diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6785.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6785.json new file mode 100644 index 00000000000..ecf0178d730 --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6785.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-6785", + "sourceIdentifier": "psirt@moxa.com", + "published": "2024-09-21T05:15:11.860", + "lastModified": "2024-09-21T05:15:11.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-313" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series", + "source": "psirt@moxa.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json new file mode 100644 index 00000000000..8d7b8f37f20 --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-6786", + "sourceIdentifier": "psirt@moxa.com", + "published": "2024-09-21T05:15:12.397", + "lastModified": "2024-09-21T05:15:12.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-24" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series", + "source": "psirt@moxa.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json new file mode 100644 index 00000000000..637871f068c --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-6787", + "sourceIdentifier": "psirt@moxa.com", + "published": "2024-09-21T05:15:12.607", + "lastModified": "2024-09-21T05:15:12.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series", + "source": "psirt@moxa.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f7c6d0f4b3e..67c3a5a6ff1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-20T23:55:17.046095+00:00 +2024-09-21T06:00:17.684189+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-20T23:35:04.073000+00:00 +2024-09-21T05:15:12.607000+00:00 ``` ### Last Data Feed Release @@ -27,38 +27,28 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-09-20T00:00:08.675346+00:00 +2024-09-21T00:00:08.668407+00:00 ``` ### Total Number of included CVEs ```plain -263519 +263522 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `3` +- [CVE-2024-6785](CVE-2024/CVE-2024-67xx/CVE-2024-6785.json) (`2024-09-21T05:15:11.860`) +- [CVE-2024-6786](CVE-2024/CVE-2024-67xx/CVE-2024-6786.json) (`2024-09-21T05:15:12.397`) +- [CVE-2024-6787](CVE-2024/CVE-2024-67xx/CVE-2024-6787.json) (`2024-09-21T05:15:12.607`) ### CVEs modified in the last Commit -Recently modified CVEs: `13` +Recently modified CVEs: `0` -- [CVE-2023-36676](CVE-2023/CVE-2023-366xx/CVE-2023-36676.json) (`2024-09-20T23:11:18.563`) -- [CVE-2023-36684](CVE-2023/CVE-2023-366xx/CVE-2023-36684.json) (`2024-09-20T23:19:11.727`) -- [CVE-2024-38877](CVE-2024/CVE-2024-388xx/CVE-2024-38877.json) (`2024-09-20T23:35:04.073`) -- [CVE-2024-38879](CVE-2024/CVE-2024-388xx/CVE-2024-38879.json) (`2024-09-20T23:26:28.767`) -- [CVE-2024-46958](CVE-2024/CVE-2024-469xx/CVE-2024-46958.json) (`2024-09-20T22:41:38.223`) -- [CVE-2024-6128](CVE-2024/CVE-2024-61xx/CVE-2024-6128.json) (`2024-09-20T23:21:47.123`) -- [CVE-2024-6939](CVE-2024/CVE-2024-69xx/CVE-2024-6939.json) (`2024-09-20T22:55:37.133`) -- [CVE-2024-6941](CVE-2024/CVE-2024-69xx/CVE-2024-6941.json) (`2024-09-20T23:08:19.027`) -- [CVE-2024-6942](CVE-2024/CVE-2024-69xx/CVE-2024-6942.json) (`2024-09-20T22:59:33.430`) -- [CVE-2024-6943](CVE-2024/CVE-2024-69xx/CVE-2024-6943.json) (`2024-09-20T22:51:52.603`) -- [CVE-2024-6944](CVE-2024/CVE-2024-69xx/CVE-2024-6944.json) (`2024-09-20T22:49:44.337`) -- [CVE-2024-8752](CVE-2024/CVE-2024-87xx/CVE-2024-8752.json) (`2024-09-20T22:42:20.367`) -- [CVE-2024-8875](CVE-2024/CVE-2024-88xx/CVE-2024-8875.json) (`2024-09-20T22:44:16.077`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 43c8488ddc0..988ca690f4b 100644 --- a/_state.csv +++ b/_state.csv @@ -227565,14 +227565,14 @@ CVE-2023-36672,0,0,0b437c7f228042e22c4f8d314d930a5f7b09ede3e5cf22aa693cfc66240e4 CVE-2023-36673,0,0,a12f7249f363726adad8b584d5dd5a49c39eb47b074fc8406f71b668e7664739,2023-10-31T09:15:08.337000 CVE-2023-36674,0,0,fe86697de9b18a95f92deb90589b41424edbd135f36d0c5658d0733faf8e2b7a,2023-11-07T04:16:41.150000 CVE-2023-36675,0,0,5c1bed2b433b860e794759988c06c2540aa0155cb90f88dce1df7acae30c9a95,2023-11-07T04:16:42.083000 -CVE-2023-36676,0,1,4a9258f5e078288b069b3a1e582c048d74b4404fdc2a2003de0065aa04460858,2024-09-20T23:11:18.563000 +CVE-2023-36676,0,0,4a9258f5e078288b069b3a1e582c048d74b4404fdc2a2003de0065aa04460858,2024-09-20T23:11:18.563000 CVE-2023-36677,0,0,447e129853788da008a3219fe85e6391cc9b944061e22512652e363c1bbae1f4,2024-09-05T20:35:08.677000 CVE-2023-36678,0,0,bf8c9875618aff5790e83f1ac3731c675ac156e0c7b7885b1d89d903f5e19dcb,2023-08-09T16:25:04.920000 CVE-2023-36679,0,0,f27841aaf867ab2cafb3bd3ec2ed998058062eb81a8f5ec7fd4cc1d0705b2e8e,2024-03-28T12:42:56.150000 CVE-2023-3668,0,0,f4c6e5685eb8eae619efd13ead136da3dc1df867ffc04086e38926d939521ba3,2023-07-27T12:17:44.780000 CVE-2023-36682,0,0,952892780a5faadd3ca8c25591f065b9af54d1d98df171f1b6c8f2fe303b9f37,2023-12-05T19:57:34.747000 CVE-2023-36683,0,0,0701c92847ee551599872dcf2d7c55baeec3df1d79c78ce8a377f8cce0c18212,2024-06-20T12:44:01.637000 -CVE-2023-36684,0,1,58a75347b8eb50df439d5c8b3342dd96ebf1723300ee41996a4d50b57daf8723,2024-09-20T23:19:11.727000 +CVE-2023-36684,0,0,58a75347b8eb50df439d5c8b3342dd96ebf1723300ee41996a4d50b57daf8723,2024-09-20T23:19:11.727000 CVE-2023-36685,0,0,9eb96379a3c26ffb48412157d8c37192cad9b706235f2ddb51ee3b56b6174857,2023-12-05T20:44:13.570000 CVE-2023-36686,0,0,05a794c26050db76039dff94c1338603726055c10e2cb44832c7bb214e3545f5,2023-08-09T18:01:02.050000 CVE-2023-36687,0,0,ec5ee63a5cfb73ba52bdc0df99aa31ee07fad4595ead0d53e2ce10587e6cd879,2023-07-18T18:21:13.220000 @@ -256374,9 +256374,9 @@ CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f7 CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000 CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000 CVE-2024-38876,0,0,25480756813f020fa50f173d621e9d6fe38555b94130c33f850eba69c0fb613c,2024-09-17T14:45:04.577000 -CVE-2024-38877,0,1,4e3f301e785bb891862e0917f4e9356d239b529d3009467a6802ff0e25358a1d,2024-09-20T23:35:04.073000 +CVE-2024-38877,0,0,4e3f301e785bb891862e0917f4e9356d239b529d3009467a6802ff0e25358a1d,2024-09-20T23:35:04.073000 CVE-2024-38878,0,0,b5810a8f9e927e1d011bb902669295d6c86e1472c4f8c215871ea71a0875da71,2024-09-17T15:50:41.117000 -CVE-2024-38879,0,1,0cab13a0888ad481f91fb5351787b6c6198d69f2e637b0f50855f8f2587b1612,2024-09-20T23:26:28.767000 +CVE-2024-38879,0,0,0cab13a0888ad481f91fb5351787b6c6198d69f2e637b0f50855f8f2587b1612,2024-09-20T23:26:28.767000 CVE-2024-3888,0,0,bc342da7901e0094f72065e6dd2aedad38420d6e9d380693e035c77fa5fe3f90,2024-06-04T16:57:41.053000 CVE-2024-38881,0,0,2ea60d09d0d9ff87b6dd792d394f437879631637f2111fab8651cc5ce17e3b46,2024-08-07T16:15:44.930000 CVE-2024-38882,0,0,ea1448ebae28393db0b7622f2675e28d74dab9b17e97c9a882ec3bbe17d057da,2024-08-07T16:15:45 @@ -260359,7 +260359,7 @@ CVE-2024-46942,0,0,39b03564ad46dfa226521fed6197bd85a5899e9352724095b0a13d9a65f5e CVE-2024-46943,0,0,3fc870c6d99db8787a73f247e0e78f9a5cb086f8d2fb6b0f3154e3b1280de70f,2024-09-20T16:56:49.957000 CVE-2024-46946,0,0,5adf6fed09d7522a85c453ac4c470cad5917d88736dbb3b605636f5befca45fa,2024-09-20T12:30:17.483000 CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000 -CVE-2024-46958,0,1,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000 +CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000 CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000 CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000 CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000 @@ -261644,7 +261644,7 @@ CVE-2024-6124,0,0,dbae4ba6931a49b60006ec1ed4b58995a60c43677eb3c396860d17e670311b CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000 CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000 CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000 -CVE-2024-6128,0,1,752c35ccc9ca0893ce78cfd348cd97a47a4c4389e751d1fa12a176ad61b65ba8,2024-09-20T23:21:47.123000 +CVE-2024-6128,0,0,752c35ccc9ca0893ce78cfd348cd97a47a4c4389e751d1fa12a176ad61b65ba8,2024-09-20T23:21:47.123000 CVE-2024-6129,0,0,2ff762b7cd1a3a05b9f7a7bf543ed96dfafb16d6f8890a34166ecd6ab87a1ddd,2024-09-20T19:21:03.763000 CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000 @@ -262183,6 +262183,9 @@ CVE-2024-6780,0,0,ad87716761d57bba157b9bc6302fd56c93db87ccc83552a263372092cb4e84 CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000 CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000 +CVE-2024-6785,1,1,c996bda58d993a2fd8d351c0b2e3b763bf73df50ef548b8fe985250e070de39d,2024-09-21T05:15:11.860000 +CVE-2024-6786,1,1,c6db9edcfa243cabcd3a3ed37b2d424b4f5efa9bf133eff2de9975de26b62f1e,2024-09-21T05:15:12.397000 +CVE-2024-6787,1,1,8b313e05e86144e6b329490de3dcc55e6fdacc76daa2c55fb5e3d9dc239aaa5e,2024-09-21T05:15:12.607000 CVE-2024-6788,0,0,369ef896034f113597a96208fca075acd0c3bdd5e82bf3987939f5fd20470069,2024-08-13T17:11:53.553000 CVE-2024-6789,0,0,e33e978edc987b98e576665a6bdb79eb993fb5854279dc068f6ea120541693df,2024-09-16T07:15:03.877000 CVE-2024-6791,0,0,6ce79f46aa2ab35d9212f59a5703ed0b8f9ce029cc93e4591d5b48478ec576f2,2024-09-17T14:44:39.387000 @@ -262292,12 +262295,12 @@ CVE-2024-6935,0,0,e72e7506294a595ab2cf5db5061b1cb277319bbf98ed1b3e690a38f115d41f CVE-2024-6936,0,0,4577b3afdea08ef342dd85247402a57dfff23ab9c07a41a4f2c576d4c65eb8f9,2024-07-22T13:00:31.330000 CVE-2024-6937,0,0,b63bb470375f2142964fb92a1dfcf47a63984d8e097aab41275eebd556b8da44,2024-07-22T13:00:31.330000 CVE-2024-6938,0,0,b45e7150592dc53d2d6f8456f74caeee413b2781d0948d41717bd8701ae68b88,2024-07-22T13:00:31.330000 -CVE-2024-6939,0,1,a7847aa2e67130908ca4b0fccbd5e84e8651f5b038701465ea8b316a5bed0334,2024-09-20T22:55:37.133000 +CVE-2024-6939,0,0,a7847aa2e67130908ca4b0fccbd5e84e8651f5b038701465ea8b316a5bed0334,2024-09-20T22:55:37.133000 CVE-2024-6940,0,0,5a3082ab9e69eb4544b88d6195e3acb056697f1ce4655acc61d1de5cd6e851ce,2024-09-10T20:12:35.823000 -CVE-2024-6941,0,1,a19b2d05018da024d584e77cbfc90057bd7fe00e796a50b29f5d2e79375c29bf,2024-09-20T23:08:19.027000 -CVE-2024-6942,0,1,abff953241f1dcf0ff4127705ce7c065f7658c4df670b2c1269457bdd749d4df,2024-09-20T22:59:33.430000 -CVE-2024-6943,0,1,fad3b6eb09934371a09be30980de575d4592929dad7e0cdb8d9485818aae264e,2024-09-20T22:51:52.603000 -CVE-2024-6944,0,1,507d6294da3a7360efc3de78025b32e1f94a9cff2838808abc6dca9c3e5c1e00,2024-09-20T22:49:44.337000 +CVE-2024-6941,0,0,a19b2d05018da024d584e77cbfc90057bd7fe00e796a50b29f5d2e79375c29bf,2024-09-20T23:08:19.027000 +CVE-2024-6942,0,0,abff953241f1dcf0ff4127705ce7c065f7658c4df670b2c1269457bdd749d4df,2024-09-20T22:59:33.430000 +CVE-2024-6943,0,0,fad3b6eb09934371a09be30980de575d4592929dad7e0cdb8d9485818aae264e,2024-09-20T22:51:52.603000 +CVE-2024-6944,0,0,507d6294da3a7360efc3de78025b32e1f94a9cff2838808abc6dca9c3e5c1e00,2024-09-20T22:49:44.337000 CVE-2024-6945,0,0,fe7643eb8a7b51df3743099b1ad67c8dd1ce3b9c85ea5a20c342990508ec4fba,2024-09-05T16:14:31.237000 CVE-2024-6946,0,0,df228dd2d7200de27b517d29f9641805aeb6beb3f4080f036d115266cf455158,2024-09-05T16:14:28.857000 CVE-2024-6947,0,0,d9680f8f56c52ed66ccf8eaad5c9080a87e7a6242d8c371c2239db66f7a5aa2b,2024-09-05T16:14:25.513000 @@ -263438,7 +263441,7 @@ CVE-2024-8747,0,0,6c88c8c8e632bc4d53a0196f95b7ceddf7275f331456b55093d5f334ca6d7b CVE-2024-8749,0,0,dc7dd50ec6adedb45c385a82f706a7ab45f55e506e70a64a626b0d8f521f6289,2024-09-18T18:53:54.860000 CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b5620,2024-09-18T20:38:42.123000 CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000 -CVE-2024-8752,0,1,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000 +CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000 CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000 CVE-2024-8761,0,0,3585691f416075376d018cf9f4fcfa97af66b09d60d17a08ef4151ff63a68129,2024-09-20T12:31:20.110000 CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000 @@ -263466,7 +263469,7 @@ CVE-2024-8866,0,0,8e10905107e65798915532a0fd7237746a2479c311a608a0e275edbccb2c74 CVE-2024-8867,0,0,379e34cf940a9b1358241a2155237c1f9d3d38d48143e1ed89b8af75caf7d4cf,2024-09-17T10:55:05.913000 CVE-2024-8868,0,0,90fb6fa23c2a5505d69614ac49fd1c537f25b76ba9e82d49d07e437e4df1c667,2024-09-17T10:59:28.233000 CVE-2024-8869,0,0,eaa7c70f03f38bcd808caaf5c9917ef912247cecdfb7f5fef4110fc2bf4de330,2024-09-20T16:59:22.560000 -CVE-2024-8875,0,1,285b537766851a72a752adea85efa81abdeba3e4c5af2afdcf8485ecb658237e,2024-09-20T22:44:16.077000 +CVE-2024-8875,0,0,285b537766851a72a752adea85efa81abdeba3e4c5af2afdcf8485ecb658237e,2024-09-20T22:44:16.077000 CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97b8,2024-09-20T16:58:24.333000 CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000 CVE-2024-8883,0,0,acc01ec9c3f72dcdfde915e68c8076ac17eb948c45b5a812494bde62dc939653,2024-09-20T12:30:17.483000