +CVE-2024-3099,0,1,3517f63d25d45bf5a28b20d6bf1dc0c4cf25507da4eb6c081dba457e7fc36f40,2024-10-11T15:07:16.690000 CVE-2024-30990,0,0,75078c15117c3d94d275d45a8f694936bc8470fa4ed9b39cfc5d97a4cf718730,2024-07-03T01:54:32.807000 CVE-2024-30998,0,0,57a3e20b2db27a64aaab3601a5ceeb1ef9f704ed4059172be2576aa4d50b912e,2024-08-01T14:35:09.133000 CVE-2024-3100,0,0,dd1299175bc3853ed90e594c5d6917a6ed69e47eea50894b7016f04c6daab02c,2024-09-14T11:47:14.677000 @@ -253249,7 +253250,7 @@ CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d1 CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000 CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000 CVE-2024-34121,0,0,220da874534eda8c169c4a74cb0f772415521c8587102b4cac8aee70173073d0,2024-09-16T11:55:00.837000 -CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000 +CVE-2024-34122,0,1,1ec0410a2782988212e8d53b9aff3b950baab8772620259cd2192140e3a735de,2024-10-11T15:01:24.393000 CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000 CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000 CVE-2024-34125,0,0,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000 @@ -258331,7 +258332,7 @@ CVE-2024-41813,0,0,91e03e36b9e87581405a8dd69398040d61a14fc0a45ce589d6f6ebdb2f6ca CVE-2024-41815,0,0,fa3c6b5fdaad718b40db16c805a164fa7a9b4ae5ba2f85a17caaeb17fb76200d,2024-09-19T14:36:12.677000 CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000 CVE-2024-41817,0,0,55d2f9b0a2075c2da5349f298b0dd31b3b48148f233e37649ddc262d2d2d446f,2024-10-10T17:25:47.637000 -CVE-2024-41818,0,0,34e8576dcb1a1bd2ef0841435c6e4eb9b22f044d76175d55bfedd30532739326,2024-09-11T16:09:46.303000 +CVE-2024-41818,0,1,f64eda9b558aaea8d52b8617c6abe39d371614ae2626fd147bbc82265e96d00b,2024-10-11T15:15:04.190000 CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000 CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000 CVE-2024-41820,0,0,66761f44932ba996701075032b581c0ebc2041a25ba2c4f14ccc68178ac408dd,2024-08-06T16:30:24.547000 @@ -258521,7 +258522,7 @@ CVE-2024-42059,0,0,8bc741d7bdfaaf9d2da11c07689da148a970f0d71cd8bf616b239e5bbf7cc CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000 CVE-2024-42060,0,0,ff15c22376c8dde36cedf61eeb3084b3bf28f3c70c1acd3697d4c1f3846960a2,2024-09-05T14:37:03.387000 CVE-2024-42061,0,0,ac3d3c8fb09e0caaee82bc4a33d8dd91e2bd7a37069679b697256fa9ff42392a,2024-09-05T14:32:24.620000 -CVE-2024-42062,0,1,c09a77ed3aa77cb9e4fef5efc171ea522dd440c969579c3982e4eecaa9460cde,2024-10-11T13:26:48.907000 +CVE-2024-42062,0,0,c09a77ed3aa77cb9e4fef5efc171ea522dd440c969579c3982e4eecaa9460cde,2024-10-11T13:26:48.907000 CVE-2024-42063,0,0,fb176955212cbbe386510b916a6cf2daadc2bf4a1d6f4bce61554db1fd1f0fc1,2024-09-05T17:42:12.670000 CVE-2024-42064,0,0,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000 CVE-2024-42065,0,0,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000 @@ -260478,9 +260479,9 @@ CVE-2024-45311,0,0,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2be CVE-2024-45312,0,0,ef764c6defa41a6edf70254d24eaf293afa21b3c3fa7a94ab70b620cdfc67947,2024-09-25T18:37:23.867000 CVE-2024-45313,0,0,4968bb4eb1a02bcbcbe90803b30cccb5c26bf5a74af49d29e0350cd8e0738664,2024-09-25T18:12:53.543000 CVE-2024-45314,0,0,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ecee3c,2024-09-12T16:39:53.690000 -CVE-2024-45315,1,1,ba3d6bb772ee39d6bc5499016a92ac1f8c569adfb2fb030be2d2783f6d06e78e,2024-10-11T13:15:15.883000 -CVE-2024-45316,1,1,4e5892b82028d8fdbdd8305179407511ff3766332bf35730ff0ba8e888812f60,2024-10-11T13:15:16.010000 -CVE-2024-45317,1,1,275e9c03739456c391fe81ca5fee61b756e8c635c4f5a6c7e3a5dd1910911ac8,2024-10-11T13:15:16.103000 +CVE-2024-45315,0,0,ba3d6bb772ee39d6bc5499016a92ac1f8c569adfb2fb030be2d2783f6d06e78e,2024-10-11T13:15:15.883000 +CVE-2024-45316,0,0,4e5892b82028d8fdbdd8305179407511ff3766332bf35730ff0ba8e888812f60,2024-10-11T13:15:16.010000 +CVE-2024-45317,0,0,275e9c03739456c391fe81ca5fee61b756e8c635c4f5a6c7e3a5dd1910911ac8,2024-10-11T13:15:16.103000 CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000 CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000 CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f75b,2024-09-20T16:23:51.397000 @@ -260512,11 +260513,15 @@ CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb CVE-2024-45393,0,0,6f436bc32d420db4f8aef33efc64d5a86243ff621c73802c298c0db31d80b7a3,2024-09-10T15:50:47.237000 CVE-2024-45394,0,0,087a53dae86480e9cc9b0f35c92b2e1955ad080485b753f37f05c38b033a4e79,2024-10-09T15:15:13.600000 CVE-2024-45395,0,0,5d56a4af61ec059101686b1e7cb37e5e2b811fdef7d02e3f80cc3ab9c9de60ec,2024-09-24T16:50:07.930000 +CVE-2024-45396,1,1,abc3a56de497c3db1e9c719057589373f50ec3488667ad449d86758239d1ace7,2024-10-11T15:15:04.457000 +CVE-2024-45397,1,1,ba9520d135d5b299165373f021d4c7e18285bf6fe4c285c8a95f632fc301f1f5,2024-10-11T15:15:04.690000 CVE-2024-45398,0,0,7d0ffef7297178b253d2c7dc1d3134ea1f5d20b5e1c2ba29b34a3e96958f60bb,2024-09-25T19:20:52.527000 CVE-2024-45399,0,0,00e25ddf2914c9fa87aad2e5386f06040c0acda61d936c8ae5f89b710f3a24c9,2024-09-24T16:48:10.083000 CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000 CVE-2024-45400,0,0,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000 CVE-2024-45401,0,0,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000 +CVE-2024-45402,1,1,5faab78cba4c9a6e607d0e81f8111307b37f2eedf4e571c4a57ad4c467db3e04,2024-10-11T15:15:04.903000 +CVE-2024-45403,1,1,39d857cd7bc12bdf5b626798796853ec2e5da6755b289b55edc31256410da729,2024-10-11T15:15:05.123000 CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000 CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000 CVE-2024-45407,0,0,761b4924e4b46db1752cf42f388ca76c7e573211ea8b116cb02c0d2e460e33eb,2024-09-20T16:18:46.717000 @@ -260751,7 +260756,7 @@ CVE-2024-45919,0,0,a4f6c3aaae803704b42db170e95e39ee4fc8065aa544a81df40b13b36d1e1 CVE-2024-4592,0,0,14c53bd50ede1a956ff9d7a3d25f38fbc0411a373abc96f1d6d1bef77fb32c4e,2024-06-04T19:20:43.560000 CVE-2024-45920,0,0,ea56e67e89fba77fab53ce0c18965669797ee29dd0e8472343575caa10980571,2024-10-04T13:51:25.567000 CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb2101508b,2024-06-20T20:15:19.237000 -CVE-2024-45932,0,1,2ed9f934b88b8715dee6d1403606d8675e56a0a52183b37f1e481d7c65afc5b2,2024-10-11T13:21:12.003000 +CVE-2024-45932,0,0,2ed9f934b88b8715dee6d1403606d8675e56a0a52183b37f1e481d7c65afc5b2,2024-10-11T13:21:12.003000 CVE-2024-45933,0,0,5a4c436ed920625b31726987668deff1799338d95efdc881a4c3f3acc7baa01c,2024-10-08T19:35:19.013000 CVE-2024-4594,0,0,6353480e983dfe68c6b174c583e75b67b6ebde5befefc4e80bf75a35aedb2302,2024-06-04T19:20:43.657000 CVE-2024-4595,0,0,a34d956039b7343ba69c0066573aab0165928a92f89b42d7c5d672a51296492e,2024-06-17T19:15:59.063000 @@ -260882,7 +260887,7 @@ CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe25 CVE-2024-4643,0,0,e0d3f81442e9e4f0746a278d66a7c607383f7f5939cd80bfd5eea7a68cf6b0a2,2024-08-02T12:59:43.990000 CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f6378,2024-06-04T19:20:44.287000 CVE-2024-46441,0,0,4b4be1d9027655599991c0b9ab932c1005548268b9b4c663bc49101f1899dc44,2024-09-30T12:45:57.823000 -CVE-2024-46446,0,1,7f5ebc0973c576e460839166e88991df0085c970e43622beb014216e304658dd,2024-10-11T13:04:46.337000 +CVE-2024-46446,0,0,7f5ebc0973c576e460839166e88991df0085c970e43622beb014216e304658dd,2024-10-11T13:04:46.337000 CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000 CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000 CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000 @@ -261274,6 +261279,7 @@ CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1b CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000 CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000 CVE-2024-47071,0,0,2a2727cf2aa9f31ddc31166413e132f87e7e569f257fdb08eb6f77a7cd1bf2ac,2024-10-04T13:51:25.567000 +CVE-2024-47074,1,1,6aee76412b8391ab2444040d9063f8b7e2e0a9e3d5a524462cecc27bf455c642,2024-10-11T15:15:05.353000 CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000 CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000 CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000 @@ -261497,7 +261503,7 @@ CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be1 CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0c29,2024-10-04T13:51:25.567000 CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000 CVE-2024-47532,0,0,8782a61a2e6393b4eaa2920ce672fbaf71cd431530e5dbfab9dfea37a0c9da22,2024-10-04T13:51:25.567000 -CVE-2024-47534,0,0,2c8638aa4776b453b12ca3480cb4741f7283b9b6a2cc41fc9eec726fcf451424,2024-10-04T13:51:25.567000 +CVE-2024-47534,0,1,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a057,2024-10-11T15:15:05.490000 CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000 CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000 CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 @@ -261627,6 +261633,7 @@ CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000 CVE-2024-47828,0,0,2a3f37a9071256a649791f70c6456109926a20b394ceabbba1acf5e3bcc75ff1,2024-10-10T12:51:56.987000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 +CVE-2024-47830,1,1,078fd3f57c1e124fe25812fa092e081898b54bb5455f5ac15a9ac7b0028bfea1,2024-10-11T15:15:05.613000 CVE-2024-47832,0,0,6eaf4cba1d0f1ac09d634a837b942c4a4d31fbca5ff514618ce9cde402d23db0,2024-10-10T12:51:56.987000 CVE-2024-47833,0,0,780bba6686a13dc95d3fa2e5d0a56f764e3e264192219eb33ec68032f867f21c,2024-10-10T12:51:56.987000 CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 @@ -261649,6 +261656,7 @@ CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f CVE-2024-47870,0,0,67440b65a260801b69dd4b36e2659045709b26a62ba343a9258c4e21ff3805ba,2024-10-10T23:15:03.070000 CVE-2024-47871,0,0,4598420fb90bc720fd4ef6c3c6d6760832c25f6aa06e45d621b9a1ef226d8d4c,2024-10-10T23:15:03.187000 CVE-2024-47872,0,0,8471c34cf55992e157ff7eba332e41edd983c92bf011e2e751c8d26e7ec94000,2024-10-10T23:15:03.303000 +CVE-2024-47875,1,1,078af0f210e8e30655ff63e30537d1f8dba962d087e301c359afca4f246d0946,2024-10-11T15:15:05.860000 CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000 @@ -261772,7 +261780,7 @@ CVE-2024-48958,0,0,a8ea5041853fb7fcb2158a179eb96f8aef37701d1e6738c4d3b90b08bd953 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 -CVE-2024-48987,1,1,1b465c51a79913665e7786ff50ee27be5e1d6dd26e7dd86eff14b0f4535bc2bf,2024-10-11T13:15:16.197000 +CVE-2024-48987,0,0,1b465c51a79913665e7786ff50ee27be5e1d6dd26e7dd86eff14b0f4535bc2bf,2024-10-11T13:15:16.197000 CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000 CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 @@ -261861,7 +261869,7 @@ CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf875190207207,2024-08-01T13:59:37.720000 CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000 CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000 -CVE-2024-5005,1,1,e9dd73ffa50e0cdeafd34f8309b57c5a00750a217333583677cda9600bcf87a4,2024-10-11T13:15:16.317000 +CVE-2024-5005,0,0,e9dd73ffa50e0cdeafd34f8309b57c5a00750a217333583677cda9600bcf87a4,2024-10-11T13:15:16.317000 CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24 CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000 CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000 @@ -262320,7 +262328,7 @@ CVE-2024-5501,0,0,26070cb64be69726a3e53d21c4a7b37433e6fc5848925edeefa1dca5b1a345 CVE-2024-5502,0,0,f44f822caf8b5e7052917a73385fe306a6112aedf052b972c8897c4cfe3388bb,2024-09-12T21:05:37.880000 CVE-2024-5503,0,0,1cb7ec9812df8ec09d21a8b50ab54c8421f9f9a3696399f8cf01057ff5629e64,2024-07-17T13:53:37.643000 CVE-2024-5504,0,0,c9387f8cc727d3178a2e16ac3c8996c4ce5ec1145aa8a5124e81e8cb3cf535a8,2024-07-05T14:46:38.860000 -CVE-2024-5505,0,1,1ca65340d1028bce6c7b624817db2c877a4d7215737966ade735b74b7581f391,2024-10-11T13:33:54.853000 +CVE-2024-5505,0,0,1ca65340d1028bce6c7b624817db2c877a4d7215737966ade735b74b7581f391,2024-10-11T13:33:54.853000 CVE-2024-5506,0,0,a39671e78235b40037509107b8c421fae2ab16362444587707c25560f1578156,2024-08-09T13:30:46.827000 CVE-2024-5507,0,0,25b7ab5155252ca6c92d8fe7bfa1cedb021cca01f945599561ed2a09d85f7e8f,2024-08-09T13:30:39.467000 CVE-2024-5508,0,0,2b850c2308fdad40eba67dafab3c18f5e4849c085d14c12319395964a2a53adc,2024-08-09T13:30:49.043000 @@ -263304,6 +263312,7 @@ CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000 CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 +CVE-2024-6657,1,1,f9f1eb8afc0fcee1648ff3b1592d9c7d58198951ffaa3d5eddbf57bf7a2d64a5,2024-10-11T14:15:05.770000 CVE-2024-6658,0,0,7f941e970e0ddd88d17ac95cf96717b7dab27bb1b6ec72400c0fd64e8c2d71b4,2024-09-23T20:15:05.560000 CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000 CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000 @@ -263549,7 +263558,7 @@ CVE-2024-6967,0,0,57fa919e819063e047f2b3f1e91ca78ed8e25c795dd23e1130d79afda274d9 CVE-2024-6968,0,0,dcf4fdd98b06a8e0045757b1e3508bd497797b584b272df840a344f24010b384,2024-08-19T17:49:54.017000 CVE-2024-6969,0,0,a98e2b6f93f948b11fce949d5d2bf2ae38a52860637730f6865f49bf11e07542,2024-08-19T17:50:03.167000 CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 -CVE-2024-6971,1,1,cdd9ef25f6aa6f7b77c5d87fd6b384bb2995225b4dbdd54002171c4e418ac2ad,2024-10-11T13:15:16.537000 +CVE-2024-6971,0,0,cdd9ef25f6aa6f7b77c5d87fd6b384bb2995225b4dbdd54002171c4e418ac2ad,2024-10-11T13:15:16.537000 CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000 CVE-2024-6973,0,0,9bcac54b07f64371109cf6c17f16f57c8cc24336c737269dc5d4e2a7b649dbb8,2024-08-27T15:34:18.620000 CVE-2024-6974,0,0,87e35dfa7758fb3e456f51ae7c2c1005342757b141d54c95c0eb015bf95a4e2c,2024-08-27T15:36:40.667000 @@ -263577,7 +263586,7 @@ CVE-2024-7001,0,0,c36cc44ed743aca43eac7951b6662bd893691f9a45d57142d09098c4fe318e CVE-2024-7003,0,0,c2f51c1b71164a15818ef9209a48a467e859077ffdde417023c4b7a222f91993,2024-08-07T19:52:18.500000 CVE-2024-7004,0,0,579c7092925f522b24930d2f858d246e2f0e8b8814ade95b044da8929a9fa444,2024-08-07T21:32:44.190000 CVE-2024-7005,0,0,50047c6e5a9aa1663d251a4f8d2f7feee05d4f308668b613173701adaf5c68b3,2024-08-07T19:56:48.777000 -CVE-2024-7006,0,0,407596314396364e4943bbca86287583cbccbfd5ef54346220152eb6a6a02378,2024-09-06T17:15:17.387000 +CVE-2024-7006,0,1,d510a15f87dd1c79e35f8009bc9e9e19d5574ea60c240c6e393b2fbd477adf6c,2024-10-11T14:39:13.093000 CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000 CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000 CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000 @@ -263965,7 +263974,7 @@ CVE-2024-7506,0,0,8ce5e793bea3ef05c090588e0452278f00c3b03b884fc5816b50a2fc0825ed CVE-2024-7507,0,0,6bc1191146772bbaa999b0d6a827100d208121d95729ccca9fad3126c9340161,2024-08-15T13:01:10.150000 CVE-2024-7512,0,0,64969c8356c27f20386cdfa0c38d50ded85817d5026c9d96e7d342b04fbd9f28,2024-08-30T18:19:01.187000 CVE-2024-7513,0,0,9e0dea33b007eccb273e626ffa6cce86e938d130dbfcfa937121ca05aa4099ce,2024-08-15T13:01:10.150000 -CVE-2024-7514,1,1,69b1748af2de10381664303f051e51fd916f2db8bcda8cccf3fa904fe275ad04,2024-10-11T13:15:16.800000 +CVE-2024-7514,0,0,69b1748af2de10381664303f051e51fd916f2db8bcda8cccf3fa904fe275ad04,2024-10-11T13:15:16.800000 CVE-2024-7515,0,0,3a174c853c7ff7ac11f06a078625d3fec604b25f74f3c9dd6a512b7295373686,2024-08-15T13:01:10.150000 CVE-2024-7518,0,0,3d74948c02d4c957921d5b67aab57df80b7795ebc72bd26ca456b0a500d24f9e,2024-08-19T17:52:53.887000 CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da32737657,2024-08-12T16:04:20 @@ -264714,6 +264723,8 @@ CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cc CVE-2024-8522,0,0,2ab431c4f2cf5ab967664e41dd1dc524f59071081def8323632354294bee4f38,2024-09-13T16:12:30.497000 CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000 CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38b9,2024-09-13T16:11:25.400000 +CVE-2024-8530,1,1,6f70a04c33a47c6b2d9ca700997a218001fbbbbfcaad3aa47eccbbbdc529e1b7,2024-10-11T14:15:05.970000 +CVE-2024-8531,1,1,bde030e3249e7673e1400e4ea79ce391a49b7805603c284567aa0e282874b56a,2024-10-11T14:15:06.173000 CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000 CVE-2024-8536,0,0,a7b1e09acaf4ac1b8946f962d2bb0e6dee99d2fed00608df37ed579fb4435262,2024-10-03T18:16:17.740000 CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f49,2024-09-26T16:28:02.990000 @@ -264858,6 +264869,7 @@ CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b56 CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000 CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000 CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000 +CVE-2024-8755,1,1,d48cd781a066209d88f0be43bcbea7039d3c727125dd2ea2d4b21d6a406c14cf,2024-10-11T15:15:06.150000 CVE-2024-8758,0,0,fea72da3ec447aa80df355b080e42aa6b936f28594d975635bc512eef8e85985,2024-10-07T21:35:03.193000 CVE-2024-8761,0,0,848a595fd57d8370e05b835997d27866b56b6fe7dc68e418780d166762e6c8fc,2024-09-27T18:41:43.043000 CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000 @@ -264927,7 +264939,7 @@ CVE-2024-8908,0,0,814a632e733410078b07e9411999ce68ca7ad8b9d3cd0621cbfe771be63227 CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c0d,2024-09-23T17:51:11.790000 CVE-2024-8910,0,0,381e6285f77cbfcd68b12e9f3c36f92b4377fd4642413a4087debb4746eed093,2024-10-03T17:34:27.913000 CVE-2024-8911,0,0,3e740b3cf92ecc1f17356bd7912ea5093c6c60b7cb91fb7bff5c155129d89dfe,2024-10-10T12:56:30.817000 -CVE-2024-8913,1,1,a55fc5932b647838acfa904d967ecbcbbf1a8451e2d81f1f3b7968e9aadf354c,2024-10-11T13:15:17.040000 +CVE-2024-8913,0,0,a55fc5932b647838acfa904d967ecbcbbf1a8451e2d81f1f3b7968e9aadf354c,2024-10-11T13:15:17.040000 CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000 CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 @@ -264954,7 +264966,7 @@ CVE-2024-8964,0,0,c8fc4fc0d8f6e4149ea3cd0239ed4708c78c8d6f77eb0df4938d6649d94bf7 CVE-2024-8965,0,0,fcd9a7faf9aba17ebbc93d83d1389f5891b9c0797caaf85615a1a91da1ce5a78,2024-10-04T19:04:03.157000 CVE-2024-8967,0,0,0e61388d89e65d4552c8513d8ec8c307c7a4bc14fde1f860df9e7663ba49f28c,2024-10-08T18:47:12.110000 CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000 -CVE-2024-8970,1,1,01220d239772239c552efb8067c56a2081891e04faac8e9af54c0668dd9acf39,2024-10-11T13:15:17.270000 +CVE-2024-8970,0,0,01220d239772239c552efb8067c56a2081891e04faac8e9af54c0668dd9acf39,2024-10-11T13:15:17.270000 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 CVE-2024-8977,0,0,1854c355a879a1753be7595f13bc9f67fdb20e00c1bb5266672eb0282e59a99d,2024-10-10T12:51:56.987000 @@ -264967,6 +264979,7 @@ CVE-2024-8990,0,0,ebe58ed4a084d59384bf44303a373b31562e7163a1320c584d218212811f28 CVE-2024-8991,0,0,36ea31132f642cce3da65bf6a2c52220b14f1ba567442136b19c870ca92cc82c,2024-10-04T18:56:30.583000 CVE-2024-8996,0,0,b0907780bcace0477557b6ba9bb55a2aefa2e27bdc88e1eb50e40fe332316c17,2024-10-01T19:16:02.793000 CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000 +CVE-2024-9002,1,1,0d06cbf5f4a846a907b6a2a43d11d3555b8d2bcf703850c328ef4cac300ffef6,2024-10-11T14:15:06.397000 CVE-2024-9003,0,0,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000 CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000 CVE-2024-9005,0,0,61099b22866a74984f444f0a6d108911a7f5d019e3cfe0c7b08ac38e148f742f,2024-10-10T12:56:30.817000 @@ -265001,7 +265014,7 @@ CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000 CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000 CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000 -CVE-2024-9051,1,1,cd9f5066c63e39d4ce5479a5ea7f24fe1eed0d9db90cc0d316834afb0392bf0a,2024-10-11T13:15:17.477000 +CVE-2024-9051,0,0,cd9f5066c63e39d4ce5479a5ea7f24fe1eed0d9db90cc0d316834afb0392bf0a,2024-10-11T13:15:17.477000 CVE-2024-9054,0,0,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000 CVE-2024-9057,0,0,8f186945e14f31b85c7dab0f889179203746f07361926bd0e395e83df78388b0,2024-10-10T12:51:56.987000 CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000 @@ -265062,7 +265075,7 @@ CVE-2024-9156,0,0,15471148679479d1c4996386b3c830796b4238e3e438030cfa3cd455d3b543 CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000 CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000 CVE-2024-9161,0,0,64c617d54e278f215ea553b63862cfa05f613731871770da9abd12448d8f4117,2024-10-07T17:48:28.117000 -CVE-2024-9164,1,1,9992870700450aea4f4accfed1feb88e203e45183a15e0b94e4dc0ae91688c8d,2024-10-11T13:15:17.700000 +CVE-2024-9164,0,0,9992870700450aea4f4accfed1feb88e203e45183a15e0b94e4dc0ae91688c8d,2024-10-11T13:15:17.700000 CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000 CVE-2024-9167,0,0,c76cdd3c3965eaf83c5e43b4dbbb850b39e5a19995695c4b4450dc70c8263305,2024-10-10T12:56:30.817000 CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000 @@ -265084,16 +265097,16 @@ CVE-2024-9205,0,0,b718d7a20230ca5535d4a92f87ab8371c72ac9b0f2e1a0dacf1f87ee0d6efe CVE-2024-9207,0,0,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000 CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000 CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000 -CVE-2024-9211,1,1,b40f65a60be2c6015da846de87bd7d5129944a725366b63bfd4757957621ff10,2024-10-11T13:15:17.883000 +CVE-2024-9211,0,0,b40f65a60be2c6015da846de87bd7d5129944a725366b63bfd4757957621ff10,2024-10-11T13:15:17.883000 CVE-2024-9218,0,0,1fe5a0dc5cbc5663db71bfb2b02fdc2baeca2012618f21fc2618b5a68d78cab6,2024-10-08T15:33:58.617000 CVE-2024-9220,0,0,6bac7ddea6b917eb69cb1f74123e8b2dddc4799202193b6b6e16b0128e05e777,2024-10-07T19:19:59.487000 -CVE-2024-9221,1,1,096077e96e1fded3052ea04bb5a52b3671cedb20c32d84a0cd53af348fda881a,2024-10-11T13:15:18.100000 +CVE-2024-9221,0,0,096077e96e1fded3052ea04bb5a52b3671cedb20c32d84a0cd53af348fda881a,2024-10-11T13:15:18.100000 CVE-2024-9222,0,0,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931ef,2024-10-08T15:34:13.250000 CVE-2024-9224,0,0,1efb870d30ff5afb9078703fdeff1bc29463ebfa0c91ad435c25d902219ffec9,2024-10-07T19:19:38.157000 CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409ea,2024-10-07T20:24:41.420000 CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000 -CVE-2024-9232,1,1,addd3c21da65f2294fcd06790057fabd158db76d23e6e63a31e06745dd1630d7,2024-10-11T13:15:18.313000 -CVE-2024-9234,1,1,93ca479c6177293a6648dd18b24eccaa34af7d9740240888030f5df11e97e9ea,2024-10-11T13:15:18.530000 +CVE-2024-9232,0,0,addd3c21da65f2294fcd06790057fabd158db76d23e6e63a31e06745dd1630d7,2024-10-11T13:15:18.313000 +CVE-2024-9234,0,0,93ca479c6177293a6648dd18b24eccaa34af7d9740240888030f5df11e97e9ea,2024-10-11T13:15:18.530000 CVE-2024-9237,0,0,6dd007338b51674bd9fefd8518a997a164b381519066f168810e8e196c9bbc64,2024-10-04T13:50:43.727000 CVE-2024-9241,0,0,6c5cc70c23164aeead7a2ffa985d7e69869a7cd0428a8503a9e9f624c0c87b24,2024-10-07T18:51:20.950000 CVE-2024-9242,0,0,2931ce38d642cfa320383051a5a41609f3e037ff0fe51760f16b233825fad051,2024-10-08T16:26:06.147000 @@ -265153,7 +265166,7 @@ CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f CVE-2024-9341,0,0,6f06f8dbcaa27a536f49e7e7f0e59eeeae4e39f281abffa47a8e4056674c26ad,2024-10-04T13:51:25.567000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 -CVE-2024-9346,1,1,54562034e717f93a9c89f6030e73e47fb9b9d7abbbde9d33821c04e2f0a85d64,2024-10-11T13:15:18.740000 +CVE-2024-9346,0,0,54562034e717f93a9c89f6030e73e47fb9b9d7abbbde9d33821c04e2f0a85d64,2024-10-11T13:15:18.740000 CVE-2024-9349,0,0,7fb570a958bfb5f024d701411e107c7a9174d92283208cc2689922c41cd2d99b,2024-10-10T20:25:57.580000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000 @@ -265193,7 +265206,7 @@ CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c1 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000 CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000 -CVE-2024-9436,1,1,c614d641db09eb93f3fa9273339ad3a45d703acf00dc31c9fb2c75feea753153,2024-10-11T13:15:18.947000 +CVE-2024-9436,0,0,c614d641db09eb93f3fa9273339ad3a45d703acf00dc31c9fb2c75feea753153,2024-10-11T13:15:18.947000 CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000 @@ -265217,7 +265230,7 @@ CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000 CVE-2024-9484,0,0,09a6a45178e5434bfb1cb0415a67ebc11284aea03e94bd83c401b848478b5c91,2024-10-04T13:50:43.727000 CVE-2024-9487,0,0,be00f607ab07459b01c7648dac82f3c2af8f672daa92e4c79a618b3482e9ac23,2024-10-10T22:15:11.357000 -CVE-2024-9507,1,1,8206bf7bacd235440b174401074873d20230c205313133d40f97129830221ccb,2024-10-11T13:15:19.160000 +CVE-2024-9507,0,0,8206bf7bacd235440b174401074873d20230c205313133d40f97129830221ccb,2024-10-11T13:15:19.160000 CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000 CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000 CVE-2024-9515,0,0,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000 @@ -265231,8 +265244,8 @@ CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca7 CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000 CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000 CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000 -CVE-2024-9538,1,1,09ff8d828136926273e234a7df0de9f7df3e277701497c2d4680e9ae80291314,2024-10-11T13:15:19.373000 -CVE-2024-9543,1,1,0c6f45a8dc106427c9aa4a27ce0a99c89f29e67e9019a384d028eb17f2682b51,2024-10-11T13:15:19.577000 +CVE-2024-9538,0,0,09ff8d828136926273e234a7df0de9f7df3e277701497c2d4680e9ae80291314,2024-10-11T13:15:19.373000 +CVE-2024-9543,0,0,0c6f45a8dc106427c9aa4a27ce0a99c89f29e67e9019a384d028eb17f2682b51,2024-10-11T13:15:19.577000 CVE-2024-9549,0,0,de2015c0f448716988568c7b5dd774c121a80649e44094dfa56d887e4c1906a6,2024-10-10T13:14:51.793000 CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000 CVE-2024-9551,0,0,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000 @@ -265262,23 +265275,23 @@ CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df CVE-2024-9575,0,0,f6b14427489147da51632087d3ce5422a9383e0d7bccf4cb35592eda1a1d7d41,2024-10-10T12:51:56.987000 CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03f5,2024-10-07T17:47:48.410000 CVE-2024-9581,0,0,dcdedf39f55e8b175c72a20e72a1aed92038e920265594b4fc9925b7183ce1e6,2024-10-10T12:51:56.987000 -CVE-2024-9586,1,1,4368833d576d2d29a3be207ba4d3db2b319533357ac5aa66b9912c07cc7722e0,2024-10-11T13:15:19.823000 -CVE-2024-9587,1,1,38b4a379414497cd2c9f8e85abebac51b195781f8244dd7e6f13a7498e2e9af2,2024-10-11T13:15:20.043000 +CVE-2024-9586,0,0,4368833d576d2d29a3be207ba4d3db2b319533357ac5aa66b9912c07cc7722e0,2024-10-11T13:15:19.823000 +CVE-2024-9587,0,0,38b4a379414497cd2c9f8e85abebac51b195781f8244dd7e6f13a7498e2e9af2,2024-10-11T13:15:20.043000 CVE-2024-9596,0,0,41f14771e651cbc1c37017cbe5a91040128a2c351e859a7b312163502a24a950,2024-10-10T12:51:56.987000 CVE-2024-9602,0,0,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000 CVE-2024-9603,0,0,f06afeee14d2c3a95b2fa9bd06bec0b0c1ce9ce3a2d2cc5d2614c0b7bfd8287c,2024-10-10T12:51:56.987000 -CVE-2024-9610,1,1,86e6c47ecc50e652a252993dda4297709b0c2c74d4c2c73b4a97df11b17992ff,2024-10-11T13:15:20.257000 -CVE-2024-9611,1,1,4e24a5039fd5c970ef5777a01dadd4716b2307ab72d3f68640d9aef596a61e09,2024-10-11T13:15:20.487000 -CVE-2024-9616,1,1,427d25c8d45ea418bf8a87056898c397d29d771d358dfd779d3089cf093d9b7f,2024-10-11T13:15:20.703000 +CVE-2024-9610,0,0,86e6c47ecc50e652a252993dda4297709b0c2c74d4c2c73b4a97df11b17992ff,2024-10-11T13:15:20.257000 +CVE-2024-9611,0,0,4e24a5039fd5c970ef5777a01dadd4716b2307ab72d3f68640d9aef596a61e09,2024-10-11T13:15:20.487000 +CVE-2024-9616,0,0,427d25c8d45ea418bf8a87056898c397d29d771d358dfd779d3089cf093d9b7f,2024-10-11T13:15:20.703000 CVE-2024-9620,0,0,6bab3b47a8124e2f6e45a39c3f1a067698db02be0764fadf48434470b2bdf728,2024-10-10T12:56:30.817000 CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a6b,2024-10-10T12:56:30.817000 CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000 CVE-2024-9623,0,0,05eef687418519373d15ec19a86683cd7648219a76f4b58bf6e516098fb1b885,2024-10-10T12:51:56.987000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 -CVE-2024-9680,0,1,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000 +CVE-2024-9680,0,0,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000 CVE-2024-9685,0,0,0533577bd5534b2238dda3fc39c720d3ca57598c0c892e8a746063784dfa2119,2024-10-10T12:51:56.987000 -CVE-2024-9707,1,1,5022899338c6a36d44072ae7018b6a919d11834b1f5740a300f73a64606c0150,2024-10-11T13:15:21.233000 +CVE-2024-9707,0,0,5022899338c6a36d44072ae7018b6a919d11834b1f5740a300f73a64606c0150,2024-10-11T13:15:21.233000 CVE-2024-9780,0,0,64cb4b42f9787f95c4bcb2f0ffb7a4034eca385e970ac2bedc9fcd69728d3075,2024-10-10T12:51:56.987000 CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000 CVE-2024-9782,0,0,f6fdadb6173e6b1d6cefc02344a50956f97519ff0da6213ed752274ca4260d60,2024-10-10T12:51:56.987000 @@ -265315,5 +265328,6 @@ CVE-2024-9816,0,0,b558749b310662e562a03139cd743ab5e13638cae5288ab2349400fc9e4a8f CVE-2024-9817,0,0,64961e55de2aecac95e692e2205c7e393510ae0087bb3b78e5af557801c488ea,2024-10-10T23:15:03.410000 CVE-2024-9818,0,0,4a540b8f9903a9b9420b63ef2490b163dd3b5219ef38e22237dcd7875973e6a1,2024-10-10T23:15:03.680000 CVE-2024-9822,0,0,d08d61a8f285dedd6e0156668251bfed17abd9d34a7fc326c5d7b2d904c03ab9,2024-10-11T03:15:10.967000 -CVE-2024-9855,1,1,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000 -CVE-2024-9856,1,1,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000 +CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000 +CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000 +CVE-2024-9869,1,1,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000