diff --git a/CVE-2019/CVE-2019-186xx/CVE-2019-18655.json b/CVE-2019/CVE-2019-186xx/CVE-2019-18655.json index 9b4e2164d3e..96ca31369fa 100644 --- a/CVE-2019/CVE-2019-186xx/CVE-2019-18655.json +++ b/CVE-2019/CVE-2019-186xx/CVE-2019-18655.json @@ -2,8 +2,8 @@ "id": "CVE-2019-18655", "sourceIdentifier": "cve@mitre.org", "published": "2019-11-12T17:15:10.610", - "lastModified": "2021-02-10T13:53:32.863", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T16:15:04.453", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -102,6 +102,10 @@ "Third Party Advisory" ] }, + { + "url": "https://github.com/0xhuesca/CVE-2019-18655/blob/main/filesharing_wizard_get_bof.rb", + "source": "cve@mitre.org" + }, { "url": "https://www.0xhuesca.com/2019/11/cve-2019-18655.html", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1636.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1636.json index 7b0a4d18f1c..8ccb1e4ab4e 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1636.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1636.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1636", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.167", - "lastModified": "2023-12-29T17:15:49.923", + "lastModified": "2024-10-08T17:15:14.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,12 +135,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1636", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1637.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1637.json index 92777f0db69..79534c00855 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1637.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1637.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1637", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.213", - "lastModified": "2023-12-29T23:15:11.220", + "lastModified": "2024-10-08T17:15:14.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -180,12 +180,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1637", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1638.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1638.json index 737a6023f1f..3d7f3853b44 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1638.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1638.json @@ -2,13 +2,13 @@ "id": "CVE-2021-1638", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.277", - "lastModified": "2023-12-29T23:15:11.450", + "lastModified": "2024-10-08T17:15:14.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Windows Bluetooth Security Feature Bypass Vulnerability" + "value": "Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this\u202fstatement\u202ffrom the Bluetooth SIG.\nTo address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key" }, { "lang": "es", @@ -155,12 +155,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1638", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1638", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1641.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1641.json index 79e3c509022..772824186e5 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1641.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1641.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1641", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.337", - "lastModified": "2023-12-29T17:15:50.357", + "lastModified": "2024-10-08T17:15:15.023", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -125,12 +125,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1641", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1642.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1642.json index 48eef07b73b..7cedabb3b04 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1642.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1642.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1642", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.400", - "lastModified": "2023-12-29T23:15:11.667", + "lastModified": "2024-10-08T17:15:15.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -165,12 +165,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1642", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1642", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1643.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1643.json index 750c7537840..f0de6b4b637 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1643.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1643.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1643", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.477", - "lastModified": "2023-12-29T17:15:50.553", + "lastModified": "2024-10-08T17:15:15.263", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -116,12 +116,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1643", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1643", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1644.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1644.json index 1a3d2049c8a..9aa0e134066 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1644.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1644.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1644", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.540", - "lastModified": "2023-12-29T17:15:50.730", + "lastModified": "2024-10-08T17:15:15.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -116,12 +116,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1644", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1644", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1645.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1645.json index 74d8a29558b..8c1d9bd6c49 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1645.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1645.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1645", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.603", - "lastModified": "2023-12-29T23:15:11.920", + "lastModified": "2024-10-08T17:15:15.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -160,29 +160,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/161816/Microsoft-Windows-Containers-DP-API-Cryptography-Flaw.html", - "source": "secure@microsoft.com", - "tags": [ - "Exploit", - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "http://seclists.org/fulldisclosure/2021/Mar/33", - "source": "secure@microsoft.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1645", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1645", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1646.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1646.json index a5611e56df5..5bb309083c6 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1646.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1646.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1646", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.667", - "lastModified": "2023-12-29T23:15:12.130", + "lastModified": "2024-10-08T17:15:15.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -155,12 +155,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1646", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1646", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1647.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1647.json index 7bf3d8626be..4d77a9b81b4 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1647.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1647.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1647", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.727", - "lastModified": "2024-07-26T20:03:15.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T17:15:15.817", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -251,12 +251,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1647", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1647", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1648.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1648.json index 7c10ea05fc5..845510ae141 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1648.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1648.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1648", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.790", - "lastModified": "2023-12-29T23:15:12.527", + "lastModified": "2024-10-08T17:15:15.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -185,20 +185,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1648", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-504/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1648", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1649.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1649.json index 7d80d4f4866..b4adc9a7e18 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1649.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1649.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1649", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.837", - "lastModified": "2023-12-29T23:15:12.890", + "lastModified": "2024-10-08T17:15:16.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1649", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1649", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1650.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1650.json index a6acdee0c89..399d267f618 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1650.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1650.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1650", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.900", - "lastModified": "2023-12-29T23:15:13.240", + "lastModified": "2024-10-08T17:15:16.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1650", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1650", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1651.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1651.json index 77af6d79bee..e7378b86e73 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1651.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1651.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1651", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.963", - "lastModified": "2023-12-29T23:15:13.587", + "lastModified": "2024-10-08T17:15:16.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -196,12 +196,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1651", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1651", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1652.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1652.json index e2f1663f00e..22894f9fba2 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1652.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1652.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1652", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.027", - "lastModified": "2023-12-29T23:15:13.910", + "lastModified": "2024-10-08T17:15:16.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1652", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1652", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1653.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1653.json index dffbbb1bf0f..b4f7f5151c3 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1653.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1653.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1653", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.087", - "lastModified": "2023-12-29T23:15:14.277", + "lastModified": "2024-10-08T17:15:17.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1653", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1653", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1654.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1654.json index afcf641a08f..07d0b108834 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1654.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1654.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1654", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.150", - "lastModified": "2023-12-29T23:15:14.613", + "lastModified": "2024-10-08T17:15:18.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1654", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1654", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1655.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1655.json index 9ade540a85e..b5d6c541599 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1655.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1655.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1655", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.213", - "lastModified": "2023-12-29T23:15:14.967", + "lastModified": "2024-10-08T17:15:18.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1655", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1655", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1656.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1656.json index 915d918d23f..e94e8871d2f 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1656.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1656.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1656", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.277", - "lastModified": "2023-12-29T23:15:15.213", + "lastModified": "2024-10-08T17:15:18.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -200,12 +200,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1656", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1656", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1657.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1657.json index 2b9951d383f..abdd6af5451 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1657.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1657.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1657", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.340", - "lastModified": "2023-12-29T23:15:15.420", + "lastModified": "2024-10-08T17:15:18.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1657", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1657", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1658.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1658.json index 8a331d829a9..923956466cf 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1658.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1658.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1658", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.400", - "lastModified": "2023-12-29T23:15:15.633", + "lastModified": "2024-10-08T17:15:18.843", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1658", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1658", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1659.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1659.json index e148d4282d6..23f2e63deea 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1659.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1659.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1659", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.463", - "lastModified": "2023-12-29T23:15:15.863", + "lastModified": "2024-10-08T17:15:19.263", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1659", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1659", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1660.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1660.json index 026837e3658..120bf738845 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1660.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1660.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1660", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.510", - "lastModified": "2023-12-29T23:15:16.140", + "lastModified": "2024-10-08T17:15:19.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1660", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1660", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1661.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1661.json index 466d1866ed8..1599179ed71 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1661.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1661.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1661", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.573", - "lastModified": "2023-12-29T23:15:16.373", + "lastModified": "2024-10-08T17:15:20.003", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1661", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1661", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1662.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1662.json index 2ab3fa958fe..347b906c849 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1662.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1662.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1662", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.637", - "lastModified": "2023-12-29T23:15:16.570", + "lastModified": "2024-10-08T17:15:20.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -155,12 +155,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1662", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1662", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1663.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1663.json index 7dbcaba5ba4..56a6d648faf 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1663.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1663.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1663", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.680", - "lastModified": "2023-12-29T23:15:16.767", + "lastModified": "2024-10-08T17:15:20.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -130,12 +130,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1663", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1663", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1664.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1664.json index 7628fc55fa2..3add9b4ae15 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1664.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1664.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1664", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.743", - "lastModified": "2023-12-29T23:15:16.993", + "lastModified": "2024-10-08T17:15:20.443", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1664", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1664", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1665.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1665.json index 77aaadc0999..8d83d25bfaa 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1665.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1665.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1665", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.807", - "lastModified": "2023-12-29T23:15:17.187", + "lastModified": "2024-10-08T17:15:20.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1665", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1665", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1666.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1666.json index 5b7eb7d215b..55b0fb91669 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1666.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1666.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1666", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.853", - "lastModified": "2023-12-29T23:15:17.380", + "lastModified": "2024-10-08T17:15:20.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1666", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1666", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1667.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1667.json index 98c0b93885b..e03b10f0880 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1667.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1667.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1667", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.917", - "lastModified": "2023-12-29T23:15:17.587", + "lastModified": "2024-10-08T17:15:20.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1667", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1667", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1668.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1668.json index 5ba667c6271..0683564c941 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1668.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1668.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1668", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:31.977", - "lastModified": "2023-12-29T23:15:17.820", + "lastModified": "2024-10-08T17:15:21.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -200,12 +200,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1668", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1668", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1669.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1669.json index 46019ab548b..8d4049a9e4b 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1669.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1669.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1669", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.040", - "lastModified": "2023-12-29T23:15:18.013", + "lastModified": "2024-10-08T17:15:21.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -185,12 +185,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1669", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1669", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1670.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1670.json index bc579c8996e..82b606bafa7 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1670.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1670.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1670", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.087", - "lastModified": "2023-12-29T23:15:18.227", + "lastModified": "2024-10-08T17:15:21.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -130,12 +130,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1670", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1670", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1671.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1671.json index 6c93c742bef..f9fb8141b24 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1671.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1671.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1671", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.150", - "lastModified": "2023-12-29T23:15:18.430", + "lastModified": "2024-10-08T17:15:21.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1671", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1671", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1672.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1672.json index 04b315c120c..0ba826e310d 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1672.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1672.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1672", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.213", - "lastModified": "2023-12-29T23:15:18.627", + "lastModified": "2024-10-08T17:15:21.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -155,12 +155,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1672", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1672", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1673.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1673.json index ba3ab96cfe1..c64d3534445 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1673.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1673.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1673", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.277", - "lastModified": "2023-12-29T23:15:18.827", + "lastModified": "2024-10-08T17:15:21.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1673", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1673", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1674.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1674.json index 833fd29723d..c8b8757824b 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1674.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1674.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1674", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.337", - "lastModified": "2023-12-29T23:15:19.040", + "lastModified": "2024-10-08T17:15:21.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -200,12 +200,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1674", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1674", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1676.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1676.json index e73131a61a6..4a352376292 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1676.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1676.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1676", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.400", - "lastModified": "2023-12-29T23:15:19.287", + "lastModified": "2024-10-08T17:15:22.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1676", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1676", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1677.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1677.json index 8db8e809467..399f52cd3d9 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1677.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1677.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1677", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.463", - "lastModified": "2023-12-29T17:15:51.207", + "lastModified": "2024-10-08T17:15:22.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1677", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1677", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1678.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1678.json index f648ebda832..9fde9bf65c6 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1678.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1678.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1678", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.510", - "lastModified": "2023-12-29T23:15:19.507", + "lastModified": "2024-10-08T17:15:22.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1678", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1678", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1679.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1679.json index 3830323e80d..7ee8068f62d 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1679.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1679.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1679", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.573", - "lastModified": "2023-12-29T23:15:19.713", + "lastModified": "2024-10-08T17:15:22.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1679", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1679", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1680.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1680.json index f17a4ff3475..93a4f36867f 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1680.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1680.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1680", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.637", - "lastModified": "2023-12-29T23:15:19.923", + "lastModified": "2024-10-08T17:15:22.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -194,12 +194,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1680", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1680", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1681.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1681.json index 3cd0960aa85..036032a2df3 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1681.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1681.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1681", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.697", - "lastModified": "2023-12-29T23:15:20.120", + "lastModified": "2024-10-08T17:15:22.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -145,12 +145,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1681", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1681", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1682.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1682.json index 31ad8ed5303..e4bf0502849 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1682.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1682.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1682", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.743", - "lastModified": "2023-12-29T23:15:20.310", + "lastModified": "2024-10-08T17:15:22.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -155,12 +155,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1682", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1682", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1683.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1683.json index e52a875bfea..f82d887d950 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1683.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1683.json @@ -2,13 +2,13 @@ "id": "CVE-2021-1683", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.807", - "lastModified": "2023-12-29T23:15:20.490", + "lastModified": "2024-10-08T17:15:23.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Windows Bluetooth Security Feature Bypass Vulnerability" + "value": "Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this\u202fstatement\u202ffrom the Bluetooth SIG.\nTo address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key" }, { "lang": "es", @@ -185,12 +185,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1683", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1683", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1684.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1684.json index 043092805aa..d804db45aa8 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1684.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1684.json @@ -2,13 +2,13 @@ "id": "CVE-2021-1684", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.853", - "lastModified": "2023-12-29T23:15:20.680", + "lastModified": "2024-10-08T17:15:23.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Windows Bluetooth Security Feature Bypass Vulnerability" + "value": "Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this\u202fstatement\u202ffrom the Bluetooth SIG.\nTo address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key" }, { "lang": "es", @@ -185,12 +185,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1684", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1684", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1685.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1685.json index 62fbf5dc54f..471b1699427 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1685.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1685.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1685", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.933", - "lastModified": "2023-12-29T23:15:20.890", + "lastModified": "2024-10-08T17:15:23.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -170,12 +170,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1685", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1685", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1686.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1686.json index 1216691559e..f36ad0c9ed7 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1686.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1686.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1686", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:32.993", - "lastModified": "2023-12-29T23:15:21.093", + "lastModified": "2024-10-08T17:15:23.387", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -145,12 +145,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1686", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1686", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1687.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1687.json index b8519812e45..f86c0f6ed07 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1687.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1687.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1687", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.057", - "lastModified": "2023-12-29T23:15:21.283", + "lastModified": "2024-10-08T17:15:23.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -145,12 +145,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1687", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1687", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1688.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1688.json index d697d23f51f..a2c57ac834c 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1688.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1688.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1688", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.167", - "lastModified": "2023-12-29T23:15:21.473", + "lastModified": "2024-10-08T17:15:23.573", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1688", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1688", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1689.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1689.json index ca9ce2ffb20..617b8d238bb 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1689.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1689.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1689", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.230", - "lastModified": "2023-12-29T23:15:21.660", + "lastModified": "2024-10-08T17:15:23.713", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -170,12 +170,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1689", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1689", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1690.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1690.json index f65e7c124b9..38806d78bc4 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1690.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1690.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1690", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.290", - "lastModified": "2023-12-29T23:15:21.840", + "lastModified": "2024-10-08T17:15:23.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -145,12 +145,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1690", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1690", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1691.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1691.json index 8083fccb1a0..40fdd2a570d 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1691.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1691.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1691", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.353", - "lastModified": "2023-12-29T23:15:22.037", + "lastModified": "2024-10-08T17:15:23.933", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -140,12 +140,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1691", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1691", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1692.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1692.json index 6c028ea4e1d..1035c7d925c 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1692.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1692.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1692", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.400", - "lastModified": "2023-12-29T23:15:22.237", + "lastModified": "2024-10-08T17:15:24.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,12 +135,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1692", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1692", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1693.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1693.json index 320836f59b8..33ce3772e9e 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1693.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1693.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1693", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.463", - "lastModified": "2023-12-29T23:15:22.417", + "lastModified": "2024-10-08T17:15:24.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1693", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1693", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1694.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1694.json index 2c21d72dfed..4db97bbaeca 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1694.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1694.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1694", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.510", - "lastModified": "2023-12-29T23:15:22.603", + "lastModified": "2024-10-08T17:15:24.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1694", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1694", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1695.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1695.json index 1cef28475f5..2236bb66920 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1695.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1695.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1695", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.557", - "lastModified": "2023-12-29T23:15:22.797", + "lastModified": "2024-10-08T17:15:24.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1695", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1695", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1696.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1696.json index d43c5a68bc2..3c850a815b5 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1696.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1696.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1696", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.620", - "lastModified": "2023-12-29T23:15:22.997", + "lastModified": "2024-10-08T17:15:24.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1696", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1696", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1697.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1697.json index 79555250d60..773f4ed394e 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1697.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1697.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1697", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.683", - "lastModified": "2023-12-29T23:15:23.183", + "lastModified": "2024-10-08T17:15:24.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -170,12 +170,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1697", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1697", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1699.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1699.json index 51078fa1e6b..855b60f646d 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1699.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1699.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1699", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.743", - "lastModified": "2023-12-29T23:15:23.557", + "lastModified": "2024-10-08T17:15:24.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1699", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1699", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1700.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1700.json index 50caa1b6b67..a9e6fe0498f 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1700.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1700.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1700", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.807", - "lastModified": "2023-12-29T23:15:23.733", + "lastModified": "2024-10-08T17:15:25.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1700", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1700", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1701.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1701.json index 1fa17be8c9f..9052c69ec7c 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1701.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1701.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1701", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.870", - "lastModified": "2023-12-29T23:15:23.930", + "lastModified": "2024-10-08T17:15:25.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1701", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1701", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1702.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1702.json index d2b05962a73..69bf61ba95f 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1702.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1702.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1702", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.933", - "lastModified": "2023-12-29T23:15:24.130", + "lastModified": "2024-10-08T17:15:25.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1702", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1702", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1703.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1703.json index b34b2c9e439..45fd499dcc7 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1703.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1703.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1703", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:33.993", - "lastModified": "2023-12-29T23:15:24.373", + "lastModified": "2024-10-08T17:15:25.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -130,12 +130,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1703", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1703", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1704.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1704.json index 59946858f81..76b28f06656 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1704.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1704.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1704", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.040", - "lastModified": "2023-12-29T23:15:24.577", + "lastModified": "2024-10-08T17:15:25.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -200,12 +200,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1704", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1704", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1705.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1705.json index 9cf5e946fc0..07098c5f6da 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1705.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1705.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1705", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.103", - "lastModified": "2023-12-29T17:15:51.413", + "lastModified": "2024-10-08T17:15:25.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -167,12 +167,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1705", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1705", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1706.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1706.json index 70d2bb23e7a..0dc96bb57da 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1706.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1706.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1706", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.167", - "lastModified": "2023-12-29T23:15:24.843", + "lastModified": "2024-10-08T17:15:25.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1706", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1706", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1707.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1707.json index 521294a10b1..e925808b6a3 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1707.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1707.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1707", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.230", - "lastModified": "2023-12-29T17:15:51.617", + "lastModified": "2024-10-08T17:15:25.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -130,12 +130,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1707", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1707", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1708.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1708.json index 9a161aea0c9..3839bc24b6d 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1708.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1708.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1708", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.277", - "lastModified": "2023-12-29T23:15:25.043", + "lastModified": "2024-10-08T17:15:26.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1708", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1708", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1709.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1709.json index 94bdf7e5062..c701e75b80a 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1709.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1709.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1709", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.357", - "lastModified": "2023-12-29T23:15:25.240", + "lastModified": "2024-10-08T17:15:26.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1709", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1709", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1710.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1710.json index ef9aeaa103f..a92925cb080 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1710.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1710.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1710", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.417", - "lastModified": "2023-12-29T23:15:25.417", + "lastModified": "2024-10-08T17:15:26.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -195,12 +195,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1710", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1710", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1711.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1711.json index 8d3ae503929..4836a1ab4fa 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1711.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1711.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1711", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.463", - "lastModified": "2023-12-29T17:15:51.820", + "lastModified": "2024-10-08T17:15:26.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -165,12 +165,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1711", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1711", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1712.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1712.json index 0d62cd6fe83..d628743b1ac 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1712.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1712.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1712", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.527", - "lastModified": "2023-12-29T17:15:52.010", + "lastModified": "2024-10-08T17:15:26.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -125,12 +125,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1712", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1712", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1713.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1713.json index d201cb4a903..c88020f8233 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1713.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1713.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1713", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.573", - "lastModified": "2023-12-29T17:15:52.213", + "lastModified": "2024-10-08T17:15:26.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -150,12 +150,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1713", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1713", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1714.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1714.json index c1c774e07f0..bfd84d41a67 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1714.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1714.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1714", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.637", - "lastModified": "2023-12-29T17:15:52.413", + "lastModified": "2024-10-08T17:15:26.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -197,12 +197,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1714", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1714", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1715.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1715.json index 5268061e813..d7438257208 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1715.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1715.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1715", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.697", - "lastModified": "2023-12-29T17:15:52.610", + "lastModified": "2024-10-08T17:15:27.017", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -185,12 +185,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1715", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1715", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1716.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1716.json index 412ba4f8230..c35bac94fb0 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1716.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1716.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1716", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.743", - "lastModified": "2023-12-29T17:15:52.820", + "lastModified": "2024-10-08T17:15:27.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -180,12 +180,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1716", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1716", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1717.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1717.json index 68353bac3b0..a4bc60fba6a 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1717.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1717.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1717", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.807", - "lastModified": "2023-12-29T17:15:53.013", + "lastModified": "2024-10-08T17:15:27.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -125,12 +125,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1717", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1717", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1718.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1718.json index 98ccc91a08c..6839ee420bd 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1718.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1718.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1718", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.870", - "lastModified": "2023-12-29T17:15:53.217", + "lastModified": "2024-10-08T17:15:27.387", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1718", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1718", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1719.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1719.json index 101f8e5a21c..2fb85f90756 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1719.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1719.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1719", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.933", - "lastModified": "2023-12-29T17:15:53.407", + "lastModified": "2024-10-08T17:15:27.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1719", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1719", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1723.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1723.json index 8f8d17aa929..34a37068a8e 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1723.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1723.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1723", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:34.993", - "lastModified": "2023-12-29T17:15:53.777", + "lastModified": "2024-10-08T17:15:27.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -151,12 +151,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1723", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1723", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1725.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1725.json index 6b7c22db798..7cae8874763 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1725.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1725.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1725", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:35.040", - "lastModified": "2023-12-29T17:15:54.167", + "lastModified": "2024-10-08T17:15:27.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -125,12 +125,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1725", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1725", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-439xx/CVE-2021-43940.json b/CVE-2021/CVE-2021-439xx/CVE-2021-43940.json index 165d6093f50..97abb0b1ae9 100644 --- a/CVE-2021/CVE-2021-439xx/CVE-2021-43940.json +++ b/CVE-2021/CVE-2021-439xx/CVE-2021-43940.json @@ -2,8 +2,8 @@ "id": "CVE-2021-43940", "sourceIdentifier": "security@atlassian.com", "published": "2022-02-15T04:15:07.177", - "lastModified": "2022-07-27T14:41:18.273", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T17:35:01.463", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49037.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49037.json index a9fe4929887..cfe9dd2736d 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49037.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49037.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49037", "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:03.770", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:08:55.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security@synology.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*", + "versionEndExcluding": "3.3.0-15082", + "matchCriteriaId": "25A1D284-49F9-4F67-B9A3-6451803B1B36" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49038.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49038.json index d4a732146b3..8f9b85911cf 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49038.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49038.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49038", "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:04.940", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:08:35.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security@synology.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*", + "versionEndExcluding": "3.3.0-15082", + "matchCriteriaId": "25A1D284-49F9-4F67-B9A3-6451803B1B36" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49039.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49039.json index 27ce37bf314..f4b5db28c37 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49039.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49039.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49039", "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:05.187", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:08:08.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "security@synology.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "security@synology.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*", + "versionEndExcluding": "3.4.0-15721", + "matchCriteriaId": "52C4C4A2-ADB8-4E6E-892C-7FC403068B36" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49040.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49040.json index 554ae2eb7e8..7985b42a972 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49040.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49040.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49040", "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:05.390", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:07:11.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security@synology.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*", + "versionEndExcluding": "3.4.0-15721", + "matchCriteriaId": "52C4C4A2-ADB8-4E6E-892C-7FC403068B36" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49041.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49041.json index 43d197b9c98..73bb1fb64ce 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49041.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49041.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49041", "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:05.620", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:06:51.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security@synology.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*", + "versionEndExcluding": "3.5.0-16084", + "matchCriteriaId": "FA63ED01-FFC4-4304-B511-8FF3260AEF74" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25835.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25835.json index e4fbc6f3d2d..c60ab2e3be9 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25835.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25835.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25835", "sourceIdentifier": "psirt@esri.com", "published": "2023-07-21T00:15:10.343", - "lastModified": "2024-01-29T22:15:08.103", + "lastModified": "2024-10-08T17:15:27.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nThere is a stored Cross-site Scripting vulnerability\u00a0in Esri Portal for ArcGIS Enterprise Sites versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high. The impact to Confidentiality, Integrity and Availability are High.\u00a0\n\n" + "value": "There is a stored Cross-site Scripting vulnerability\u00a0in Esri Portal for ArcGIS Enterprise Sites versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high. The impact to Confidentiality, Integrity and Availability are High." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25836.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25836.json index 96e1e313b54..03d7c51a064 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25836.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25836.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25836", "sourceIdentifier": "psirt@esri.com", "published": "2023-07-21T04:15:11.917", - "lastModified": "2023-08-07T19:33:38.560", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T17:15:28.033", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nThere is a Cross-site Scripting vulnerability\u00a0in Esri Portal Sites in versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are low.\n\n\n\n" + "value": "There is a Cross-site Scripting vulnerability\u00a0in Esri Portal Sites in versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are low." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25837.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25837.json index 9c4daae084c..99fdec644cf 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25837.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25837.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25837", "sourceIdentifier": "psirt@esri.com", "published": "2023-07-21T04:15:12.377", - "lastModified": "2024-01-29T22:15:08.220", + "lastModified": "2024-10-08T17:15:28.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nThere is a Cross-site Scripting vulnerability\u00a0in Esri ArcGIS Enterprise Sites versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. \u00a0The privileges required to execute this attack are high.\u00a0 \u00a0\n\nThe impact to Confidentiality, Integrity and Availability are High. \n\n\n\n" + "value": "There is a Cross-site Scripting vulnerability\u00a0in Esri ArcGIS Enterprise Sites versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. \u00a0The privileges required to execute this attack are high.\u00a0 \u00a0\n\nThe impact to Confidentiality, Integrity and Availability are High." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25840.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25840.json index ac978120126..972c31d9582 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25840.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25840.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25840", "sourceIdentifier": "psirt@esri.com", "published": "2023-07-21T19:15:10.160", - "lastModified": "2024-02-23T19:38:32.780", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T17:15:28.230", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nThere is a Cross-site Scripting vulnerability\u00a0in ArcGIS Server in versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. \u00a0The privileges required to execute this attack are high.\n\n\n\n" + "value": "There is a Cross-site Scripting vulnerability\u00a0in ArcGIS Server in versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. \u00a0The privileges required to execute this attack are high." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25841.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25841.json index 151b162d80e..ca524a29698 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25841.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25841.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25841", "sourceIdentifier": "psirt@esri.com", "published": "2023-07-21T19:15:10.260", - "lastModified": "2024-02-23T18:13:19.333", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T17:15:28.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nThere is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 \u2013 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n\nMitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities.\n\n\n" + "value": "There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 \u2013 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n\nMitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25848.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25848.json index 00e5e567e33..260d356d929 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25848.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25848.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25848", "sourceIdentifier": "psirt@esri.com", "published": "2023-08-25T19:15:08.670", - "lastModified": "2023-08-31T14:29:48.863", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T17:15:28.467", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\n\n\n\n\nArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue. \n\nThe information disclosed is limited to a single attribute in a database connection string. No business data is disclosed.\n\n\n\n\n\n\n\n\n" + "value": "ArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue. \n\nThe information disclosed is limited to a single attribute in a database connection string. No business data is disclosed." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29446.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29446.json index 235bf0bde14..541429b3da8 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29446.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29446.json @@ -2,13 +2,13 @@ "id": "CVE-2023-29446", "sourceIdentifier": "ot-cert@dragos.com", "published": "2024-01-10T21:15:08.603", - "lastModified": "2024-01-19T19:50:28.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T16:15:04.703", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.\u00a0" + "value": "An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-40" } ] } diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0057.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0057.json index 00bb859bdde..35eae990063 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0057.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0057.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0057", "sourceIdentifier": "secure@microsoft.com", "published": "2024-01-09T18:15:46.980", - "lastModified": "2024-05-29T00:15:11.080", + "lastModified": "2024-10-08T16:15:05.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -627,13 +627,6 @@ "Patch", "Vendor Advisory" ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240208-0007/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json index 07426e3d613..efdc691da93 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20434", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-09-25T17:15:16.090", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:20:30.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,480 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*", + "matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*", + "matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*", + "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*", + "matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*", + "matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*", + "matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*", + "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*", + "matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*", + "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*", + "matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vlan-dos-27Pur5RT", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json index 678b466ca47..651c4504efd 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20477", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-02T17:15:17.130", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:00:30.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2\\(1e\\)", + "matchCriteriaId": "95C6368B-22DC-4DA0-BD68-90AD842E8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.2.2", + "matchCriteriaId": "64448F53-1135-4A69-8FBC-100258CE76BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json index e39e2e5979f..00a2c108685 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20492", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-02T17:15:17.763", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:07:26.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,420 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "73A2A365-59AA-48B9-9ABF-914C2B80C7A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "98BDD88B-DF43-4F7C-A6C0-1EECE9C85355" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "BE860BF8-AC42-4C10-BC65-9DBF8050E682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "C03A7AEA-8411-4693-84A9-7ADC7F08D87C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "0D98AE26-55C9-4BA7-B82C-5B328E689418" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "D50E9F77-0575-43E0-AF83-9A932F4D4F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5:*:*:*:expressway:*:*:*", + "matchCriteriaId": "9F91E793-E37D-4823-B078-DA96AB422967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "3F16B185-879A-4BA8-B4EB-B032FC8B9674" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "5D58C2C4-F0CB-440A-885A-173DC9B5D32F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "95FC0285-58F4-4C17-9DB0-0A495A7FE9BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.6:*:*:*:expressway:*:*:*", + "matchCriteriaId": "E9BB8E50-74EF-4726-A069-C90B09201593" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.6.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "8AEF5B51-8609-40D8-A01B-6696B012FCB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7:*:*:*:expressway:*:*:*", + "matchCriteriaId": "C0DCF6AA-84C1-4B1A-80B0-6942707D9CAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "1590C980-506C-4689-AA91-6C647CC3AF28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "4E9D0839-13E1-4C95-AFEF-3071A977AB5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "6E714552-FDEF-4971-959F-3615E34E6F5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8:*:*:*:expressway:*:*:*", + "matchCriteriaId": "20A5441C-7798-4EAD-9428-6DA4EF354807" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "1BE2198F-DF53-497E-9945-062ADD3787F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "0D7C383F-30E2-4F22-B35D-B73671D1BBCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "B478B2B7-269C-4813-A004-225D90715A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9:*:*:*:expressway:*:*:*", + "matchCriteriaId": "CBEB2506-7F1B-4227-B5BD-47B28778D7AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "A000BA48-4ABC-46D4-89EB-CEA8D754B708" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "66CBF53D-4174-463A-B902-E50FF63E39B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "BFFD53C6-D23A-4CEC-AD1C-7D6A8B920566" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "F642A732-BA7E-493F-BE62-273997AF3328" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "76688320-EE54-4662-BE15-F721EA55D5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "7C3B3879-FCDF-4D12-9B81-24EC70FF6CF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.4:*:*:*:expressway:*:*:*", + "matchCriteriaId": "F0B562E3-5E36-4899-A57A-90E653737B09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "EA6FF488-FBED-40E6-92CC-39B8749171C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "F84981B5-0E55-40D6-92F9-57C03A24A44A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "A9A37F14-5F65-4C99-A0E2-EACABEDF2286" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "6F7DC504-15CA-4D44-90E5-5684F474A7A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.4:*:*:*:expressway:*:*:*", + "matchCriteriaId": "36BD629F-0183-41C2-9547-08EAE359BD00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "26301BB9-38C0-473F-9FAF-E5DF70E29A36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "29C38DD2-E763-4B59-83C7-050D08D91637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "684A39DB-7850-4932-922D-9E7A62FC608A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "81B09C18-F930-4B67-8309-7FA0889039C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.4:*:*:*:expressway:*:*:*", + "matchCriteriaId": "E172DA2A-37B4-4387-AE92-0F0D4F60F736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.5:*:*:*:expressway:*:*:*", + "matchCriteriaId": "D09EB9B0-5212-4E32-95E9-93BEC53B4AA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.6:*:*:*:expressway:*:*:*", + "matchCriteriaId": "2221FF76-F13A-4E8D-88EB-2757AB6DCDCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.7:*:*:*:expressway:*:*:*", + "matchCriteriaId": "FBEE5E76-A827-4031-B1C1-4961C277C5F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.8:*:*:*:expressway:*:*:*", + "matchCriteriaId": "156F7D5E-DC54-4687-B80F-3281C779135F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.9:*:*:*:expressway:*:*:*", + "matchCriteriaId": "8BDFCFC1-8230-4051-9B5D-73349C288E46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "98E3BF27-037E-474F-B55A-12750943499D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "9F2CF11F-735B-458F-9F2F-8E2322FC39DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "22089B78-2048-4192-826B-76AA3FAE7E22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "C826FD6A-948C-4B09-8061-E800BD6E1963" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.4:*:*:*:expressway:*:*:*", + "matchCriteriaId": "2CE43D3E-BC2F-4CBC-8213-13028B88B1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.7.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "60DF84F3-B71E-4860-A6B7-61AB5D201702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.7.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "06852E84-8BEC-403D-BB70-07A4F51054E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "EDDF2FE3-585A-4A3D-9E14-A8AE02301223" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "6C6A62AC-7214-4FB0-A2C9-82BDEE6D7C7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "7090851D-B154-435B-8F25-06E365334D68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "D1A6AB08-E97C-4865-B225-0EA77AA73366" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.4:*:*:*:expressway:*:*:*", + "matchCriteriaId": "0EE6F371-C8E2-4B4E-855E-882395C02801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.5:*:*:*:expressway:*:*:*", + "matchCriteriaId": "711A5AE8-087C-4471-BA1B-C3B70EED1427" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.6:*:*:*:expressway:*:*:*", + "matchCriteriaId": "4B0339D9-9CA8-4376-A60B-94429B993E80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.7:*:*:*:expressway:*:*:*", + "matchCriteriaId": "3AA3FAD1-7F25-4D57-AA14-822CDE7FE0FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.8:*:*:*:expressway:*:*:*", + "matchCriteriaId": "9F656226-EAB4-4B9D-965B-872FA62BDA26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.9:*:*:*:expressway:*:*:*", + "matchCriteriaId": "1543EF6E-9B45-4FD4-B435-6579FE7F2C54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.10:*:*:*:expressway:*:*:*", + "matchCriteriaId": "1AA8FED6-4E07-4C0D-8DF7-605C230B7D21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.11:*:*:*:expressway:*:*:*", + "matchCriteriaId": "0343AAE7-94DF-43E4-AF29-9EC1B320A58E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "CA0CFF47-8107-40BC-9E29-69E829A7FCE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "89E4FDB4-B74A-4622-A47F-2EDCB6D57F57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "CC1B741E-9D6F-428F-B403-2FB0DF52DCE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.5:*:*:*:expressway:*:*:*", + "matchCriteriaId": "16FDBC96-2C3A-4615-8AE7-90DEB68E2952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.6:*:*:*:expressway:*:*:*", + "matchCriteriaId": "05AB5287-62D0-4510-B4AF-9AC0A757CE3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.7:*:*:*:expressway:*:*:*", + "matchCriteriaId": "0DAE5BA7-833B-4FB1-8F04-80FC02BD444F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "10582312-5717-4A91-AE3E-9A907C8A338B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "8FEE44F0-FBC5-470F-BB66-C1C672032B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "8B1EDE63-DE13-47AC-BC19-6F5EB4D00BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "B2B49119-47FF-4751-A9EC-D34ABAD3A9E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.4:*:*:*:expressway:*:*:*", + "matchCriteriaId": "193C4B32-EE7D-42CE-B851-00CDDBA07D40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.5:*:*:*:expressway:*:*:*", + "matchCriteriaId": "9137356B-264C-4D1F-B37A-DB5FE96B1A1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.6:*:*:*:expressway:*:*:*", + "matchCriteriaId": "4B8FD463-4EC1-4BD3-AB01-2915D061C57A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x15.0.0:*:*:*:expressway:*:*:*", + "matchCriteriaId": "7DB74EB7-1B43-4F61-818C-CACC4661F9DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x15.0.1:*:*:*:expressway:*:*:*", + "matchCriteriaId": "9B8E94B6-6B64-4060-B264-623B7CAA456E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x15.0.2:*:*:*:expressway:*:*:*", + "matchCriteriaId": "A5BF2248-19FB-4F1B-AB1D-1892445AB15B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x15.0.3:*:*:*:expressway:*:*:*", + "matchCriteriaId": "0477933F-C946-4ED9-B89A-C0D9E40FCE06" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expw-escalation-3bkz77bD", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20499.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20499.json index 44c6e975413..8c02d9fd28b 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20499.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20499.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20499", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-02T19:15:14.143", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T17:45:55.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,717 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "D35338D1-9F2C-4BA1-ADB8-D0E3A276DC93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "2269BA4F-9C0C-4133-B5F2-F700AC8653A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36770C3B-F962-48FB-9D9F-3EABB1F10EFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "2BBD74AA-7217-4332-9EC6-6EFE97D84FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "447028DD-9B78-4B2B-8559-361230B6E2B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "CF2FA15A-538A-405A-B8C3-C16BDB49F550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "B5EBBB8E-0E26-49F3-BDBE-F6287C7386E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "761A5444-7B23-4B39-97A9-0B6A28108BC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B35EB71-8584-4803-A438-AEC406FD8445" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "6CCBCFF6-7C79-4191-AA3A-D02AC396F0C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2ACA552D-78D3-4312-9537-28ADBB15E08A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "262DA6F7-5F10-4197-A265-AC37AEDF90C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "10787CEA-1AAB-4018-8240-36B6AB37C3F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "291C7E3A-74D1-4326-87A4-F60D60E3DC37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "826A62FB-16B1-4087-A8C4-044A2C695653" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "59377514-310E-400C-8BE4-DD97632F086A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35740A98-6486-458C-99A9-8E23A781C917" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "0D5947F6-A282-4505-8DE9-B41AB1D88781" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", + "matchCriteriaId": "410A121A-037A-4D44-A35F-7AE41F93E5AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "0BC93D2C-BAA6-4CBC-BAE4-B14205F30788" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5A4239D-E115-4368-895A-002BBD94F243" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "48426C6D-98E1-476E-92B2-7BBCB50B5D06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A892F3D-62F9-4B04-94E8-FD803159C47B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "BF7A3934-60BA-4682-B33B-BEEBD3BF7E75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "AF9115EE-244D-4E72-A9DD-B346BFEBC9E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "75E1B6CE-D8D9-44B1-AE48-0438E36A4C07" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "599134DD-0BBE-4F51-BFC0-4FE68717A87E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "3760B708-901F-4956-AB3E-666D80268B6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "C53726E0-478D-44CC-8CA2-D8A7971DCB29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2702FE73-E4AC-45C7-A212-44D783720798" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "20112EE7-88F2-412D-8FD1-B62F7475A522" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "B3C6574B-E879-4813-9516-93B41EBDFBD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3099A12-2D6F-4486-A690-1C809AF480B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "73F62932-705E-4490-8E87-C8C0A8BF0203" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndIncluding": "18.211.2", + "matchCriteriaId": "553AC2DF-6F85-40D3-B3B1-F979364BA4BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE749570-1EA6-4734-B96A-D02B3BA3A756" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20500.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20500.json index 6e28c5f3ae4..426163c0907 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20500.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20500.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20500", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-02T19:15:14.350", - "lastModified": "2024-10-04T13:50:43.727", + "lastModified": "2024-10-08T17:37:00.427", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,717 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "D35338D1-9F2C-4BA1-ADB8-D0E3A276DC93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "2269BA4F-9C0C-4133-B5F2-F700AC8653A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36770C3B-F962-48FB-9D9F-3EABB1F10EFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "2BBD74AA-7217-4332-9EC6-6EFE97D84FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "447028DD-9B78-4B2B-8559-361230B6E2B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "CF2FA15A-538A-405A-B8C3-C16BDB49F550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "B5EBBB8E-0E26-49F3-BDBE-F6287C7386E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "761A5444-7B23-4B39-97A9-0B6A28108BC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B35EB71-8584-4803-A438-AEC406FD8445" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "6CCBCFF6-7C79-4191-AA3A-D02AC396F0C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2ACA552D-78D3-4312-9537-28ADBB15E08A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "262DA6F7-5F10-4197-A265-AC37AEDF90C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "10787CEA-1AAB-4018-8240-36B6AB37C3F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "291C7E3A-74D1-4326-87A4-F60D60E3DC37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "826A62FB-16B1-4087-A8C4-044A2C695653" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "59377514-310E-400C-8BE4-DD97632F086A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35740A98-6486-458C-99A9-8E23A781C917" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "0D5947F6-A282-4505-8DE9-B41AB1D88781" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", + "matchCriteriaId": "410A121A-037A-4D44-A35F-7AE41F93E5AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "0BC93D2C-BAA6-4CBC-BAE4-B14205F30788" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5A4239D-E115-4368-895A-002BBD94F243" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "48426C6D-98E1-476E-92B2-7BBCB50B5D06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A892F3D-62F9-4B04-94E8-FD803159C47B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "BF7A3934-60BA-4682-B33B-BEEBD3BF7E75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "AF9115EE-244D-4E72-A9DD-B346BFEBC9E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "75E1B6CE-D8D9-44B1-AE48-0438E36A4C07" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "599134DD-0BBE-4F51-BFC0-4FE68717A87E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "3760B708-901F-4956-AB3E-666D80268B6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "C53726E0-478D-44CC-8CA2-D8A7971DCB29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2702FE73-E4AC-45C7-A212-44D783720798" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "20112EE7-88F2-412D-8FD1-B62F7475A522" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "B3C6574B-E879-4813-9516-93B41EBDFBD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3099A12-2D6F-4486-A690-1C809AF480B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.211.2", + "matchCriteriaId": "73F62932-705E-4490-8E87-C8C0A8BF0203" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndIncluding": "18.211.2", + "matchCriteriaId": "553AC2DF-6F85-40D3-B3B1-F979364BA4BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE749570-1EA6-4734-B96A-D02B3BA3A756" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json index 6bfd1ac5f25..032e26d9690 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20515", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-02T17:15:17.973", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-08T16:11:23.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,180 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "77FB0B23-93CC-406D-A5A1-2D64B70DD2A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A1063044-BCD7-487F-9880-141C30547E36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "919F03E1-3C26-4AD5-A4D4-0A9FC12F2DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "AFF28D10-F46D-4A72-9CD7-E90C72AC5163" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "9B66744D-B23C-496F-AD88-BC108D529B7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "BFDA4C27-F756-412E-A656-C4BAD2593BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "5BF45B59-85A3-436D-AB64-D4196B993491" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "22ECD75E-AA16-4E42-8B3F-1DE8876ED7C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "EF68E608-E310-4834-97CD-E241539B83D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "A703F19F-DA6F-451D-BB96-BF3AAABA294C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "AD40F3C5-2ABE-4CF0-84A1-D3FC8A23EC15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "4B5E1B4B-E80D-4D0B-85A9-4DB451D6905D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "09214999-25AE-4DFF-86E3-111103A67796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "9410E94D-BE64-49E7-9F0E-E0526EAE579D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "F0DE77E8-223F-4391-ADDC-D0D612FAF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "6E039CEA-687E-42FB-B121-10C33C8A5065" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "DABCC131-0E81-4D99-8D93-3BEE4C03F62F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "43478D6C-C818-4CB0-9530-4CE255162B16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "6B067F31-F079-44B7-A5ED-AEE1F7AEC557" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "CC88D7D8-E3E5-44A4-97FB-48205B9321E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "1BCAC7DA-7A02-47BC-BF10-8D1155509859" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "CD4AC674-4CD2-4811-A5B3-AC2315D5F87F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "9E8B8992-B62E-4B32-B5E4-C6052F0B2903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "614EE402-01B5-4A46-BDBF-06F7E1BAC91E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "16F1D103-C12C-4D18-92FD-6D47114D8A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "F9479A46-5B98-4AF5-A6B7-9A46D1DFD043" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "9D05EF91-229E-4C2F-9669-1D1EF756386E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D23905E0-E525-49B1-8E5F-4EB42D186768" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-ZYF2nEEX", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20677.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20677.json index 67ce2ff91ae..d134f82d7f2 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20677.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20677.json @@ -2,13 +2,13 @@ "id": "CVE-2024-20677", "sourceIdentifier": "secure@microsoft.com", "published": "2024-01-09T18:15:50.887", - "lastModified": "2024-05-29T00:15:13.797", + "lastModified": "2024-10-08T16:15:07.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A security vulnerability exists in FBX that could lead to remote code execution. To mitigate this vulnerability, the ability to insert FBX files has been disabled in Word, Excel, PowerPoint and Outlook for Windows and Mac. Versions of Office that had this feature enabled will no longer have access to it. This includes Office 2019, Office 2021, Office LTSC for Mac 2021, and Microsoft 365. As of February 13, 2024, the ability to insert FBX files has also been disabled in 3D Viewer.\n3D models in Office documents that were previously inserted from a FBX file will continue to work as expected unless the Link to File option was chosen at insert time.\nThis change is effective as of the January 9, 2024 security update.\n" + "value": "A security vulnerability exists in FBX that could lead to remote code execution. To mitigate this vulnerability, the ability to insert FBX files has been disabled in Word, Excel, PowerPoint and Outlook for Windows and Mac. Versions of Office that had this feature enabled will no longer have access to it. This includes Office 2019, Office 2021, Office LTSC for Mac 2021, and Microsoft 365. As of February 13, 2024, the ability to insert FBX files has also been disabled in 3D Viewer.\n3D models in Office documents that were previously inserted from a FBX file will continue to work as expected unless the Link to File option was chosen at insert time.\nThis change is effective as of the January 9, 2024 security update." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20696.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20696.json index 174f7625cc2..c6f15c6a0ae 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20696.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20696.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20696", "sourceIdentifier": "secure@microsoft.com", "published": "2024-01-09T18:15:52.927", - "lastModified": "2024-06-08T13:15:54.193", + "lastModified": "2024-10-08T16:15:09.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -128,14 +128,6 @@ } ], "references": [ - { - "url": "https://clearbluejar.github.io/posts/patch-tuesday-diffing-cve-2024-20696-windows-libarchive-rce/", - "source": "secure@microsoft.com" - }, - { - "url": "https://github.com/clearbluejar/CVE-2024-20696", - "source": "secure@microsoft.com" - }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696", "source": "secure@microsoft.com", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20697.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20697.json index 675522ffd16..7655f81c211 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20697.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20697.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20697", "sourceIdentifier": "secure@microsoft.com", "published": "2024-01-09T18:15:53.130", - "lastModified": "2024-06-10T18:15:25.050", + "lastModified": "2024-10-08T16:15:09.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -103,18 +103,6 @@ } ], "references": [ - { - "url": "http://www.openwall.com/lists/oss-security/2024/06/04/2", - "source": "secure@microsoft.com" - }, - { - "url": "http://www.openwall.com/lists/oss-security/2024/06/05/1", - "source": "secure@microsoft.com" - }, - { - "url": "https://github.com/advisories/GHSA-w6xv-37jv-7cjr", - "source": "secure@microsoft.com" - }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697", "source": "secure@microsoft.com", @@ -122,10 +110,6 @@ "Patch", "Vendor Advisory" ] - }, - { - "url": "https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", - "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21312.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21312.json index 0d26d590d7a..dda89a5f8ba 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21312.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21312.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21312", "sourceIdentifier": "secure@microsoft.com", "published": "2024-01-09T18:15:55.080", - "lastModified": "2024-05-29T00:15:17.477", + "lastModified": "2024-10-08T16:15:10.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -358,10 +358,6 @@ "Patch", "Vendor Advisory" ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240208-0008/", - "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21533.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21533.json index ccd9ddcca73..213da12609e 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21533.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21533.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21533", "sourceIdentifier": "report@snyk.io", "published": "2024-10-08T05:15:14.180", - "lastModified": "2024-10-08T05:15:14.180", + "lastModified": "2024-10-08T16:35:04.437", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL scheme, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options." + }, + { + "lang": "es", + "value": "Todas las versiones del paquete ggit son vulnerables a la inyecci\u00f3n de argumentos arbitrarios a trav\u00e9s de la API clone(), que permite especificar la URL remota que se va a clonar y el archivo en el disco en el que se va a clonar. La librer\u00eda no realiza la limpieza para la entrada del usuario ni valida un esquema de URL determinado, ni tampoco pasa correctamente los indicadores de l\u00ednea de comandos al binario de git utilizando los caracteres POSIX de doble gui\u00f3n (--) para comunicar el final de las opciones." } ], "metrics": { @@ -45,6 +49,16 @@ "value": "CWE-88" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23512.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23512.json index 0400d29f8cf..6a0f25ce2fa 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23512.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23512.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23512", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T09:15:11.913", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T17:01:56.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpxpo:wowstore:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.1.5", + "matchCriteriaId": "AEA02F3C-20AF-4574-B88B-1A51AA22BEAD" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/product-blocks/wordpress-productx-plugin-3-1-4-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24796.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24796.json index 836e92765a2..f56fde50343 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24796.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24796.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24796", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T08:15:40.810", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:27:19.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mage-people:event_manager_and_tickets_selling_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.1.2", + "matchCriteriaId": "ACFF3A4A-0AD3-40AE-B915-EA9DC7EAD175" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mage-eventpress/wordpress-wpevently-plugin-4-1-1-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24797.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24797.json index 50ae3870c77..ec989ce9fba 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24797.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24797", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T08:15:41.090", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:31:14.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:g5plus:ere_recently_viewed:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0", + "matchCriteriaId": "F09B94FC-CD69-4800-B4F8-A57D58BEA73D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ere-recently-viewed/wordpress-ere-recently-viewed-plugin-1-3-unauthenticated-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24887.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24887.json index e9bbbb61cf8..fe40c75b598 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24887.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24887.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24887", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T09:15:12.517", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:48:35.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "21.2.9", + "matchCriteriaId": "27DE4C60-AAF4-45A6-AED1-872DF0D76DDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/contest-gallery/wordpress-photos-and-files-contest-gallery-plugin-21-2-8-4-csrf-leading-to-gallery-creation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24926.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24926.json index 4fb9a7825be..549d50a7f9e 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24926.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24926.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24926", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T08:15:41.390", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:32:41.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unitedthemes:brooklyn:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.9.7.6", + "matchCriteriaId": "0F7A0654-602C-4738-B649-F4F8E8296DD3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/brooklyn/wordpress-brooklyn-theme-4-9-7-6-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24929.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24929.json index 2908ec5ff49..5bdd7c56f9f 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24929.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24929.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24929", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T09:15:12.713", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:45:27.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ftwr:wp_contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.6", + "matchCriteriaId": "F36CF1BF-BC2E-4C11-B716-0542B4927342" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-contact-form/wordpress-wp-contact-form-plugin-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24935.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24935.json index 4d886ec8108..377a58caef7 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24935.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24935.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24935", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T09:15:12.907", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:52:19.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpsimpletools:basic_log_viewer:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.4", + "matchCriteriaId": "75D08576-2488-4696-8E83-0638902C798E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpsimpletools-log-viewer/wordpress-basic-log-viewer-plugin-1-0-4-cross-site-request-forgery-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25697.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25697.json index 425270328f6..f8155e8738b 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25697.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25697.json @@ -2,13 +2,13 @@ "id": "CVE-2024-25697", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:11.027", - "lastModified": "2024-04-19T23:15:10.003", + "lastModified": "2024-10-08T17:15:29.717", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nThere is a Cross-site Scripting vulnerability\u00a0in Portal for ArcGIS in versions <=11.1 that may allow a remote, authenticated attacker to create a crafted link which when opening an authenticated users bio page will render an image in the victims browser. \u00a0The privileges required to execute this attack are low.\n\n" + "value": "There is a Cross-site Scripting vulnerability\u00a0in Portal for ArcGIS in versions <=11.1 that may allow a remote, authenticated attacker to create a crafted link which when opening an authenticated users bio page will render an image in the victims browser. \u00a0The privileges required to execute this attack are low." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25699.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25699.json index c3e35e72fae..e5abd2bd093 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25699.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25699.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25699", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:11.593", - "lastModified": "2024-09-20T03:15:02.197", + "lastModified": "2024-10-08T17:15:29.917", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-323" + "value": "CWE-287" } ] } diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json index f311ee43ae5..0e68f084970 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json @@ -2,15 +2,55 @@ "id": "CVE-2024-25705", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:12.603", - "lastModified": "2024-04-25T19:15:49.660", - "vulnStatus": "Rejected", + "lastModified": "2024-10-08T17:15:30.027", + "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n" + "value": "There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are low." } ], - "metrics": {}, - "references": [] + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@esri.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@esri.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/", + "source": "psirt@esri.com" + } + ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25706.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25706.json index f7070fb4426..4f52b5b030e 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25706.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25706.json @@ -2,15 +2,55 @@ "id": "CVE-2024-25706", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:12.830", - "lastModified": "2024-04-25T19:15:49.720", - "vulnStatus": "Rejected", + "lastModified": "2024-10-08T17:15:30.303", + "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n" + "value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS <=11.0 that may allow a remote, unauthenticated attacker to craft a URL which, when clicked, could potentially generate a message that may entice an unsuspecting victim to visit an arbitrary website. This could simplify phishing attacks." } ], - "metrics": {}, - "references": [] + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@esri.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@esri.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/", + "source": "psirt@esri.com" + } + ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json index 76aa77a69b9..92978d5f74b 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json @@ -2,15 +2,55 @@ "id": "CVE-2024-25709", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:13.340", - "lastModified": "2024-04-25T19:15:49.777", - "vulnStatus": "Rejected", + "lastModified": "2024-10-08T17:15:30.607", + "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n" + "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 \u2013 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high." } ], - "metrics": {}, - "references": [] + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@esri.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@esri.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/", + "source": "psirt@esri.com" + } + ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30105.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30105.json index bf8bcc45244..5898ed99b4e 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30105.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30105.json @@ -2,13 +2,13 @@ "id": "CVE-2024-30105", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:17.200", - "lastModified": "2024-08-07T17:31:19.913", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-08T17:15:32.123", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": ".NET Core and Visual Studio Denial of Service Vulnerability" + "value": ".NET and Visual Studio Denial of Service Vulnerability" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3057.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3057.json new file mode 100644 index 00000000000..6934c154699 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3057.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-3057", + "sourceIdentifier": "psirt@purestorage.com", + "published": "2024-10-08T17:15:53.770", + "lastModified": "2024-10-08T17:15:53.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw exists whereby a user can make a specific call to a FlashArray endpoint allowing privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@purestorage.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@purestorage.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://support.purestorage.com/category/m_pure_storage_product_security", + "source": "psirt@purestorage.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44349.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44349.json new file mode 100644 index 00000000000..07fe5200ccf --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44349.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44349", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-08T17:15:54.027", + "lastModified": "2024-10-08T17:15:54.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in login portal in AnteeoWMS before v4.7.34 allows unauthenticated attackers to execute arbitrary SQL commands via the username parameter and disclosure of some data in the underlying DB." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.cybergon.com/posts/cve-2024-44349/", + "source": "cve@mitre.org" + }, + { + "url": "https://cybergon.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44439.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44439.json index eb2d4a3a08a..4eb83e2a700 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44439.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44439.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44439", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-04T18:15:08.477", - "lastModified": "2024-10-07T17:48:28.117", + "lastModified": "2024-10-08T16:35:05.540", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Shanghai Zhouma Network Technology CO., Ltd IMS Intelligent Manufacturing Collaborative Internet of Things System v.1.9.1 permite que un atacante remoto escale privilegios a trav\u00e9s del puerto abierto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://smiling-lemonade-122.notion.site/f7da442e0f8a40fc846eea495dcdd329", diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json new file mode 100644 index 00000000000..f71d769bddf --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45230", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-08T16:15:11.903", + "lastModified": "2024-10-08T16:15:11.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.djangoproject.com/en/dev/releases/security/", + "source": "cve@mitre.org" + }, + { + "url": "https://groups.google.com/forum/#%21forum/django-announce", + "source": "cve@mitre.org" + }, + { + "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json new file mode 100644 index 00000000000..e86792ce175 --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45231", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-08T16:15:11.997", + "lastModified": "2024-10-08T16:15:11.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.djangoproject.com/en/dev/releases/security/", + "source": "cve@mitre.org" + }, + { + "url": "https://groups.google.com/forum/#%21forum/django-announce", + "source": "cve@mitre.org" + }, + { + "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45880.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45880.json index 8f6dfc752f4..e2d1a87bfe1 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45880.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45880.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45880", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T15:15:15.217", - "lastModified": "2024-10-08T15:15:15.217", + "lastModified": "2024-10-08T16:35:06.407", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A command injection vulnerability exists in Motorola CX2L router v1.0.2 and below. The vulnerability is present in the SetStationSettings function. The system directly invokes the system function to execute commands for setting parameters such as MAC address without proper input filtering. This allows malicious users to inject and execute arbitrary commands." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/m0tOrol%40-Cx2l.pdf", diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45918.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45918.json new file mode 100644 index 00000000000..adde3de4b4e --- /dev/null +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45918.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45918", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-08T17:15:54.120", + "lastModified": "2024-10-08T17:15:54.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Fujian Kelixin Communication Command and Dispatch Platform <=7.6.6.4391 is vulnerable to SQL Injection via /client/get_gis_fence.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Y5neKO/3e29d32e07d90c96ae808d7e7839f0aa", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kirisun.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json new file mode 100644 index 00000000000..a90f6ceb791 --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47007", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:54.210", + "lastModified": "2024-10-08T17:15:54.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A NULL pointer dereference in WLAvalancheService.exe of Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json new file mode 100644 index 00000000000..a7b734051c8 --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47008", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:54.463", + "lastModified": "2024-10-08T17:15:54.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-side request forgery in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to leak sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json new file mode 100644 index 00000000000..8b2154637bb --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47009", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:54.777", + "lastModified": "2024-10-08T17:15:54.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json new file mode 100644 index 00000000000..defba5fc98b --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47010", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:55.240", + "lastModified": "2024-10-08T17:15:55.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json new file mode 100644 index 00000000000..a2344581bfb --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47011", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:55.533", + "lastModified": "2024-10-08T17:15:55.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to leak sensitive information" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47161.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47161.json new file mode 100644 index 00000000000..1f29fe2dbcf --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47161.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47161", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-10-08T16:15:12.147", + "lastModified": "2024-10-08T16:15:12.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.07.3 password could be exposed via Sonar runner REST API" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47948.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47948.json new file mode 100644 index 00000000000..ff862e29c06 --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47948.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47948", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-10-08T16:15:12.453", + "lastModified": "2024-10-08T16:15:12.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47949.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47949.json new file mode 100644 index 00000000000..df6d3b30dc8 --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47949.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47949", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-10-08T16:15:12.673", + "lastModified": "2024-10-08T16:15:12.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.07.3 path traversal allowed backup file write to arbitrary location" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47950.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47950.json new file mode 100644 index 00000000000..64994046362 --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47950.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47950", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-10-08T16:15:12.963", + "lastModified": "2024-10-08T16:15:12.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.07.3 stored XSS was possible in Backup configuration settings" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47951.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47951.json new file mode 100644 index 00000000000..5f8bf52cb0d --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47951.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47951", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-10-08T16:15:13.190", + "lastModified": "2024-10-08T16:15:13.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.07.3 stored XSS was possible via server global settings" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7612.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7612.json new file mode 100644 index 00000000000..1729a4cca76 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7612.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7612", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:55.870", + "lastModified": "2024-10-08T17:15:55.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure permissions in Ivanti EPMM before 12.1.0.4 allow a local authenticated attacker to access or modify sensitive configuration files without proper authorization." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2024-7612", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json new file mode 100644 index 00000000000..436b2efea58 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-8215", + "sourceIdentifier": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "published": "2024-10-08T16:15:13.380", + "lastModified": "2024-10-08T16:15:13.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Payara Platform Payara Server (Admin Console modules) allows Remote Code Inclusion.This issue affects Payara Server: from 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, from 6.2022.1 before 6.2024.10, from 4.1.2.191.1 before 4.1.2.191.51." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://docs.payara.fish/community/docs/Release%20Notes/Release%20Notes%206.2024.10.html", + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8" + }, + { + "url": "https://docs.payara.fish/enterprise/docs/5.68.0/Release%20Notes/Release%20Notes%205.68.0.html", + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8" + }, + { + "url": "https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%206.19.0.html", + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json new file mode 100644 index 00000000000..fd4a3313cfc --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8626", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-10-08T17:15:56.240", + "lastModified": "2024-10-08T17:15:56.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected products. A malicious actor could exploit this vulnerability by performing multiple actions on certain web pages of the product causing the affected products to become fully unavailable and require a power cycle to recover." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1706.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9071.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9071.json index c66e609644f..3199e3b3f3d 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9071.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9071.json @@ -2,20 +2,44 @@ "id": "CVE-2024-9071", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T10:15:12.903", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:21:04.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Demo Importer \u2013 A Modern One-Click Demo Import Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Easy Demo Importer \u2013 A Modern One-Click Demo Import Solution para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.1.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -47,18 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sigmadevs:easy_demo_importer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.3", + "matchCriteriaId": "83D07BDC-F9B4-45A5-90D1-F61DC85B8549" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3162305/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/easy-demo-importer/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27a1f457-6bd9-41eb-83e1-cb9e62950041?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9124.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9124.json new file mode 100644 index 00000000000..367265241ac --- /dev/null +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9124.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9124", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-10-08T17:15:56.390", + "lastModified": "2024-10-08T17:15:56.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex\u00ae 600T. If the device is overloaded with requests, it will become unavailable. The device may require a power cycle to recover it if it does not re-establish a connection after it stops receiving requests." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.2, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1705.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9167.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9167.json new file mode 100644 index 00000000000..f1b4159476e --- /dev/null +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9167.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9167", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:56.517", + "lastModified": "2024-10-08T17:15:56.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Under specific circumstances, insecure permissions in Ivanti Velocity License Server before version 5.2 allows a local authenticated attacker to achieve local privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Velocity-License-Server-CVE-2024-9167", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9242.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9242.json index 611689f3f61..53fd569bad4 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9242.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9242.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9242", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T06:15:05.647", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:26:06.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:memberful:memberful:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.73.8", + "matchCriteriaId": "EA82FF6F-88B6-4E46-A194-34F68ADC4401" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/memberful-wp/tags/1.73.7/src/shortcodes.php#L25", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/memberful-wp/tags/1.73.7/src/shortcodes.php#L59", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3161020%40memberful-wp&new=3161020%40memberful-wp&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e30377-2b5a-4b2d-9f19-bae91608fb24?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9271.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9271.json index 43f69fd7fe4..95da6d901c8 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9271.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9271.json @@ -2,20 +2,44 @@ "id": "CVE-2024-9271", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T10:15:13.873", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:17:29.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Re:WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Re:WP para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s de la carga de archivos SVG en todas las versiones hasta la 1.0.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -47,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remilia:re\\:wp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.2", + "matchCriteriaId": "F648AFA7-A7C9-43A5-9371-81C8D6A98674" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3161983/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/rewp/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a7d340b9-6a77-481c-983c-f4774ecff285?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9306.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9306.json index f1f9aaf2c75..3b7611554d0 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9306.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9306.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9306", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T07:15:03.550", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:25:29.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbookingcalendar:wp_booking_calendar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "10.6.1", + "matchCriteriaId": "9B335661-317D-4642-9356-25237CCB530E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3161259%40booking&new=3158531%40booking&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/128d45ec-941c-414c-b341-9964dc748132?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9345.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9345.json index 0f2bd4a720d..bcc78a295c8 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9345.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9345.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9345", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:12.607", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:10:17.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tychesoftwares:product_delivery_date_for_woocommerce:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "2.7.4", + "matchCriteriaId": "79CDB1B2-4D2B-4D77-8D37-793DA55308BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/product-delivery-date-for-woocommerce-lite/tags/-2.7.3/includes/component/pro-notices-in-lite/ts-pro-notices.php#L102", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3161353/product-delivery-date-for-woocommerce-lite/tags/2.7.4/includes/component/pro-notices-in-lite/ts-pro-notices.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1127a5f3-1698-45e9-85bd-4eebfdbe56d4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json new file mode 100644 index 00000000000..b8cc2ae0f98 --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9379", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:56.727", + "lastModified": "2024-10-08T17:15:56.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json new file mode 100644 index 00000000000..66655ad5f40 --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9380", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:56.970", + "lastModified": "2024-10-08T17:15:56.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json new file mode 100644 index 00000000000..89a6613759a --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9381", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-10-08T17:15:57.183", + "lastModified": "2024-10-08T17:15:57.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal in Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to bypass restrictions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9435.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9435.json index bbc970290a1..6f8d751d9c7 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9435.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9435.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9435", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T07:15:03.857", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-08T16:22:40.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:plainware:shiftcontroller:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.9.67", + "matchCriteriaId": "CC38991A-9C3F-4C8F-9CAF-CF0654AB7A57" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3161880/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/tags/4.9.66/shiftcontroller/trunk/hc3/post.php#L61", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd3a198c-7c24-45b1-95a7-eb16472a51e2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9620.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9620.json new file mode 100644 index 00000000000..35bf092b952 --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9620.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9620", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-10-08T17:15:57.357", + "lastModified": "2024-10-08T17:15:57.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Event-Driven Automation (EDA) in Ansible Automation Platform (AAP), which lacks encryption of sensitive information. An attacker with network access could exploit this vulnerability by sniffing the plaintext data transmitted between the EDA and AAP. An attacker with system access could exploit this vulnerability by reading the plaintext data stored in EDA and AAP databases." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-9620", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317129", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9621.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9621.json new file mode 100644 index 00000000000..d69e379d1d4 --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9621.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9621", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-10-08T17:15:57.573", + "lastModified": "2024-10-08T17:15:57.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Quarkus CXF. Passwords and other secrets may appear in the application log in spite of the user configuring them to be hidden. This issue requires some special configuration to be vulnerable, such as SOAP logging enabled, application set client, and endpoint logging properties, and the attacker must have access to the application log." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-9621", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317130", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9622.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9622.json new file mode 100644 index 00000000000..e485d6f8bbc --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9622.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-9622", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-10-08T17:15:57.790", + "lastModified": "2024-10-08T17:15:57.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-9622", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317179", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/orgs/resteasy/discussions/4351", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/resteasy/resteasy", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b996d6da7d4..d81bfa40d48 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-08T16:00:20.002746+00:00 +2024-10-08T18:00:22.779292+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-08T15:55:08.933000+00:00 +2024-10-08T17:45:55.643000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264878 +264904 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `26` -- [CVE-2024-33506](CVE-2024/CVE-2024-335xx/CVE-2024-33506.json) (`2024-10-08T15:15:14.717`) -- [CVE-2024-45330](CVE-2024/CVE-2024-453xx/CVE-2024-45330.json) (`2024-10-08T15:15:15.010`) -- [CVE-2024-45880](CVE-2024/CVE-2024-458xx/CVE-2024-45880.json) (`2024-10-08T15:15:15.217`) +- [CVE-2024-44349](CVE-2024/CVE-2024-443xx/CVE-2024-44349.json) (`2024-10-08T17:15:54.027`) +- [CVE-2024-45230](CVE-2024/CVE-2024-452xx/CVE-2024-45230.json) (`2024-10-08T16:15:11.903`) +- [CVE-2024-45231](CVE-2024/CVE-2024-452xx/CVE-2024-45231.json) (`2024-10-08T16:15:11.997`) +- [CVE-2024-45918](CVE-2024/CVE-2024-459xx/CVE-2024-45918.json) (`2024-10-08T17:15:54.120`) +- [CVE-2024-47007](CVE-2024/CVE-2024-470xx/CVE-2024-47007.json) (`2024-10-08T17:15:54.210`) +- [CVE-2024-47008](CVE-2024/CVE-2024-470xx/CVE-2024-47008.json) (`2024-10-08T17:15:54.463`) +- [CVE-2024-47009](CVE-2024/CVE-2024-470xx/CVE-2024-47009.json) (`2024-10-08T17:15:54.777`) +- [CVE-2024-47010](CVE-2024/CVE-2024-470xx/CVE-2024-47010.json) (`2024-10-08T17:15:55.240`) +- [CVE-2024-47011](CVE-2024/CVE-2024-470xx/CVE-2024-47011.json) (`2024-10-08T17:15:55.533`) +- [CVE-2024-47161](CVE-2024/CVE-2024-471xx/CVE-2024-47161.json) (`2024-10-08T16:15:12.147`) +- [CVE-2024-47948](CVE-2024/CVE-2024-479xx/CVE-2024-47948.json) (`2024-10-08T16:15:12.453`) +- [CVE-2024-47949](CVE-2024/CVE-2024-479xx/CVE-2024-47949.json) (`2024-10-08T16:15:12.673`) +- [CVE-2024-47950](CVE-2024/CVE-2024-479xx/CVE-2024-47950.json) (`2024-10-08T16:15:12.963`) +- [CVE-2024-47951](CVE-2024/CVE-2024-479xx/CVE-2024-47951.json) (`2024-10-08T16:15:13.190`) +- [CVE-2024-7612](CVE-2024/CVE-2024-76xx/CVE-2024-7612.json) (`2024-10-08T17:15:55.870`) +- [CVE-2024-8215](CVE-2024/CVE-2024-82xx/CVE-2024-8215.json) (`2024-10-08T16:15:13.380`) +- [CVE-2024-8626](CVE-2024/CVE-2024-86xx/CVE-2024-8626.json) (`2024-10-08T17:15:56.240`) +- [CVE-2024-9124](CVE-2024/CVE-2024-91xx/CVE-2024-9124.json) (`2024-10-08T17:15:56.390`) +- [CVE-2024-9167](CVE-2024/CVE-2024-91xx/CVE-2024-9167.json) (`2024-10-08T17:15:56.517`) +- [CVE-2024-9379](CVE-2024/CVE-2024-93xx/CVE-2024-9379.json) (`2024-10-08T17:15:56.727`) +- [CVE-2024-9380](CVE-2024/CVE-2024-93xx/CVE-2024-9380.json) (`2024-10-08T17:15:56.970`) +- [CVE-2024-9381](CVE-2024/CVE-2024-93xx/CVE-2024-9381.json) (`2024-10-08T17:15:57.183`) +- [CVE-2024-9620](CVE-2024/CVE-2024-96xx/CVE-2024-9620.json) (`2024-10-08T17:15:57.357`) +- [CVE-2024-9621](CVE-2024/CVE-2024-96xx/CVE-2024-9621.json) (`2024-10-08T17:15:57.573`) +- [CVE-2024-9622](CVE-2024/CVE-2024-96xx/CVE-2024-9622.json) (`2024-10-08T17:15:57.790`) ### CVEs modified in the last Commit -Recently modified CVEs: `65` +Recently modified CVEs: `129` -- [CVE-2024-20490](CVE-2024/CVE-2024-204xx/CVE-2024-20490.json) (`2024-10-08T15:15:39.160`) -- [CVE-2024-20491](CVE-2024/CVE-2024-204xx/CVE-2024-20491.json) (`2024-10-08T15:55:08.933`) -- [CVE-2024-28888](CVE-2024/CVE-2024-288xx/CVE-2024-28888.json) (`2024-10-08T14:14:55.637`) -- [CVE-2024-41163](CVE-2024/CVE-2024-411xx/CVE-2024-41163.json) (`2024-10-08T14:47:56.787`) -- [CVE-2024-41587](CVE-2024/CVE-2024-415xx/CVE-2024-41587.json) (`2024-10-08T15:32:18.313`) -- [CVE-2024-41591](CVE-2024/CVE-2024-415xx/CVE-2024-41591.json) (`2024-10-08T15:34:46.453`) -- [CVE-2024-41593](CVE-2024/CVE-2024-415xx/CVE-2024-41593.json) (`2024-10-08T15:35:04.583`) -- [CVE-2024-41594](CVE-2024/CVE-2024-415xx/CVE-2024-41594.json) (`2024-10-08T15:31:47.907`) -- [CVE-2024-41922](CVE-2024/CVE-2024-419xx/CVE-2024-41922.json) (`2024-10-08T14:48:47.087`) -- [CVE-2024-42417](CVE-2024/CVE-2024-424xx/CVE-2024-42417.json) (`2024-10-08T15:43:05.720`) -- [CVE-2024-43699](CVE-2024/CVE-2024-436xx/CVE-2024-43699.json) (`2024-10-08T15:44:29.183`) -- [CVE-2024-43795](CVE-2024/CVE-2024-437xx/CVE-2024-43795.json) (`2024-10-08T14:01:16.883`) -- [CVE-2024-45873](CVE-2024/CVE-2024-458xx/CVE-2024-45873.json) (`2024-10-08T14:35:03.647`) -- [CVE-2024-45874](CVE-2024/CVE-2024-458xx/CVE-2024-45874.json) (`2024-10-08T14:35:04.530`) -- [CVE-2024-45919](CVE-2024/CVE-2024-459xx/CVE-2024-45919.json) (`2024-10-08T14:35:05.300`) -- [CVE-2024-46977](CVE-2024/CVE-2024-469xx/CVE-2024-46977.json) (`2024-10-08T14:02:04.173`) -- [CVE-2024-47617](CVE-2024/CVE-2024-476xx/CVE-2024-47617.json) (`2024-10-08T14:23:38.597`) -- [CVE-2024-47618](CVE-2024/CVE-2024-476xx/CVE-2024-47618.json) (`2024-10-08T14:31:08.180`) -- [CVE-2024-47817](CVE-2024/CVE-2024-478xx/CVE-2024-47817.json) (`2024-10-08T15:35:24.303`) -- [CVE-2024-8352](CVE-2024/CVE-2024-83xx/CVE-2024-8352.json) (`2024-10-08T14:17:34.707`) -- [CVE-2024-9210](CVE-2024/CVE-2024-92xx/CVE-2024-9210.json) (`2024-10-08T15:34:42.060`) -- [CVE-2024-9218](CVE-2024/CVE-2024-92xx/CVE-2024-9218.json) (`2024-10-08T15:33:58.617`) -- [CVE-2024-9222](CVE-2024/CVE-2024-92xx/CVE-2024-9222.json) (`2024-10-08T15:34:13.250`) -- [CVE-2024-9344](CVE-2024/CVE-2024-93xx/CVE-2024-9344.json) (`2024-10-08T15:06:57.470`) -- [CVE-2024-9460](CVE-2024/CVE-2024-94xx/CVE-2024-9460.json) (`2024-10-08T14:33:42.703`) +- [CVE-2024-20696](CVE-2024/CVE-2024-206xx/CVE-2024-20696.json) (`2024-10-08T16:15:09.433`) +- [CVE-2024-20697](CVE-2024/CVE-2024-206xx/CVE-2024-20697.json) (`2024-10-08T16:15:09.587`) +- [CVE-2024-21312](CVE-2024/CVE-2024-213xx/CVE-2024-21312.json) (`2024-10-08T16:15:10.870`) +- [CVE-2024-21533](CVE-2024/CVE-2024-215xx/CVE-2024-21533.json) (`2024-10-08T16:35:04.437`) +- [CVE-2024-23512](CVE-2024/CVE-2024-235xx/CVE-2024-23512.json) (`2024-10-08T17:01:56.890`) +- [CVE-2024-24796](CVE-2024/CVE-2024-247xx/CVE-2024-24796.json) (`2024-10-08T16:27:19.487`) +- [CVE-2024-24797](CVE-2024/CVE-2024-247xx/CVE-2024-24797.json) (`2024-10-08T16:31:14.093`) +- [CVE-2024-24887](CVE-2024/CVE-2024-248xx/CVE-2024-24887.json) (`2024-10-08T16:48:35.663`) +- [CVE-2024-24926](CVE-2024/CVE-2024-249xx/CVE-2024-24926.json) (`2024-10-08T16:32:41.983`) +- [CVE-2024-24929](CVE-2024/CVE-2024-249xx/CVE-2024-24929.json) (`2024-10-08T16:45:27.380`) +- [CVE-2024-24935](CVE-2024/CVE-2024-249xx/CVE-2024-24935.json) (`2024-10-08T16:52:19.450`) +- [CVE-2024-25697](CVE-2024/CVE-2024-256xx/CVE-2024-25697.json) (`2024-10-08T17:15:29.717`) +- [CVE-2024-25699](CVE-2024/CVE-2024-256xx/CVE-2024-25699.json) (`2024-10-08T17:15:29.917`) +- [CVE-2024-25705](CVE-2024/CVE-2024-257xx/CVE-2024-25705.json) (`2024-10-08T17:15:30.027`) +- [CVE-2024-25706](CVE-2024/CVE-2024-257xx/CVE-2024-25706.json) (`2024-10-08T17:15:30.303`) +- [CVE-2024-25709](CVE-2024/CVE-2024-257xx/CVE-2024-25709.json) (`2024-10-08T17:15:30.607`) +- [CVE-2024-30105](CVE-2024/CVE-2024-301xx/CVE-2024-30105.json) (`2024-10-08T17:15:32.123`) +- [CVE-2024-44439](CVE-2024/CVE-2024-444xx/CVE-2024-44439.json) (`2024-10-08T16:35:05.540`) +- [CVE-2024-45880](CVE-2024/CVE-2024-458xx/CVE-2024-45880.json) (`2024-10-08T16:35:06.407`) +- [CVE-2024-9071](CVE-2024/CVE-2024-90xx/CVE-2024-9071.json) (`2024-10-08T16:21:04.180`) +- [CVE-2024-9242](CVE-2024/CVE-2024-92xx/CVE-2024-9242.json) (`2024-10-08T16:26:06.147`) +- [CVE-2024-9271](CVE-2024/CVE-2024-92xx/CVE-2024-9271.json) (`2024-10-08T16:17:29.110`) +- [CVE-2024-9306](CVE-2024/CVE-2024-93xx/CVE-2024-9306.json) (`2024-10-08T16:25:29.877`) +- [CVE-2024-9345](CVE-2024/CVE-2024-93xx/CVE-2024-9345.json) (`2024-10-08T16:10:17.567`) +- [CVE-2024-9435](CVE-2024/CVE-2024-94xx/CVE-2024-9435.json) (`2024-10-08T16:22:40.780`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7d271968c65..be23e10a53b 100644 --- a/_state.csv +++ b/_state.csv @@ -57696,7 +57696,7 @@ CVE-2012-6712,0,0,fea67aeec6bfb437e5bbbf61612f61be5817060ae71f29adff92a6a16ad7cb CVE-2012-6713,0,0,8e78c41cf37196fe690c75e0d151b4665941115914aa9cb490b5c36cf2917d3d,2019-08-16T12:43:14.863000 CVE-2012-6714,0,0,0d26ab81fa0d08750506b398fd79690e0fc9a8db7e8af352052cb4d425743b23,2019-08-22T18:48:28.723000 CVE-2012-6715,0,0,acac1344a2fece8291d3236a0e888ac50de5604c056f7e08b1e21778d6dc7534,2019-08-22T18:48:23.957000 -CVE-2012-6716,0,1,dd19be3d6a6b8d7d81719aa011cf031595811a6795a3cd0053c2b23bcb507dfa,2024-10-08T14:03:10.323000 +CVE-2012-6716,0,0,dd19be3d6a6b8d7d81719aa011cf031595811a6795a3cd0053c2b23bcb507dfa,2024-10-08T14:03:10.323000 CVE-2012-6717,0,0,907f3bb02239aa3deb76ca17eea3af26dc2323b4010ed27fa690ad99aad9ec7e,2019-08-30T20:16:31.407000 CVE-2012-6718,0,0,6e4a6ff3b27ac4b0352851f586e54a3bd445b48e9746720a77848eed83fdf964,2019-08-28T22:02:24.167000 CVE-2012-6719,0,0,0238e8012603d25a6650a360bca72659e45e5bb1ad618281f10424acab357ff2,2019-08-28T22:02:59.513000 @@ -64467,10 +64467,10 @@ CVE-2013-7473,0,0,eaa40e1ac74ece646d5511e664f7de6ff1acad0adf0045807e9fb3f7bba9fc CVE-2013-7474,0,0,204b6f852433e6e6a52be5a2ccde425469565220f9b6e20a391b2c9bd04e2f4e,2019-08-06T12:19:27.310000 CVE-2013-7475,0,0,1b2b3417415e5378c5798e9d3c162e15e1fb210651616346f80d15f4d7687f6b,2019-08-16T02:06:17.230000 CVE-2013-7476,0,0,932d0a08295a626c66a6692048203ded269dbdd790c7615a6f31d10886e011d1,2019-08-20T15:46:45.173000 -CVE-2013-7477,0,1,3853d48088e580734a7c8bbb97025c2186efa8e9ae791097177cabd64bb692f4,2024-10-08T14:03:10.323000 -CVE-2013-7478,0,1,7e752bb66fc0a04e0c6996290e397bb5a2262f6ac76c327956ffb382d56579b5,2024-10-08T14:03:10.323000 -CVE-2013-7479,0,1,c80bc6023055cd18a18c95ec7cffcc6c53e524cbace5210f0eeb96c54edb519e,2024-10-08T14:03:10.323000 -CVE-2013-7480,0,1,0901440da71ccb205539ab51704e56d507bff1c4ca4d0c230aa992dc487ad802,2024-10-08T14:03:10.323000 +CVE-2013-7477,0,0,3853d48088e580734a7c8bbb97025c2186efa8e9ae791097177cabd64bb692f4,2024-10-08T14:03:10.323000 +CVE-2013-7478,0,0,7e752bb66fc0a04e0c6996290e397bb5a2262f6ac76c327956ffb382d56579b5,2024-10-08T14:03:10.323000 +CVE-2013-7479,0,0,c80bc6023055cd18a18c95ec7cffcc6c53e524cbace5210f0eeb96c54edb519e,2024-10-08T14:03:10.323000 +CVE-2013-7480,0,0,0901440da71ccb205539ab51704e56d507bff1c4ca4d0c230aa992dc487ad802,2024-10-08T14:03:10.323000 CVE-2013-7481,0,0,e588358c6594f38974f7ccc59bf852b76c31ea6093a4a37b6b5724f08779c45c,2019-08-26T13:44:35.073000 CVE-2013-7482,0,0,d08b968b420d482d3adbf98ed0f191ad033762109cdf1aba8d553fc3325be99e,2019-08-26T17:30:25.260000 CVE-2013-7483,0,0,201e7c5368a83a415ce838ba6cb3eb2abf7ae692a437b7e153c481cfc750f722,2019-08-29T12:53:47.557000 @@ -81956,10 +81956,10 @@ CVE-2015-9293,0,0,f722908f843412029c6283024b15fec75243a0730ac144305243aafcc95d80 CVE-2015-9294,0,0,942b46a83da511ca07573d6928bd536028cfeaa81a397ec213524edea483f9d4,2019-08-16T02:05:34.933000 CVE-2015-9295,0,0,a0a8117230a64c846ec962ed035b109fdb8db1a949badf030304258939c444a5,2019-08-16T01:59:24.713000 CVE-2015-9296,0,0,064ca7caa82ba4c0cbca268896c680d4a55a9f1f1850508bf43d1161dc24838a,2019-08-16T12:41:07.637000 -CVE-2015-9297,0,1,e105a85a95fa9cc9b23dc1553c1d494e31596e88adbe09f00a6a488f2981d879,2024-10-08T14:03:10.323000 -CVE-2015-9298,0,1,b032e7b3fe57a1f0999d238d8d9851bf736b712b71e6c2da70013d1d17315297,2024-10-08T14:03:10.323000 -CVE-2015-9299,0,1,6ec8316e366bbab7d42f8aa05d79ad37d16d9ac590d39fff5d3195f8c90e4072,2024-10-08T14:03:10.323000 -CVE-2015-9300,0,1,5723f82c6e7473948b743f970d400ff3f0063ba5959dd50cd180da33b59fa12a,2024-10-08T14:03:10.323000 +CVE-2015-9297,0,0,e105a85a95fa9cc9b23dc1553c1d494e31596e88adbe09f00a6a488f2981d879,2024-10-08T14:03:10.323000 +CVE-2015-9298,0,0,b032e7b3fe57a1f0999d238d8d9851bf736b712b71e6c2da70013d1d17315297,2024-10-08T14:03:10.323000 +CVE-2015-9299,0,0,6ec8316e366bbab7d42f8aa05d79ad37d16d9ac590d39fff5d3195f8c90e4072,2024-10-08T14:03:10.323000 +CVE-2015-9300,0,0,5723f82c6e7473948b743f970d400ff3f0063ba5959dd50cd180da33b59fa12a,2024-10-08T14:03:10.323000 CVE-2015-9301,0,0,276dd7fbd38b1c3c46d0b94e962f96f535d8c3ddd7965fb2400d7bcf20dc9e69,2019-09-09T13:52:44.973000 CVE-2015-9302,0,0,71719f22a9552c078e85c1c9ccd272971c1b84525e4a75dd68ae74851cc256b0,2023-03-01T02:55:21.820000 CVE-2015-9303,0,0,9a10143f43efc15e3bd93deba79f4819d47834ba56f015f17450fcf296ddb3cb,2019-08-16T20:01:54.770000 @@ -86706,7 +86706,7 @@ CVE-2016-3423,0,0,f488c6c7a9631fd699fa9b57b56b86988d635c1dd450226500d2cde596b29c CVE-2016-3424,0,0,12a2452cd8236b7b003af717b552b17c568dc6ad2276770c6c815ab727a09268,2017-09-01T01:29:08.757000 CVE-2016-3425,0,0,3980fcdd6b582f77d8738e3fb3c3014b69a3c5f69786134c7feef1ed5c568ff2,2022-05-13T14:57:21.280000 CVE-2016-3426,0,0,22a611d74ba5653e7d51a013d889a6174c468db31a3d4254b64f3e36ce9fb63f,2022-05-13T14:57:21.287000 -CVE-2016-3427,0,1,3c26976c655fb8986613f82077701e8cb5ceed9f9827c279533f38f1d1d89b5c,2024-10-08T15:35:00.827000 +CVE-2016-3427,0,0,3c26976c655fb8986613f82077701e8cb5ceed9f9827c279533f38f1d1d89b5c,2024-10-08T15:35:00.827000 CVE-2016-3428,0,0,821ab93ab9f9b7c000b0a0e3558ee4082ee77c196fd17fb39cef9ad80c3ee75d,2017-09-03T01:29:06.407000 CVE-2016-3429,0,0,298e0976d614f443bc0690c14bd472e228c05ff2e8969750c9f5d2b91da29469,2016-12-03T03:26:54.870000 CVE-2016-3431,0,0,e79081d1162d89c9389fa396cfaa769607de656a51ddc125cd694172e6d287ff,2017-09-03T01:29:06.453000 @@ -110285,7 +110285,7 @@ CVE-2018-0572,0,0,55fa2c32858ac4b7e4a407247a54448912655adf98fe360b71b3b7357fd855 CVE-2018-0573,0,0,d62dd63f45312c87f4d08ddad7aeb5b17733edf03bf37a9c112f3ed9e3e9c635,2019-10-03T00:03:26.223000 CVE-2018-0574,0,0,2d9dbb2c0e301b001b1076d73115f6ad550c5a782f44d7762b21c36aaa7feb00,2018-08-21T12:37:27.360000 CVE-2018-0575,0,0,d7b229dbe0c3f84bb28baa739b0c9ca9c813faef14dfb871e568218d26aadd14,2018-08-21T12:37:35.893000 -CVE-2018-0576,0,1,7c73d2bce74299ba49ce0ee7bf19d7f3ba1abf44674b20864709cdb914849e2a,2024-10-08T14:03:10.323000 +CVE-2018-0576,0,0,7c73d2bce74299ba49ce0ee7bf19d7f3ba1abf44674b20864709cdb914849e2a,2024-10-08T14:03:10.323000 CVE-2018-0577,0,0,8c2416cf577d42d47509cdec290ab25589f6b1ec9708e1dbd6a57a05c58ff38d,2023-05-26T15:04:42.427000 CVE-2018-0578,0,0,6b692ab380b53522a821cc598a6bced07196f1260947bfa45a49ac845c0af297,2018-06-13T16:58:04.207000 CVE-2018-0579,0,0,38b948c45b50d2ca2068829788b915d19f016f3122883ec4ab6b859260eb384d,2018-06-19T16:21:01.873000 @@ -113989,7 +113989,7 @@ CVE-2018-13132,0,0,5e8ef7e7daa8dc965753a57466e5bb71f54de11e63b597e47e2ebd6daa312 CVE-2018-13133,0,0,6db7a16db38c5ff9d73289b26ae02bd76589b2c4f0eb96435fd8fea57a03d220,2018-09-06T18:03:58.940000 CVE-2018-13134,0,0,bdc8ba5878d3af9afa836ffad5108d61abd3e609661c3ec4b86ad2554b45a5cc,2019-03-28T16:50:48.340000 CVE-2018-13136,0,0,e4f4347c2ac6380810868ef6821a07e55f1dce1195133ce09d226ee2f195de10,2019-09-18T06:15:10.120000 -CVE-2018-13137,0,1,f7258b1723f3b64474f3166d8c18c2fbe72d4fbaeb7e10bc819044e3fa87f8ed,2024-10-08T14:03:10.323000 +CVE-2018-13137,0,0,f7258b1723f3b64474f3166d8c18c2fbe72d4fbaeb7e10bc819044e3fa87f8ed,2024-10-08T14:03:10.323000 CVE-2018-13139,0,0,4fd67f2d933ef3137c2e50e1238a5e1cce7f0c01ad3c77c6a2de4ca5916785ec,2020-08-24T17:37:01.140000 CVE-2018-1314,0,0,944e6b63519313f1b7e2da9d6bf61d8bb6060c637021a11f7c9578f677ff2563,2023-11-07T02:55:57.473000 CVE-2018-13140,0,0,8a1977e0f38976cbed5cae8c32a7b044cdda55f357b01254ec9f560c4a3831fc,2019-10-03T00:03:26.223000 @@ -126633,7 +126633,7 @@ CVE-2018-9016,0,0,a31720ff1c65b4e02359e87911e103554822005dd7719d7609f595908b1db6 CVE-2018-9017,0,0,c3b9d8ffb0ca09d4a169a19e009d2e8ba5f052fb491b48f3bd3e76e57e7c847a,2018-04-18T01:27:51.957000 CVE-2018-9018,0,0,337e0399b3687e9aa8483bb8c7f9bf3838bed5e800b97b0d3ce60d00b25ed468,2023-11-07T03:01:32.350000 CVE-2018-9019,0,0,4ab893a114b8633871f0e647e76a1cc31e0c22ccbe0c07e736c07cfe207310b3,2021-01-30T02:36:52.037000 -CVE-2018-9020,0,1,7d5c20c78613c83a49f2f2002d7bc483021f60c62977f8f17f755160d8011617,2024-10-08T14:03:10.323000 +CVE-2018-9020,0,0,7d5c20c78613c83a49f2f2002d7bc483021f60c62977f8f17f755160d8011617,2024-10-08T14:03:10.323000 CVE-2018-9021,0,0,be8bde5da6bd794170bd384754187a22a60d92407d1de775ad8238e28084daf6,2021-04-13T20:23:49.383000 CVE-2018-9022,0,0,896f2b765457082fd902e7a9aad62e3832b94d147ee6c5e0eb7c35b3fc3943b5,2021-04-13T20:24:17.933000 CVE-2018-9023,0,0,93ace0a5687980d181a98369b8920d8a65e4392a4619cb02fb4d58c769cbb33d,2021-04-12T13:40:44.337000 @@ -134222,7 +134222,7 @@ CVE-2019-1652,0,0,b7c230db50ecd8679bc76e17a8cddc532e062f94276746b7bc2c035d845365 CVE-2019-16520,0,0,8530ec651f53fe71e4e3557184e3fe5dce9f6df1063aea8136757697025dd6bd,2019-10-18T20:22:28.553000 CVE-2019-16521,0,0,e1d25327f8ca832ac39c31ba7a6cfbf686ebed371e748036fcb310f4b4c9a433,2019-10-18T20:24:32.450000 CVE-2019-16522,0,0,abb515b5d25ea25feee783d6602457cb080d8cf99c7e61398fd28e8cb29df2f8,2019-10-20T22:19:38.167000 -CVE-2019-16523,0,1,20ba1be1c41b905902382990f9234a363b514d61a2f57ef4b8ad566393acba1c,2024-10-08T14:03:10.323000 +CVE-2019-16523,0,0,20ba1be1c41b905902382990f9234a363b514d61a2f57ef4b8ad566393acba1c,2024-10-08T14:03:10.323000 CVE-2019-16524,0,0,127e34041e0d36851de3093a9de484f99a0708cb57709188ec396024c90b3e5b,2019-10-01T14:05:12.320000 CVE-2019-16525,0,0,55daa8e48c219b43811e6f13af2c9ce4a2cb7d85f60ecf9b2a2463d5d07be895,2019-09-20T14:55:17.993000 CVE-2019-16528,0,0,5ccb09375071fa903e23bbd06ed48db483d22d7cc5eea087e80e09939e42e2e2,2021-07-21T11:39:23.747000 @@ -135755,7 +135755,7 @@ CVE-2019-18651,0,0,8d8529b95e2bd82ad4d5e37b40a184f4131721fb63497363393e1486b7941 CVE-2019-18652,0,0,bf86efd5e2822134388993e654b8bf0afd296025d4aaea08972e71d28cd81616,2020-01-12T21:33:22.470000 CVE-2019-18653,0,0,6522d1f0f015a16f3430ba40478f38343367fe7e44e2fe45022e10d5b5ee4db8,2023-11-07T03:06:53.403000 CVE-2019-18654,0,0,996264607a08a2efa7ad429c8f38c9090b6c1bb60d85294570f40ff440878d5f,2023-11-07T03:06:53.463000 -CVE-2019-18655,0,0,04f6aac16404371d1f19da29bbb8116b10a2b8f70fac97ee12f7e54bc1758b8b,2021-02-10T13:53:32.863000 +CVE-2019-18655,0,1,1164f7843c54b7dc3e7c7e178ddf1d9ab77313b08b93cebbe185525178a41296,2024-10-08T16:15:04.453000 CVE-2019-18656,0,0,802365fc220a2d7e3dbecea70d57f1f8274492973b2bf5145aba2fd8cba14cb9,2019-11-01T12:31:36.517000 CVE-2019-18657,0,0,c7aeb300bd827cd2e4d2eda92542f7bed0cbd90ab1e42928cad09a5a1257e0de,2019-11-06T16:44:45.590000 CVE-2019-18658,0,0,1f288ae26ae405946edb38317fa6e2346d5a4680f6a22234dc21ee25a2535d83,2019-11-14T14:40:14.683000 @@ -157963,10 +157963,10 @@ CVE-2020-3498,0,0,9b8266ce646bbd797d51b71d793130ff53131bf078eaa2864fb730dea52122 CVE-2020-3499,0,0,77cc0759b20eefd41abc9ed43d45a21d35b25bc844c12ee022fc99d76c872b25,2022-10-29T02:41:29.650000 CVE-2020-3500,0,0,c94d1f534dd8374c9e1bb358d0c2b7cd651113b2b3bbf46661240e46bec53a54,2023-11-07T03:22:48.680000 CVE-2020-3501,0,0,f589f870391256874c75871a4bd1ed6fbbdacfc22b1b8a6d778ba311790dce55,2023-11-07T03:22:48.857000 -CVE-2020-35012,0,1,4fd0cd243ef5d706a0793f2db1b22b15ab2380941a356dbb4c281e075a796d42,2024-10-08T14:03:10.323000 +CVE-2020-35012,0,0,4fd0cd243ef5d706a0793f2db1b22b15ab2380941a356dbb4c281e075a796d42,2024-10-08T14:03:10.323000 CVE-2020-3502,0,0,e7ce2c6b29140f9f49e26a549bbacb564d7d2f9c95e9afcda81c4e467eaa5504,2023-11-07T03:22:49.040000 CVE-2020-3503,0,0,7ac871ccff03bfb5899f62e0fa430df69ef933e6857ab3ffc2a5add8626932a9,2023-11-07T03:22:49.220000 -CVE-2020-35037,0,1,4932400c9ef86c5bdd63a5f828a4c442cd773e3bc0704ed0f0d7d7d5690114ec,2024-10-08T14:03:10.323000 +CVE-2020-35037,0,0,4932400c9ef86c5bdd63a5f828a4c442cd773e3bc0704ed0f0d7d7d5690114ec,2024-10-08T14:03:10.323000 CVE-2020-3504,0,0,753682fd2455742fd21a90cef952f396bc59bf7c7c08008022b1e83e86ec685c,2023-11-07T03:22:49.407000 CVE-2020-3505,0,0,2d7d6fb583c7487794cc36002bc2235ab6eb4a4e5b22ae34b3247400b0837b80,2023-11-07T03:22:49.610000 CVE-2020-3506,0,0,9b0b0aa4673dfac7729233fa4da8c2acefa3cafef21abd4fc6e14a864c0ef324,2023-11-07T03:22:49.783000 @@ -165989,95 +165989,95 @@ CVE-2021-1627,0,0,cc72307cee0bdc7c04cdd157d9e08ae6d8bb75ab84eedbe7a4919c1a1e3141 CVE-2021-1628,0,0,e41904e0abf071804898c810e8ebb2e33c57a910e1f2179ab7553d5ecf32e964,2021-04-01T14:46:33.477000 CVE-2021-1629,0,0,2db64e423d8d3a83dcabed5c8b03c1a08f790ac10a7a32462826389490f5c0fa,2021-06-03T18:58:20.237000 CVE-2021-1630,0,0,d8a9e0c0a06b84822bf0535ecef7eb7b1704645d83abed2f3285f21ee8dbe811,2021-08-12T19:12:11.010000 -CVE-2021-1636,0,0,0eba2050c7ee35f7d9afd96b4dcb9a48d550c1fd6d185f1fb232571282942b8c,2023-12-29T17:15:49.923000 -CVE-2021-1637,0,0,ad798b989f7910382d96dd235f1ca4a2827e58e3b3e17959b7379cf3947e9337,2023-12-29T23:15:11.220000 -CVE-2021-1638,0,0,e3805f8b1d269a99bb07cab43d314e41dc02aa37b43663ce95bd0a7e0c5b8037,2023-12-29T23:15:11.450000 +CVE-2021-1636,0,1,8b67d75126dee07c3492e85a8b6c5f994f835f7b273f5dfdf87e803864524459,2024-10-08T17:15:14.593000 +CVE-2021-1637,0,1,f9e7a279e9a02f9b1026cbe7a0b826dcfa214a0eed20decd40ae96f29a16cc73,2024-10-08T17:15:14.750000 +CVE-2021-1638,0,1,9581f39e112677ce174c2e28bce0d2caebe64dab5c54d7adf7db91d95f02c758,2024-10-08T17:15:14.883000 CVE-2021-1639,0,0,db5d31407d3b2b0eb2fd3c1af04a8ad6e49a740530f230e3dd6e756da30b025c,2023-12-29T17:15:50.150000 CVE-2021-1640,0,0,f9ee06d99c6173dac7a50cd701e8584114d6ab906b8ea105e3d450d5b60d5568,2023-12-29T20:15:48.117000 -CVE-2021-1641,0,0,8f4a984d28fea9ba4374ac197f7f740db39e6f2e1a4c20519245b4711e5bb815,2023-12-29T17:15:50.357000 -CVE-2021-1642,0,0,97dc239ed23da9bbdfb4a10b08ea50536b5d837c84c438da7befd409845080ee,2023-12-29T23:15:11.667000 -CVE-2021-1643,0,0,bb742d8bfa35d88db9bc99812b5f9cd2f73e74bd874ab9e1dc148f4875014ecf,2023-12-29T17:15:50.553000 -CVE-2021-1644,0,0,14279b15afc3056a21f24ccde5f25345e3b73061cd9efd1b50b5298dfd35a11a,2023-12-29T17:15:50.730000 -CVE-2021-1645,0,0,4dfb35eefe437bec41c48d3927d80f5713c325a1ced9ba8e3efb0d278c6f0c31,2023-12-29T23:15:11.920000 -CVE-2021-1646,0,0,f4bc76dcddc23a2b58bb58629da087ac6e0c0b22abe5bd59a5d672eb4e29f73d,2023-12-29T23:15:12.130000 -CVE-2021-1647,0,0,edac025cc14c5a7a179c4b21f52fb895d9b1cf0c356af8088d6a1035a8e53456,2024-07-26T20:03:15.473000 -CVE-2021-1648,0,0,51bf81f466e8c6e9d74965ed224fc2693ef5d496e2a39145acb21c0e603ac959,2023-12-29T23:15:12.527000 -CVE-2021-1649,0,0,7391cf46001a6a9b3779cfb8d258fee586fb3be75aa6a20a8498f35920823236,2023-12-29T23:15:12.890000 -CVE-2021-1650,0,0,9f3d687b63ab520b9ad5603133444fa4aa70f218dcd288be3a9490c61f88efa9,2023-12-29T23:15:13.240000 -CVE-2021-1651,0,0,ad1858e0fd77a6e17e4be62eeda10f2c08fdee53d22db0b71dee5fd9152bf7aa,2023-12-29T23:15:13.587000 -CVE-2021-1652,0,0,9b45475fc58c31161278f86cfc1bade8cdded197e6bdf2ae0bde89509f03ffd3,2023-12-29T23:15:13.910000 -CVE-2021-1653,0,0,a5f2c523c209355146d24bb0e7e6af461836a1fb58c4a97240b722d0292b3819,2023-12-29T23:15:14.277000 -CVE-2021-1654,0,0,4f2338f42b6ac2030c60bede7aec25adcf7695c63afed4f76b1c5200259a354d,2023-12-29T23:15:14.613000 -CVE-2021-1655,0,0,701d3c4d91178a9363aef174b4920d4fe4e6f97119cfd479028ad7f3a16a1acd,2023-12-29T23:15:14.967000 -CVE-2021-1656,0,0,44b0c8b5a2616eb1a5acd6d6481d319535a8c2920c0be0c04a98841d54326628,2023-12-29T23:15:15.213000 -CVE-2021-1657,0,0,66c35f149cdd92dadfa79c7e9a723944bd4af373c2ff17a836b59f6456a5f1fc,2023-12-29T23:15:15.420000 -CVE-2021-1658,0,0,34bda9aeb89f5b692ee61c6cb979509d6be64eae4cec4ac3770445ac85b973df,2023-12-29T23:15:15.633000 -CVE-2021-1659,0,0,d12dc6094add6c38b55b97f0005469cbdd9c86f072eaf200a84b50411a49c4b8,2023-12-29T23:15:15.863000 -CVE-2021-1660,0,0,17da7c8e51461f88dbae8c1bb5091826321e920af03f68c9c2b3ca1c6fdfe915,2023-12-29T23:15:16.140000 -CVE-2021-1661,0,0,66f4f99ac066e3bd5d95e89abc42546fe32863b119eef0cff601b2c28a5d572f,2023-12-29T23:15:16.373000 -CVE-2021-1662,0,0,c14ac49173dca8383093603e7287b8af3ed75b2422266f21df50d3f242dfe2b1,2023-12-29T23:15:16.570000 -CVE-2021-1663,0,0,16e40074f68d5c8e2949c27011a312d9fa0afd972c0267123b6ecf8dff8e19bd,2023-12-29T23:15:16.767000 -CVE-2021-1664,0,0,ef19ad3eb13cd97bd7bfebf1ec50094f5c951b366e9ec8272352704fe481ba01,2023-12-29T23:15:16.993000 -CVE-2021-1665,0,0,493bb9c838b888bd72a87fcbd7357514743a42cf3dde031050167f3106338daf,2023-12-29T23:15:17.187000 -CVE-2021-1666,0,0,539bfde8f022f249e4caf4e141c67c2e9c9f4f2a3383e8983b1235f861595bb8,2023-12-29T23:15:17.380000 -CVE-2021-1667,0,0,092811f77ea2df7dc8b6a04fab9a8e9486e458619f488cadef0a2cf597844826,2023-12-29T23:15:17.587000 -CVE-2021-1668,0,0,1fda640bdb6a4e4b74b03a472287bcb29376d175961a3b6d20903144f54327b7,2023-12-29T23:15:17.820000 -CVE-2021-1669,0,0,0c4bb62d8a97e7b8e48d9fa808c40f1f64f0da5ece6f985e85e453758e23089a,2023-12-29T23:15:18.013000 -CVE-2021-1670,0,0,f69665d813f86dceaa788b65249e480e54cf337d04b61ffbf4e0b93635ef75d6,2023-12-29T23:15:18.227000 -CVE-2021-1671,0,0,13709b65e070fe255ca3845b160524e10fa003fd62bb1dddb5f6421710420cb9,2023-12-29T23:15:18.430000 -CVE-2021-1672,0,0,43e6dff3b33d4e9bb1e5c5b315578f38829d339f1d8faad490d3c5cdd00f5e4f,2023-12-29T23:15:18.627000 -CVE-2021-1673,0,0,927ea4ada0dcd807ab7e7062680163c66a76aee6035eea84cf58a2c1edbff370,2023-12-29T23:15:18.827000 -CVE-2021-1674,0,0,61266841a4fe99f63e5dcfd409628ab8932e03a547dce9a58c42897fcb8c77bb,2023-12-29T23:15:19.040000 +CVE-2021-1641,0,1,a63084562b49aa2bb0815eaf9e843e1863c79a1491c4e5d22b89eacad39f48d3,2024-10-08T17:15:15.023000 +CVE-2021-1642,0,1,61a97e7405f9c304e6a50cbb95e66077ba17d9f60b0e1ee9ff1430aad604becf,2024-10-08T17:15:15.133000 +CVE-2021-1643,0,1,40e52edd9699ed1b1bc34f3578aed96912d9fef909ddc638e3616dd14e05faaf,2024-10-08T17:15:15.263000 +CVE-2021-1644,0,1,4df713b7b865647dda610d38409c95e80ba054b13ee4692ba8cf1cd86fadad09,2024-10-08T17:15:15.383000 +CVE-2021-1645,0,1,052d41b0a55462e238427c4cc6609dfdd31b56a67f68c19ad832cf44355615f9,2024-10-08T17:15:15.513000 +CVE-2021-1646,0,1,3cf7b5d6b8826a49ee2202aa1402a417596d7b7ceaa6279f8fc11764b1d947d8,2024-10-08T17:15:15.690000 +CVE-2021-1647,0,1,a81eb13416981db8262d8a0cba1d300e6444ae7e5ef0cb2aadbeccf7974cb8c4,2024-10-08T17:15:15.817000 +CVE-2021-1648,0,1,4f914affbfaddedc009d1a5b4d229067ce6ec7de32b93b763376232ef4d25858,2024-10-08T17:15:15.963000 +CVE-2021-1649,0,1,ce45606f9392f96387c34171fb5696eb425a1d0ee35dfba22c1942ae11f24618,2024-10-08T17:15:16.143000 +CVE-2021-1650,0,1,f3869adae3143cfdb0dbe78c146cab615a03333fc67344f39c5fd486d0a50d8a,2024-10-08T17:15:16.370000 +CVE-2021-1651,0,1,97d4dd1fc291931185eb7058bd2b44727496e4cebd0bcb46a8575dafc237393b,2024-10-08T17:15:16.607000 +CVE-2021-1652,0,1,0ea28f99eba6a179f23c3f9a58a8a6dff5872ad1a18a9c2f5d0b4d6b9aa8b834,2024-10-08T17:15:16.840000 +CVE-2021-1653,0,1,877f5acb178000c1975a53ebc6fb4547c25f6a80937783e38180ed720ecb99ca,2024-10-08T17:15:17.627000 +CVE-2021-1654,0,1,613a680e86364cdac1f7fde960ba8355a3bd33419e87005e10e17258e81d2346,2024-10-08T17:15:18 +CVE-2021-1655,0,1,8c294a234592f0e3c497c1219a92d53bbf08b2eb1eadff33327ca0550fae714b,2024-10-08T17:15:18.153000 +CVE-2021-1656,0,1,a7ca98e98056fa52ad715b4f24f156bc4c3d6334fa98bcdc07336e4157c4d283,2024-10-08T17:15:18.320000 +CVE-2021-1657,0,1,af0060e8e3ce14f26d5dc7d417f11f31a8a9c722cf07aa5c63cce0e46d1d434e,2024-10-08T17:15:18.483000 +CVE-2021-1658,0,1,9a673c69b6ad124d1b67adf6e4b92479b566f2cc82084c02fd07bded0c8962aa,2024-10-08T17:15:18.843000 +CVE-2021-1659,0,1,f6876179ecb69c607b4c601876974114643dd03456917d59423d8af19fde8515,2024-10-08T17:15:19.263000 +CVE-2021-1660,0,1,3d9c1949ed847c19865f8aa88ede2fe47c97d916f2a11eeba247209c3abac44c,2024-10-08T17:15:19.670000 +CVE-2021-1661,0,1,d48246bc2081061a726599d4305a353e1df2403d5fd8247f4fade064db335632,2024-10-08T17:15:20.003000 +CVE-2021-1662,0,1,93d57247a16364ce00e031a733913d4719517c1eea8afb127e6f1b3f504c3357,2024-10-08T17:15:20.190000 +CVE-2021-1663,0,1,d889b7db162b8c2616fa92934a1c1bb11599ec92a52c2d1ff89f418248f40996,2024-10-08T17:15:20.340000 +CVE-2021-1664,0,1,b2a2211930c255dda075fd73aa40ef2126e9642bb888de264300b00b127d4345,2024-10-08T17:15:20.443000 +CVE-2021-1665,0,1,1bb52d5fd18ce99cf523905339f143bb2c658132f0c1c2d7d022149685b39885,2024-10-08T17:15:20.607000 +CVE-2021-1666,0,1,cb0492b9d3fb5a5cd1acc91e73216cfe3929b14905e440bbcc340ee3714ada58,2024-10-08T17:15:20.770000 +CVE-2021-1667,0,1,0f5b83a624f90672f32e47deb61688e85e7adaaae92fb2d9144a24e2bf107d96,2024-10-08T17:15:20.927000 +CVE-2021-1668,0,1,8d6b94c94d6af9011f5e6c833b0600ac0c7fb6e228026ebb10b00b1a9cf2ee46,2024-10-08T17:15:21.097000 +CVE-2021-1669,0,1,0ca4d0efdce72cbff78ed4b7a2244887ba6bfb763dbd2d24ab8fe7f0da5025ab,2024-10-08T17:15:21.233000 +CVE-2021-1670,0,1,fe1196b5424c2bda172d54ab35824f9be2fef79b39137e12041bb93caea90237,2024-10-08T17:15:21.370000 +CVE-2021-1671,0,1,726529f890f6ab04a38d9361ce7bd5df313ee127468c2d542149bf62b59c10a9,2024-10-08T17:15:21.467000 +CVE-2021-1672,0,1,c6ecf0fd0ab32e639ac04611e27e73d174371d4df8c237f9d677891ebec579b5,2024-10-08T17:15:21.600000 +CVE-2021-1673,0,1,7d9fcd04f557cb3bf23a87b41a8f901c12e8520713ad80101227ab6c1961286a,2024-10-08T17:15:21.743000 +CVE-2021-1674,0,1,0aecb7496a8862fd6f90925151911688b0e54abfda4cdbd551035b1ff0ab4025,2024-10-08T17:15:21.893000 CVE-2021-1675,0,0,efed5ff8c26417f81e69317458352772ea309ec2aa0877094026e3fe96c25224,2024-07-29T17:57:23.260000 -CVE-2021-1676,0,0,7f43d73e0575aab596b63eb2291a013ddf38d9fe6655cf726a5e7cb2f1ff093a,2023-12-29T23:15:19.287000 -CVE-2021-1677,0,0,f7aa422c002aae62f3a72f9ad7b4adbe458ae92745e72960b8c2f17815b4c443,2023-12-29T17:15:51.207000 -CVE-2021-1678,0,0,71e729c4e9bb6eddf812e0f4bc3b71e11644a018f2917ee459b777d6dc015612,2023-12-29T23:15:19.507000 -CVE-2021-1679,0,0,dab1efc9b6325166beaf6bf7321aaa6e66befabe8cc40d1707a60d54fcde308f,2023-12-29T23:15:19.713000 -CVE-2021-1680,0,0,5663a09e858a25935f09e23a72618501d65f368232b7f2f4006f5d3dfe073781,2023-12-29T23:15:19.923000 -CVE-2021-1681,0,0,da05980e0ce7d543c6be637469affa4d3a6ae894900be0f63f9a9f1852eb2297,2023-12-29T23:15:20.120000 -CVE-2021-1682,0,0,f4c2fa13d366949d7cc0629b364fafbcd7bb42d3b5c54460012d5a892095cafe,2023-12-29T23:15:20.310000 -CVE-2021-1683,0,0,d28f78698d22b677f081bcda604c0340ce2b082e45cc007858d7543fcef9ec1e,2023-12-29T23:15:20.490000 -CVE-2021-1684,0,0,9b9303b933f924559984c81596bb2ad822d2075bba745d18164f7c1a1ee3d6fd,2023-12-29T23:15:20.680000 -CVE-2021-1685,0,0,5cdc7a32f2448cca5697483450c008402c37f1b704eb0d3ad46a9294778ccc96,2023-12-29T23:15:20.890000 -CVE-2021-1686,0,0,123118a0f7b4c2c73b21e49ab6718d20d27636a212bd97954f0c31f072c6f0a9,2023-12-29T23:15:21.093000 -CVE-2021-1687,0,0,6f0ddd61cc52db7c0ca8f0877a047b7804efcfe533aac1bf7754fdbe624e8ffe,2023-12-29T23:15:21.283000 -CVE-2021-1688,0,0,607f43bca5816efe9e051d6ceaa36032382d59a89fa425e9d359417c24b6fbcd,2023-12-29T23:15:21.473000 -CVE-2021-1689,0,0,92c7b7696f01559191cbb026b7aa3c12187fdee9aa1343e7a7dd3cc8daeeffd4,2023-12-29T23:15:21.660000 -CVE-2021-1690,0,0,aa52b43128e27da3086a6ad897a53bcbcf59e67a9a73b1931d38710561963033,2023-12-29T23:15:21.840000 -CVE-2021-1691,0,0,2524ed5b44c066028dead5148931bae7df6d1e0fb2cc4a7b4ea752a016a7258c,2023-12-29T23:15:22.037000 -CVE-2021-1692,0,0,3b9e35c4b1c1f8e88f69d0d6932ba0e6f857b504719ee22669afa53c5a9fc864,2023-12-29T23:15:22.237000 -CVE-2021-1693,0,0,3de7d40215bd57afe9839fde9049930f28420b06bda054503793307f1b7702c0,2023-12-29T23:15:22.417000 -CVE-2021-1694,0,0,ce675a037f27313158b44a845ed6656f20f5a743d665c54bec53f0d1dbc13364,2023-12-29T23:15:22.603000 -CVE-2021-1695,0,0,7f384a8517b4f4bd2a7b0d064b8b73d5fd5d3233c8c2d65cae92c7d2b1087a6e,2023-12-29T23:15:22.797000 -CVE-2021-1696,0,0,1871dc03a1ba1dd90d1b6769e2801e7e712d4d51da1fd7293362ebea654104f2,2023-12-29T23:15:22.997000 -CVE-2021-1697,0,0,ab8371d717779463ea28e13029c19082f3e48a90824cfca9562aa21bae8ebd80,2023-12-29T23:15:23.183000 +CVE-2021-1676,0,1,b5361e86f788f2880ae517a8bb4e14a52d878c8779c16f8487660738ecb6eb0c,2024-10-08T17:15:22.047000 +CVE-2021-1677,0,1,7133823fa50acd71403c9ca1a3e08faa3910155f2fd04a628c7ebf4836806fd9,2024-10-08T17:15:22.190000 +CVE-2021-1678,0,1,c8834c9fc4bdde14668d1af00c6e85b5869cf33f8c2e3a8557b14e2dc684f355,2024-10-08T17:15:22.300000 +CVE-2021-1679,0,1,53c4e4f774d4179025d5179c4cbee43808a8c79ec7a8d16d613f2ab123c241c5,2024-10-08T17:15:22.457000 +CVE-2021-1680,0,1,b072f12e16998491a1af8df009a8ab25498f30071f3369fc79cfc83db6d6c992,2024-10-08T17:15:22.680000 +CVE-2021-1681,0,1,c8f46baa17b542f5b3370151b2a9fd7aa12efc39dc2e8763e18797a5a25edebe,2024-10-08T17:15:22.810000 +CVE-2021-1682,0,1,a9fb8820337cabe19ae00bb6c4445cdfb48c6dc9824129974f48fd266b9930e3,2024-10-08T17:15:22.913000 +CVE-2021-1683,0,1,3fb965aa7b875f10b6cc701c101862c6a7d5f2f06ab942400203136db444e83d,2024-10-08T17:15:23.033000 +CVE-2021-1684,0,1,fe111b15df99ead8b85a7703c6ee24c85459fa5ef216fc1af46a8dd659d424d1,2024-10-08T17:15:23.157000 +CVE-2021-1685,0,1,7f5d110912d6a1442cf1bb7938ddf9026643a4f006e9c4d910607394771e31d1,2024-10-08T17:15:23.273000 +CVE-2021-1686,0,1,172a7e67a32c986adf0a26903432451340f909e8b15516bf83dc2150805425a2,2024-10-08T17:15:23.387000 +CVE-2021-1687,0,1,abfe53b72fa08177ed4b93d7af579f5c1720629d489cd4c0e689ad88f2570600,2024-10-08T17:15:23.480000 +CVE-2021-1688,0,1,2fab584ba65b2ea675124d2eef9200c73f325907293ecdc27365cf2fbe259c87,2024-10-08T17:15:23.573000 +CVE-2021-1689,0,1,5d31236aea34c62bedf1adb9d29b5b5ba1805588d8372c7ddaa0ae45278936e8,2024-10-08T17:15:23.713000 +CVE-2021-1690,0,1,ecc03460e9baeed7ac178fadeecd2eca168be108663104206c8f1b3497f8ab6a,2024-10-08T17:15:23.830000 +CVE-2021-1691,0,1,92a887883a089cf84f30f5cc5dbd28171515ce031117c713eac5c2946f614f48,2024-10-08T17:15:23.933000 +CVE-2021-1692,0,1,248878f83e46157db9f2a53cbe25c30916dce9cc63f2b97ff913ff6e066d6c6d,2024-10-08T17:15:24.030000 +CVE-2021-1693,0,1,ca6668596b8beb4434f6170f2a52664aa56e0e94e8a8cde1f757753285ee6658,2024-10-08T17:15:24.147000 +CVE-2021-1694,0,1,6d6ca0cda0692239d1ad7a549bd939dae8d5eecc95432b1c0dcfc52a7ca7b7f3,2024-10-08T17:15:24.297000 +CVE-2021-1695,0,1,348674056ef5d77ff1bbaca72b6368a469ff792a4ef09f556d88296e8e8fccf0,2024-10-08T17:15:24.447000 +CVE-2021-1696,0,1,96ab41fb3dd3ceb68f6545eced031714aaf810ee1fea6f13ea23cc62c967a4fb,2024-10-08T17:15:24.593000 +CVE-2021-1697,0,1,5972b10f70ff3bc7b747bbe16249e5e57678b2e6208affdbc52ed1cad0e83fea,2024-10-08T17:15:24.743000 CVE-2021-1698,0,0,49b3e20620b95a373a32025477d9d787ffc5cea9d8f6e14be575c8660fa87649,2023-12-29T23:15:23.367000 -CVE-2021-1699,0,0,bc6b753ef41a8e8cc03f05a07885dfac23e4f5d79b63ecfa3b38f4eb90d6e85c,2023-12-29T23:15:23.557000 -CVE-2021-1700,0,0,82c971be6527d5523475508c14823e8962ca939f5b19bdfd26629816d24a67c8,2023-12-29T23:15:23.733000 -CVE-2021-1701,0,0,bf6ca151f44334971f3407cf40325af0f0cbbefa8b94f8c1b46abd4aa93482ea,2023-12-29T23:15:23.930000 -CVE-2021-1702,0,0,677748075c4f0c7cfa030f5f32f4c14abca498462285d256456bec85235e4ccc,2023-12-29T23:15:24.130000 -CVE-2021-1703,0,0,53514b5a0a29ba7ef1a75711f0db485276d514ec82d6d93a6a85b5b7483c225d,2023-12-29T23:15:24.373000 -CVE-2021-1704,0,0,4b113add77dee0933288990fd6a3c98ec28e114768ef3a5a161344e4dd3546d7,2023-12-29T23:15:24.577000 -CVE-2021-1705,0,0,6bdaf853c45295e6ab90c6313564da9852ad6facdc6b406ebe082f29923c0343,2023-12-29T17:15:51.413000 -CVE-2021-1706,0,0,ab5cc466c0fc42c6e5f67143f1c3f7297fadb6b3c6babd4894c8d1cf091c0c9d,2023-12-29T23:15:24.843000 -CVE-2021-1707,0,0,35fbb9f1fa9d25e9c99a7a63e2697f96e8ec6ab2119b88b3b1956ff438006d2c,2023-12-29T17:15:51.617000 -CVE-2021-1708,0,0,1a888709f3bd08751063c9dbe444a43f46cf0c85873f17d16ca09c4d97a1cbc8,2023-12-29T23:15:25.043000 -CVE-2021-1709,0,0,c95c57bdb1a44a1cdafeb7f55b2aaa129a6a56f15093d802b2a1d1ff7f52fcfd,2023-12-29T23:15:25.240000 -CVE-2021-1710,0,0,92600ee1e740e73c3004cd9ce684336fd15ef0f134c7c9724cc324998faaf0dc,2023-12-29T23:15:25.417000 -CVE-2021-1711,0,0,5ff12138b899963a1c06de98ae6efd83a57e5c9f44eac17d5b33efc89ba3f45d,2023-12-29T17:15:51.820000 -CVE-2021-1712,0,0,0e01cd592b30de8cf66161df9b406a309219d2a7055677e2bdb9289bc9ff80e8,2023-12-29T17:15:52.010000 -CVE-2021-1713,0,0,ac92c83beacdd408dab5fd2d008a5530e5edc25b677d98ccfe9baeb9a8071be4,2023-12-29T17:15:52.213000 -CVE-2021-1714,0,0,a93eae9ee4d29209a6768873f4554ab5125e0ffe34da9722e3a96bf2d99b5725,2023-12-29T17:15:52.413000 -CVE-2021-1715,0,0,f093dd7e37902f78ed9012e3cd6da0e8277dff486537a07da81d5d82ce5df3e9,2023-12-29T17:15:52.610000 -CVE-2021-1716,0,0,ac3ab19e1acfd7099a000746a82b569adefa2b04e75882c0d7f222b821de7338,2023-12-29T17:15:52.820000 -CVE-2021-1717,0,0,42a602dbe9bb884f9e61fe2f6a82f8430f8a43896c00371be371d794b218e67e,2023-12-29T17:15:53.013000 -CVE-2021-1718,0,0,2f4f7c1027b14ce999b41760c06f61dc091e6135621b6c3418aa3ed2754c91e3,2023-12-29T17:15:53.217000 -CVE-2021-1719,0,0,64858d2a237d67d88cc15bfa632eeaad7c651ad3268526c661f9f9119a860a2f,2023-12-29T17:15:53.407000 +CVE-2021-1699,0,1,44c0df2375b46813eb44f8983de3f7b96d67f7e765735dd9aa860128ae4a64a0,2024-10-08T17:15:24.870000 +CVE-2021-1700,0,1,9f70448db1921e983244dec30b67e605892002c1e6eba358ca001190695a9079,2024-10-08T17:15:25.010000 +CVE-2021-1701,0,1,61f29a23898ff0f73e95846f6f931c1332a50b33356bebc41ec52e5ca04c0808,2024-10-08T17:15:25.150000 +CVE-2021-1702,0,1,ba326672a66ad30909ac5983ad3ebbf5c0263248d8fec745c22fbf442df51364,2024-10-08T17:15:25.300000 +CVE-2021-1703,0,1,f99c48d7e430d4f81111ec66a70851e6336c9a3315f04b90ce97f7cf4ffeb153,2024-10-08T17:15:25.447000 +CVE-2021-1704,0,1,0e163ad17105fc1ee464fa008366b317e4f04d2c3f6d9e9bf5f06e3a8d750c2f,2024-10-08T17:15:25.543000 +CVE-2021-1705,0,1,bccc3ed661f043c9dfe1a531cb933337e439fbf6608921ca6e081d45718b2af3,2024-10-08T17:15:25.693000 +CVE-2021-1706,0,1,b619b3bee9d62fe4e4036ce87319067722d9ab7a5a7d0b7e9cd0ca3d381fb839,2024-10-08T17:15:25.820000 +CVE-2021-1707,0,1,fdf93ee1138f2f80b7c8d7c6a1fdd190af995bc82c4277f360ec82d250fbb638,2024-10-08T17:15:25.980000 +CVE-2021-1708,0,1,126b6582b87c203ad9f7b3c1a7a6359b7b5c3566153f3871ee7bce8c1afb8db0,2024-10-08T17:15:26.093000 +CVE-2021-1709,0,1,0ac447bea0b9bbd92033ab235e8474c6f9dedafdff6ced7dc84316f54e8749bc,2024-10-08T17:15:26.267000 +CVE-2021-1710,0,1,0a7cabbc16764bf5d0b6f61324ac366d289881919269b54bb6862bb0b61967ed,2024-10-08T17:15:26.413000 +CVE-2021-1711,0,1,fe6595582782ddae454f14ae1d5424e53a8fca09009fe9f3c29fb235b6afbc9d,2024-10-08T17:15:26.543000 +CVE-2021-1712,0,1,d8cfc13d25e35aed7e3021d27e201ce444efb140533df5342d5ec673842a18fb,2024-10-08T17:15:26.663000 +CVE-2021-1713,0,1,1a393ab356ad48200778eeada74b793de2e797a8c6747e3cd1bac010ddf87668,2024-10-08T17:15:26.760000 +CVE-2021-1714,0,1,9c3bc5351c21a93887b079ff425ff7ac9fd6d71f43f7d795ca4a3006bdc96b3e,2024-10-08T17:15:26.880000 +CVE-2021-1715,0,1,0fbd186a0730cf085f03f1d5f965f871b0d94c9f0ae36e68a866940d5155a0af,2024-10-08T17:15:27.017000 +CVE-2021-1716,0,1,c07fe55ddf94c801aee19f0ae3bda9da34122eedc2a588b641ad453d3d15ae4a,2024-10-08T17:15:27.153000 +CVE-2021-1717,0,1,c3d11b2728b51a5e23ffcf6e3425541e4fbd6bdeecf4bc84d30bd4f82ac7af63,2024-10-08T17:15:27.277000 +CVE-2021-1718,0,1,64ea0c8b9e14b7da27d575718324c893cc0c10ae27481e8e89ca4bd194d21ac0,2024-10-08T17:15:27.387000 +CVE-2021-1719,0,1,a3ef42ce5efd883638da8e8c6b278396a9162495c27987652d1036765436f8c4,2024-10-08T17:15:27.503000 CVE-2021-1721,0,0,64cf99e6ed0ea16397ad896b3520c72d7ec9e64385c8b5414fee29280aaf6e9e,2023-12-29T17:15:53.590000 CVE-2021-1722,0,0,400341d7f8810e9b09ce5421b6fa4c0ea049ada0ebd60e31dc5a123db7ce2434,2023-12-29T23:15:25.703000 -CVE-2021-1723,0,0,5e2da9d80a3f0b2236c33c93c48f9e09e91996d94c56dbd144e2ec150dbb03f4,2023-12-29T17:15:53.777000 +CVE-2021-1723,0,1,768025699e13293bdfc6729c3c69d46ee70b61c1384fa4cb1683cebf87421cca,2024-10-08T17:15:27.613000 CVE-2021-1724,0,0,3b5397cb5fd965a0ffaafd988c6d5f093918b7a77e2554b9512d904b825a92df,2023-12-29T17:15:53.973000 -CVE-2021-1725,0,0,81df56b0892da2f18043677868b044119d6addada112ef9c89def14052c9dfea,2023-12-29T17:15:54.167000 +CVE-2021-1725,0,1,e39deab0397fcf15769314036178a88724d6e875a4383641e066079131b4d8fa,2024-10-08T17:15:27.730000 CVE-2021-1726,0,0,866dab0f6dd5203b515d738f31200c3a7e6d73eb07dd8ad3c9e5e6d85be577fe,2023-12-29T17:15:54.357000 CVE-2021-1727,0,0,84e86e75ee0cc8cd7485124d53ef6ea0b61607207a9596318cb24c230a5348eb,2023-12-29T23:15:25.967000 CVE-2021-1728,0,0,724ef1946af97ccb6b477969520582b5e76e2551cdb218cd4307bcf8e3c5caa7,2023-12-29T17:15:54.557000 @@ -184824,14 +184824,14 @@ CVE-2021-43937,0,0,3cdd8d7fb23deca8d9e3da609d823e584e5bc89142bde54aa2427a961a8fe CVE-2021-43938,0,0,a789d2adbb9a60839b258553546d667bf8477c3434a2cffaf7d3ca125b6b9a54,2022-07-25T10:00:59.173000 CVE-2021-43939,0,0,a803d96faa24c93b21e749ee49154504b977e684be44b7c2261ab1d011e0c019,2022-08-09T00:20:56.490000 CVE-2021-4394,0,0,980b037355250aabda1c5eb615bbd84d8140cddcc6841f4564fd2a2552bdcea9,2023-11-07T03:40:51.207000 -CVE-2021-43940,0,0,23ff076ac4e30fad88c3ad57a29a62138bceac3bfafb20365eb2c7959e686aab,2022-07-27T14:41:18.273000 +CVE-2021-43940,0,1,69aad0306a8c8a24b00616e02f02d5bbe7ae598e6cda2a5ed869f3da5e54a401,2024-10-08T17:35:01.463000 CVE-2021-43941,0,0,97592fa3283b711dcf4cffec938527a13483a39bf6df13c0cd01cf087dcda2b9,2022-06-10T14:49:42.547000 CVE-2021-43942,0,0,e3a4ed2fcd6b9b99b474ed6fa2b78813e2c679f703fe9b1309e19a18de3f60cd,2022-03-28T13:34:02.910000 CVE-2021-43943,0,0,467e76f9e6b395a3c1e73a4638ce536f02b59a6cf0b1cfe30f34b17590c7c81c,2022-03-07T14:28:24.153000 CVE-2021-43944,0,0,9de7d1e0d407cd64a44e65d7887d3c404efa8a613b44275f93107fcd73740502,2024-10-07T19:36:12.070000 CVE-2021-43945,0,0,0866d071bf2f9f2ec6c6326ea2483361c8576488b7c370ca8971ed0ad9cb08c8,2022-03-08T17:17:57.177000 CVE-2021-43946,0,0,1a14949279061e32d77c8f3348ef3c327d470dc5f717dc44cb0d5f0725a9a7a1,2023-02-24T14:11:14.347000 -CVE-2021-43947,0,1,1a7d25337441460af30824c8cc6b6240c24c4e4d88e9575ede1d9289ef141904,2024-10-08T15:35:02.707000 +CVE-2021-43947,0,0,1a7d25337441460af30824c8cc6b6240c24c4e4d88e9575ede1d9289ef141904,2024-10-08T15:35:02.707000 CVE-2021-43948,0,0,98ee5a735144f7eef7611b5af741a8e572ab25bc0215586b6f9210edda0d78f1,2022-07-12T17:42:04.277000 CVE-2021-43949,0,0,97f6bd9cfb6879891ab8052281fce2b452531563b44f1ae6fae0e2d5ed76975f,2022-03-04T15:30:36.943000 CVE-2021-4395,0,0,5d895816c1211e6062d02d2b1808806460c24902a3a640e88f71900a1317b51c,2023-11-07T03:40:51.350000 @@ -212525,12 +212525,12 @@ CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075 CVE-2022-4901,0,0,b216b364f33ab0ef7a0c7606c08559e2c099c064cab5e2ac5756fa24252b7a04,2023-03-09T01:06:23.703000 CVE-2022-4902,0,0,287e358bd6e692608595d8f35e480fa1fc0a17dda86b7a57dcb446074ab1fd22,2024-05-17T02:17:02.280000 CVE-2022-4903,0,0,cf9430f75554b10fc3063c2d4e895e2575b24650a7af1dc91ee51937fe80926d,2024-05-17T02:17:02.397000 -CVE-2022-49037,0,0,c92e2003007494a884d0853b28c3ea1cf45b59686f12b468248885d62af01a45,2024-09-26T13:32:02.803000 -CVE-2022-49038,0,0,8640716a6fa5cdfa180ee31f65ae43c4086816e85778bdd971dfabbb043d54cd,2024-09-26T13:32:02.803000 -CVE-2022-49039,0,0,b63056356929ea2e8886c9d04df3edc708730401e9dd7263b335886ee886015a,2024-09-26T13:32:02.803000 +CVE-2022-49037,0,1,d1881b67cff6ffd1cd4a44c62a3eeff49dad87129228607de02747a08dc9d03b,2024-10-08T16:08:55.390000 +CVE-2022-49038,0,1,26bf80583e02462755629eb75d32d3c2894b1263d5b99e87b4bfae13ac56c00a,2024-10-08T16:08:35.743000 +CVE-2022-49039,0,1,3fa8a10f3d81d2265a7106534dc05a400de9995334e02e08b86692ec188f1511,2024-10-08T16:08:08.507000 CVE-2022-4904,0,0,7fd91bcfdda485d2d1b99e23faafa981f8e23511627b52ddcbefb9f4810ebc15,2024-01-05T10:15:10.403000 -CVE-2022-49040,0,0,dc70df585541374883cd603fb7f8962afe2c74c015c228d99365d73d7596efbe,2024-09-26T13:32:02.803000 -CVE-2022-49041,0,0,cd08955ec1ef7807a92d976e3bf6d14c816370963c58a1a0c86d5e78d7ee8629,2024-09-26T13:32:02.803000 +CVE-2022-49040,0,1,55930e6f8fff55511667f3616c470a88780e626064d30c3652158819eb942420,2024-10-08T16:07:11.210000 +CVE-2022-49041,0,1,3bbc7c520430a11ddbfcd24d9401b083e14f1914774efe84ec7112d1db90f67d,2024-10-08T16:06:51.067000 CVE-2022-4905,0,0,5ed0102a2ff79a38a818598d42a854f2653bfd1cbf7bd4d44c6202eec6703dca,2024-05-17T02:17:02.537000 CVE-2022-4906,0,0,a1c66471618b60e194f3fe4d779a45e5ee2c0bea6e8f8da3c7c0eae7fd768250,2023-08-10T03:15:50.953000 CVE-2022-4907,0,0,fccbd9f1017b7c4db6bafd15fa3ee2977587a49756ba66d0760690b5c66f8c42,2023-12-28T15:39:50.990000 @@ -219360,15 +219360,15 @@ CVE-2023-25831,0,0,52a623c5eb3a458d6a7748d0c209d42277d7c09b2f1015648258658a94541 CVE-2023-25832,0,0,7af14728f5d2351978f2e2b7aca2fc3e9f264ec1cbb794e3dcb363a5468176f1,2024-02-01T14:55:46.047000 CVE-2023-25833,0,0,b6b08229f1cc61714c52d418f026229b06b178b2ec36c340a9adcb8e75f9513e,2024-02-01T15:46:30.307000 CVE-2023-25834,0,0,68fbaaf357b31adb0bd7073341e32d889d8bc8e0e2236a415845df29861bdf6a,2023-05-22T22:15:10.180000 -CVE-2023-25835,0,0,1b567967fc178b356d4e794228d5eafa2e31ec94a46475b5ca6096b6f06977d5,2024-01-29T22:15:08.103000 -CVE-2023-25836,0,0,0d08d8934992cfcb12f87cd147dc8e6b21a6d3075806890aaf7776ca18048a55,2023-08-07T19:33:38.560000 -CVE-2023-25837,0,0,b0998a3e7847ca17533d17a8596ecdb3bdf554c2ce8f03197808abc908302fc8,2024-01-29T22:15:08.220000 +CVE-2023-25835,0,1,9108920c52cdce71403d8210e2042ae0a1cb950c445ea629b133813059e97ac3,2024-10-08T17:15:27.877000 +CVE-2023-25836,0,1,60dbb509dba17997ad1d0bf8b7045037951b915dd0eccd1772696e6fecb6b465,2024-10-08T17:15:28.033000 +CVE-2023-25837,0,1,066b77ed374d0387297da37e634004dd37dd87b6fedb906095d2ef372bab4ace,2024-10-08T17:15:28.127000 CVE-2023-25838,0,0,b9b9d3428e41fcf0f4917a5c171fd4587ae0887735a00c518aef3b530235f503,2024-05-21T13:20:10.257000 CVE-2023-25839,0,0,b9f37d781272a8923e5bfa8554bebb752b4df76bccab63cebeba16110596b055,2023-07-27T19:48:48.527000 CVE-2023-2584,0,0,59cc5bf2a9ebb6c0b9ecfacb707f9371d5ce7c424f36e81d22edbd83cd928cd7,2023-11-07T04:12:54.897000 -CVE-2023-25840,0,0,70668a4d2d570336d2fff39f839abe918afb5176ede6ec658c7af645337a6b3e,2024-02-23T19:38:32.780000 -CVE-2023-25841,0,0,8b5196a9de7588499948d050e2dbeedd3f69d772afb3fb5dae9d704850b95dbe,2024-02-23T18:13:19.333000 -CVE-2023-25848,0,0,8291257c77e660c91650c44ff677aa2352b3387f9f4bf7b25b5f40509fff1d3b,2023-08-31T14:29:48.863000 +CVE-2023-25840,0,1,ee63261d825cdb4af6dc5b51efd4cb2fe426f96fc935eb36da969d202229ea16,2024-10-08T17:15:28.230000 +CVE-2023-25841,0,1,e9dcbcec2731407705b42b8cb2ed5b025ca32eb0cf6264577eb601ae32661bca,2024-10-08T17:15:28.347000 +CVE-2023-25848,0,1,26eceae43e97899a0192677ede9235f4b8b8437338ad0a6c75ce51d9fafd2377,2024-10-08T17:15:28.467000 CVE-2023-2585,0,0,af8440133936b349fb1f9874d83288750e3416af5a2f5f55cf86d65527eb1f51,2024-01-02T18:28:16.777000 CVE-2023-25859,0,0,b9efe60b27fea6925777548d33e292c503dee7b0e7575608d278f94d7b7ee8dc,2023-03-24T02:30:57.647000 CVE-2023-2586,0,0,f7704f4b89176fd86680da198e3edc1e12cdf8f922d3f4bf12d731623a7fee45,2023-05-31T20:19:02.373000 @@ -222364,7 +222364,7 @@ CVE-2023-29442,0,0,00068614092f40592fc1ffe81647d33dd8c73ef5de8b6e7c89f207a8c97e5 CVE-2023-29443,0,0,4bc360b0b056395eefbaf1351cbcc64020a661530417e288173c12827c95ec2d,2023-06-26T17:15:13.807000 CVE-2023-29444,0,0,b71dd0467c4de3c3b02a0956a5421eafd0b4c8351a6fb44afd86f5f0c60e6660,2024-01-19T17:36:09.637000 CVE-2023-29445,0,0,a28723b4eebc26f25ba2ca80280b4e40824755e37e458ca3af5a675a25781f44,2024-01-19T19:37:50.090000 -CVE-2023-29446,0,0,f3beb6709b9a6d60bf550bdb4e9b8b58906181e2aa245681c4cf9b4769e07fbe,2024-01-19T19:50:28.443000 +CVE-2023-29446,0,1,0851358b825d282c7da619fcf1fb239f482b6c150c41079923b1008f2847b639,2024-10-08T16:15:04.703000 CVE-2023-29447,0,0,eb8b6f376822d45c4d1244a3f1c372e3f6489d30e53a39142b0fae4d88212a16,2024-01-18T19:53:18.957000 CVE-2023-29449,0,0,fdb3f3244f05ed33355d55653df07f8a22d02f132ee22e06db3ee82a5ed1432c,2023-07-25T14:54:44.917000 CVE-2023-2945,0,0,532843b7948c0d02f7803ab95461fa4c95f3d6c869c37a6c9eecf0febc426422,2023-06-01T03:46:34.900000 @@ -224672,7 +224672,7 @@ CVE-2023-32622,0,0,71747ab46c33456aed476e4425613d72e88f3406e6c48f880eedf8e6b8a2c CVE-2023-32623,0,0,30ff1279195a6636057104c5dab6bf90f9094c454e8c98830e8ff9889b1dbcea,2023-07-21T19:19:23.793000 CVE-2023-32624,0,0,b7f16c801dcd157fb7ede4a52f1e7501cafb88f6b0e5e589e72ddfda3a58cce4,2023-08-07T19:32:10.417000 CVE-2023-32625,0,0,8b56ef61f638262055fb85e3f151f40250cb418f506a6b1e66b6d000f1dce0e0,2023-08-07T19:33:29.343000 -CVE-2023-32626,0,1,aae0b3d3db8a6f8f8124a6face73b7b994e56be03e80e4a1c3a301e5a48e9b7e,2024-10-08T15:35:03.850000 +CVE-2023-32626,0,0,aae0b3d3db8a6f8f8124a6face73b7b994e56be03e80e4a1c3a301e5a48e9b7e,2024-10-08T15:35:03.850000 CVE-2023-32627,0,0,8825e9c17f15ca79ee491a29095467cfcfb0d2f269da133cb725409597563a61,2023-11-07T04:14:38.113000 CVE-2023-32628,0,0,34390445b330a341408fd3970e484b7a57a2397009f222a8d008d32e5d2d337f,2023-06-12T16:53:19.953000 CVE-2023-32629,0,0,93677c1ca189924cb0aae873bfbf6afd35bc73047cc3230089c6ba99cde67511,2023-09-11T19:15:42.233000 @@ -227164,7 +227164,7 @@ CVE-2023-36097,0,0,d69938fc728da34d8768a0c5fff74b9f5fdf3c3a2579ad3f611d775612b75 CVE-2023-3610,0,0,64c0e8d2425050cc67fb6bf5e0c9fc93a2196e61379b8959e14e5951d7558153,2023-12-29T16:05:32.897000 CVE-2023-36100,0,0,01dbce6a25d542551aa3012a83e55a5651b09bcdfe5ee1fa0fa701c6386b6ca8,2024-10-01T17:35:23.277000 CVE-2023-36103,0,0,e23d9a2dd86cb9355cdbf5242465c87caaa1af25f65237f20a1638f8c876293e,2024-09-24T18:10:16.207000 -CVE-2023-36106,0,1,d7e5399c01f5b61313db82f293207021b73fa550d30206ec057d5ebb9587589f,2024-10-08T15:35:04.673000 +CVE-2023-36106,0,0,d7e5399c01f5b61313db82f293207021b73fa550d30206ec057d5ebb9587589f,2024-10-08T15:35:04.673000 CVE-2023-36109,0,0,2905c47f1f22b864042595a1a3690775764e8e0cf79a8f06d31d838015bda409,2023-09-22T02:12:15.177000 CVE-2023-3611,0,0,3276ea952612bf8ce9f28e73d33d9668ae065819920d37d3d7dd3deee2d0f859,2024-08-22T20:25:34.373000 CVE-2023-36118,0,0,bff10a029ac853a7f4d10cc995c3c5052dcacfa8824027454be423de12359dc1,2023-11-07T04:16:09.273000 @@ -227587,7 +227587,7 @@ CVE-2023-36670,0,0,cdeffc453c289674efaf8d400d99bacb5d90dafa830d78a7b4110d79be2ee CVE-2023-36671,0,0,7ba2cbd36cf494003f31e9f8061c34f283054b4a843133a6b3a5558202190f37,2023-10-31T09:15:08.210000 CVE-2023-36672,0,0,0b437c7f228042e22c4f8d314d930a5f7b09ede3e5cf22aa693cfc66240e4631,2023-10-31T09:15:08.277000 CVE-2023-36673,0,0,a12f7249f363726adad8b584d5dd5a49c39eb47b074fc8406f71b668e7664739,2023-10-31T09:15:08.337000 -CVE-2023-36674,0,1,b8de70a8102b854de0fa5d92320e6318094f6978bf5be9e8435328a2af93e692,2024-10-08T15:35:09.850000 +CVE-2023-36674,0,0,b8de70a8102b854de0fa5d92320e6318094f6978bf5be9e8435328a2af93e692,2024-10-08T15:35:09.850000 CVE-2023-36675,0,0,5c1bed2b433b860e794759988c06c2540aa0155cb90f88dce1df7acae30c9a95,2023-11-07T04:16:42.083000 CVE-2023-36676,0,0,4a9258f5e078288b069b3a1e582c048d74b4404fdc2a2003de0065aa04460858,2024-09-20T23:11:18.563000 CVE-2023-36677,0,0,447e129853788da008a3219fe85e6391cc9b944061e22512652e363c1bbae1f4,2024-09-05T20:35:08.677000 @@ -228728,7 +228728,7 @@ CVE-2023-38128,0,0,26a0debb8cabffee8b8367649a58d878163ee71b554db80bfd63f3d4df285 CVE-2023-3813,0,0,04a01b3796549c657ab9aeb084e803f298cc5d0becbfee58f6abe65042e7d6a0,2023-11-07T04:19:44.197000 CVE-2023-38130,0,0,a4d937a40ab1906cc70a377b2965fb97adc8d21f6a7f14d60e6427d2863f3fc3,2023-11-22T00:06:35.717000 CVE-2023-38131,0,0,f92c1cb176fd142005f4dc8e0e46e473f799f5268800d2a119ca21923a92c65b,2023-11-17T04:12:48.530000 -CVE-2023-38132,0,1,2e29d7e4390895d75db8d14175ecf954c2b73938ed2c37d00fe12fa95aed044a,2024-10-08T15:35:11.083000 +CVE-2023-38132,0,0,2e29d7e4390895d75db8d14175ecf954c2b73938ed2c37d00fe12fa95aed044a,2024-10-08T15:35:11.083000 CVE-2023-38133,0,0,af06ef913649a6ee499e8e12b5e3cc4498907d0af745e1aa77e34a778995abf1,2024-01-05T14:15:47.027000 CVE-2023-38135,0,0,7749fcad167ae61d0a929abd3f0312ffd64f30caed31dcd80ffa2deee6ad5f51,2024-02-14T15:01:46.050000 CVE-2023-38136,0,0,554f39e979a0861d4175b39a9164da3690299a760aaac82981d94d1c4d3b2c13,2023-08-03T16:56:20.357000 @@ -229156,7 +229156,7 @@ CVE-2023-38572,0,0,095f4a1650c1258d21d2bd89eff16cb949e92bd0db6699139bbfd64d38f58 CVE-2023-38573,0,0,9284613890955f35266f5a038af553d1c6518006d618e683173a669d5c7929c0,2023-12-01T20:52:57.627000 CVE-2023-38574,0,0,be1718a413780ef4a67153dccf5e742c8c6e2db9a93bba86e60b588a4cf3b3e9,2023-09-11T12:50:00.413000 CVE-2023-38575,0,0,a2a62c14b18d5d6e72e55dd2228218039fe03286a40fd85bc2093505775241ea,2024-05-04T16:15:15.077000 -CVE-2023-38576,0,1,b070d47cf8cdd2ea78bf642fd8fce449746b72146b572582bf95dde16d8aa325,2024-10-08T15:35:12.007000 +CVE-2023-38576,0,0,b070d47cf8cdd2ea78bf642fd8fce449746b72146b572582bf95dde16d8aa325,2024-10-08T15:35:12.007000 CVE-2023-38579,0,0,35e0e7fa02a2c19a6dffba238690e8a535caae80c453960e8036a3c2a6e312aa,2024-02-13T21:56:17.013000 CVE-2023-3858,0,0,84a2a2ec597d7f802c1e46ca1be4abb1e9f4c7b542aaeb019150940619497334,2024-05-17T02:27:54.297000 CVE-2023-38580,0,0,03c40dd50e0cda15ee5026886f4afc199596d5811ca57ce883c4d5b436bfdef4,2023-08-03T13:56:23.460000 @@ -229842,7 +229842,7 @@ CVE-2023-39440,0,0,6a2f84855caa69d956f5aa7ff3d81683e8055e06632176c19aacf42c40cf5 CVE-2023-39441,0,0,1524af4c21eae8180b90656f56e4a47c0f827b489d48bce7311f67eaeb7fc6cb,2023-08-29T15:48:57.633000 CVE-2023-39443,0,0,1a26c9a28c096baa05119ad2798651f43ab2b06c68ce772bef1bd6a634d5fb42,2024-04-09T21:15:15.770000 CVE-2023-39444,0,0,8b67b0a3f75b53fd0b4a8e0d327154f6629b9f5e5973540fb30aa61cc1ab9e84,2024-04-09T21:15:15.873000 -CVE-2023-39445,0,1,b59f8a538f9f341dffcf0fd44d7bdd5f3b126cc29fcfbea219260f08a757db96,2024-10-08T15:35:13.413000 +CVE-2023-39445,0,0,b59f8a538f9f341dffcf0fd44d7bdd5f3b126cc29fcfbea219260f08a757db96,2024-10-08T15:35:13.413000 CVE-2023-39446,0,0,6bec4c33fea1962dade9865606bfaa213fd3a72b8642609b288b9f925eadb0e6,2024-08-02T18:16:11.603000 CVE-2023-39447,0,0,a853582eae41440f4b71b9985cb4a254460904904aa413a4ec0a7a0872d32890,2023-10-16T18:40:24.253000 CVE-2023-39448,0,0,b0ddc370dc153673b546283e7efcf7187e96d3fe1f8753890834d7c84f026b0e,2023-09-08T16:48:17.617000 @@ -230785,7 +230785,7 @@ CVE-2023-40627,0,0,a8f4ecf528ac7602e6ec83be1a3322bfd2929fcb336490d206ea3415b1b34 CVE-2023-40628,0,0,b7c0784ac8cfc520a57db6d4f425b6ce0a963f06f0abc3d386c6241225c9cfbc,2023-12-18T20:00:24.987000 CVE-2023-40629,0,0,acc5397a1aed74aa7cf18af9e37e6cd0a5ef3b76ffa3dcbfbb7b588465cbd93f,2023-12-19T17:18:40.347000 CVE-2023-4063,0,0,e240d8049faf6302c5618010fd13e58245c8d0d673aeb1bcf039293265ece8ac,2024-03-22T19:02:10.300000 -CVE-2023-40630,0,1,a92de187dc59a9b6704a03d68819912986d9003e613622a363d5b1416b0d2bc4,2024-10-08T15:35:15.080000 +CVE-2023-40630,0,0,a92de187dc59a9b6704a03d68819912986d9003e613622a363d5b1416b0d2bc4,2024-10-08T15:35:15.080000 CVE-2023-40631,0,0,3d031b89eb8571b9eeb31f193e36a2093f33e2855254a1a01f0ccddf675db18c,2023-10-11T17:30:22.077000 CVE-2023-40632,0,0,b0474c162759aa7d418b13f64497b8a457dda1b79fd59c9465ba9982a1ce9d41,2023-10-11T17:30:35.847000 CVE-2023-40633,0,0,31c3dacbaa20865297f1ac6a0e4fe3efafcb5ef217123e42578d149a31927c3c,2023-10-11T17:30:45.107000 @@ -230988,7 +230988,7 @@ CVE-2023-40915,0,0,924135b83c37dfb32e8e4a8213481ae4ff212f967d627d3fbc626bff3fc54 CVE-2023-40918,0,0,fc090dba4a7f04d782d401de76c13cc5fa72b866aa75e7bf2cda17b838246fd5,2023-09-08T14:26:06.590000 CVE-2023-4092,0,0,5f31fed2eab5b0f348baf91fdb36ca5a5c02cd3313e242f154778e0217ad366a,2023-09-21T13:13:44.877000 CVE-2023-40920,0,0,ed4cd416951d4081f8432a4ebfdf927305fcbacbdf0df8dc7ce85070cee84b58,2024-09-19T21:35:03.493000 -CVE-2023-40921,0,1,5edab77be34d83ed8db9dba9d8630a0837428f9332ac7f069718b4e13b170c03,2024-10-08T15:35:15.913000 +CVE-2023-40921,0,0,5edab77be34d83ed8db9dba9d8630a0837428f9332ac7f069718b4e13b170c03,2024-10-08T15:35:15.913000 CVE-2023-40922,0,0,dd40a0a468b1bd7ff4b99edc96361008b5a99f036dabadf2e5b4d99cea0eb8d8,2023-11-13T19:34:31.343000 CVE-2023-40923,0,0,60ed4f36513d088660a805b25e6ab52170a4dea6e1ff217b52fd7d05d000a9e3,2023-11-21T02:28:24.897000 CVE-2023-40924,0,0,15937ffb272841fdc72d363c3e397712755babe13146b87d826bc9a5ff106fc3,2023-09-19T13:47:13.017000 @@ -231968,7 +231968,7 @@ CVE-2023-4217,0,0,3b66e4c2db95e463abc0913bf8cff4560b7a5e48b1cf7e8e52cd797b0c5d83 CVE-2023-42178,0,0,344a598e076c834e23b6be3cc32b4131760070e66f3b068a6c5956c5e566d8d5,2023-09-19T02:11:38.890000 CVE-2023-4218,0,0,6e4902ceddd34ec7c6848eb210276af9251afa467329d21a0e3f3fa2b8fa129c,2023-11-24T18:25:48.900000 CVE-2023-42180,0,0,cf0c1c802225bb6346a28aa702c60a5aafe9fa0a2230952f947c846a310d0d19,2023-09-19T17:09:40.980000 -CVE-2023-42183,0,1,a1133a066130689693857f816b38cf3c17525657b8faccef176eb95854765a74,2024-10-08T15:35:17.213000 +CVE-2023-42183,0,0,a1133a066130689693857f816b38cf3c17525657b8faccef176eb95854765a74,2024-10-08T15:35:17.213000 CVE-2023-42188,0,0,77a2cbfaf3adf1178e78d13dc96d6ab39ad9829f805e561026314dd6cf6d9430,2023-11-03T20:34:28.027000 CVE-2023-42189,0,0,779bf22e6a73fc0c2318d23fd00b794d65764c35af72ecd70d35c2b37346a139,2024-02-15T19:44:54.227000 CVE-2023-4219,0,0,7d233cb52a89b518b4279b7545fd0ebb9fec39343ac53656ad8f59df23239851,2024-05-17T02:31:26.743000 @@ -233621,7 +233621,7 @@ CVE-2023-4469,0,0,7580644e4adfe189476d806108af5a3a910709ef63727c942853da5dad8cbb CVE-2023-44690,0,0,c6a2a8257d63a863717f767bbac6f983a285710a356a275ddde04031975cd054,2023-10-25T20:32:47.147000 CVE-2023-44693,0,0,0429f874de4bfe4a92bb74269a073df9f4bbf6a3e382be7b3d453594995bc411,2023-10-20T18:10:26.627000 CVE-2023-44694,0,0,4c0cf01795a61c2ae0628e96bbe22380b35ad54b81a65ce76288c76555daf4ad,2023-10-20T18:10:35.700000 -CVE-2023-44709,0,1,7494efa9e0ff76458caf57b5966ffad110637477a5c3f1f74ad1afd6175370ff,2024-10-08T15:35:18.137000 +CVE-2023-44709,0,0,7494efa9e0ff76458caf57b5966ffad110637477a5c3f1f74ad1afd6175370ff,2024-10-08T15:35:18.137000 CVE-2023-4471,0,0,44264d3ae1f44a8ba1b89c5d364bdb2eedffe35ceec2ae2a74f33989f8b286a6,2023-11-07T04:22:39.037000 CVE-2023-4472,0,0,8e88bd547863dd848f5545bc9daf80599ec09c97ee2a919d4d237de27d94293b,2024-02-09T19:49:05.873000 CVE-2023-4473,0,0,7f9dac7cb04a96fc565d97c99667ee1eda825fe5e34fa387501c3331bef9d669,2023-12-06T02:15:07.063000 @@ -235604,7 +235604,7 @@ CVE-2023-47574,0,0,e5b2817b9b7b7265cc255b353956c50f5dc2587dfe440d88621c1a1cad897 CVE-2023-47575,0,0,30cf6be65abd61448a4a89a9b72de85e929953eb93306b378cfacaff6d87cbd7,2023-12-18T15:01:02.337000 CVE-2023-47576,0,0,b658502efe54d9b05c4f426be235a8b40d293e00fdab9f01c40b60b57e7ef3f8,2023-12-18T15:01:53.273000 CVE-2023-47577,0,0,c0f13ddb15e49455530054095cc0266851552b5d13fc042a223643cd9df0b789,2023-12-18T15:08:42.737000 -CVE-2023-47578,0,1,ef045d13e95e2c586f03051aacd5aeca98b41994adacf8297fc253108079f65f,2024-10-08T15:35:19.093000 +CVE-2023-47578,0,0,ef045d13e95e2c586f03051aacd5aeca98b41994adacf8297fc253108079f65f,2024-10-08T15:35:19.093000 CVE-2023-47579,0,0,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000 CVE-2023-4758,0,0,713db879644d26febfa528fa3b5a32eaa4d032e64a180d47e3477adfad42aa0a,2023-09-06T20:43:43.440000 CVE-2023-47580,0,0,1046d1b7ec521db48bb6fc1bed5767243c03c220591fb511a40a277d8666b4e6,2024-08-14T19:35:12.147000 @@ -236075,7 +236075,7 @@ CVE-2023-48321,0,0,cfbb4818ad6df672bab7d7e079b5f53bf4c70443bd68d2f959ac12a2b28ce CVE-2023-48322,0,0,d697053dee5a62a4985e1c575006e608f81298f9ea415a03ec908284cb682343,2023-12-05T19:22:49.677000 CVE-2023-48323,0,0,f3bfa524105a4fe1f1a60eb78ec6b0abb2981c140d32cd78522bfaef7358b997,2023-12-05T02:00:16.967000 CVE-2023-48325,0,0,5c23307afeaae88101ea85b31af8160ba0baebf4185700367a0030ed7db41498,2023-12-12T16:53:19.390000 -CVE-2023-48326,0,1,ddc48aaf4613e82cca9ce4631b4ce91dedb3cbb121d77b466253590f26d72d69,2024-10-08T14:03:10.323000 +CVE-2023-48326,0,0,ddc48aaf4613e82cca9ce4631b4ce91dedb3cbb121d77b466253590f26d72d69,2024-10-08T14:03:10.323000 CVE-2023-48327,0,0,e1b7d84c4255656c26577b42d70dec092c2127828ef97a70d26a6f2c54364053,2023-12-29T17:05:45.677000 CVE-2023-48328,0,0,8b8f393babf03820a7f30b8e4ee8c681809dfee4dd512b2d8b5f39c4a890f24b,2023-12-06T00:38:56.337000 CVE-2023-48329,0,0,829f9d24c66826bd90c1bd5cf166c3fea561640c6f611de05ce042bc02eefe94,2023-12-05T19:20:15.773000 @@ -237683,7 +237683,7 @@ CVE-2023-50550,0,0,44e430b08e9975570f62c119d5c2a1a9a495fe727df7e6498a46393b98888 CVE-2023-50559,0,0,de447039cb5266aa717edc27eb1977ed0e846e77da68daebf06cfa36fc2df160,2024-01-05T23:14:41.273000 CVE-2023-5056,0,0,da6a6df64835f811e5d1998175c8d1df0fa5120b5f35b95bf3cb2069a9a955f4,2023-12-29T18:14:30.437000 CVE-2023-50563,0,0,c0949a7803a78e6bdccaf158722f9f5ef648f63b62a2f9b2dd07b712d53ac4d3,2023-12-18T19:50:04.110000 -CVE-2023-50564,0,1,723ab5777fb8d734bbf67cf6e3d710b0738433e6b348c6da86fbe4cb9a506928,2024-10-08T15:35:20.180000 +CVE-2023-50564,0,0,723ab5777fb8d734bbf67cf6e3d710b0738433e6b348c6da86fbe4cb9a506928,2024-10-08T15:35:20.180000 CVE-2023-50565,0,0,029c18972243cdbeacdccb769910b874abc335ae45d5bfdaa56bc3ad4e17c907,2023-12-18T19:48:40 CVE-2023-50566,0,0,7200a7f7a9f3c342ab6eaac55fd785cd40074045d8cf9ea9ee9abf54685ef508,2023-12-27T19:33:05.677000 CVE-2023-50569,0,0,867c7b6348a088e402df901906c79c1e617d0d1056d26bbddc129bdd3fdf5a3c,2024-08-15T16:15:17.360000 @@ -237769,7 +237769,7 @@ CVE-2023-50762,0,0,1f6280ecb5466998c2de88fdbd8269fa769331b5a5d1fdcd8e4c176d77703 CVE-2023-50763,0,0,ea8513ed901de013d34cf1152079c5f96667271ee4bac811154720a2f5cbde61,2024-06-11T13:54:12.057000 CVE-2023-50764,0,0,5c47d6239f3ced10df17d0dbb613a1877aa35c1dd18d2c265853c86f904c20ca,2023-12-18T18:27:13.043000 CVE-2023-50765,0,0,a972b3d422aa9e361600a49239f723e7fc28e6e3a49d701a8de2e98224fed5a7,2023-12-18T18:22:39.187000 -CVE-2023-50766,0,1,f12901d6a76f7ceb3303ec35502f314336720d093c7646885e024afae35aa141,2024-10-08T15:35:21.173000 +CVE-2023-50766,0,0,f12901d6a76f7ceb3303ec35502f314336720d093c7646885e024afae35aa141,2024-10-08T15:35:21.173000 CVE-2023-50767,0,0,12c0bb735e4804a7f62ba2fd19ac33e875fc23a26bfed4495a69935746a1a8bc,2023-12-18T18:19:52.590000 CVE-2023-50768,0,0,a14ce2c566268d7795db7864005ac678e5f82247de8caf997643b04b287d74c1,2023-12-18T18:18:11.293000 CVE-2023-50769,0,0,173e2fc8312f1862b75291d0be8a26f7f7ec0cdf4bef05369468b3a9c1eea401,2023-12-18T18:17:24.077000 @@ -239464,7 +239464,7 @@ CVE-2023-52916,0,0,bebcac5d0a36cd875bff11f8b42fd7bc5076a3c1c94e9b8c44be74509c12a CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 -CVE-2023-52946,0,1,43d8c575418a7f78a11e9526af607aac1baa72cf0563b1f4b331156f6ceab810,2024-10-08T15:55:07.543000 +CVE-2023-52946,0,0,43d8c575418a7f78a11e9526af607aac1baa72cf0563b1f4b331156f6ceab810,2024-10-08T15:55:07.543000 CVE-2023-52947,0,0,63d645c926faea55b9fdad340f3f464b9fdc9faedf4a6e963e4826e43b2cd432,2024-10-02T15:26:28.213000 CVE-2023-52948,0,0,f79919aed1747abb868b7504103d5ade0b888b12580c06d7084afbaa6db543f5,2024-10-02T15:26:30.160000 CVE-2023-52949,0,0,57e7b479eb0b4cd4da85e5578fdc01b85634bb050edda133619d47c1369d88c5,2024-10-02T15:26:32.077000 @@ -240732,7 +240732,7 @@ CVE-2023-6697,0,0,12c273f1379c4db348aacab8ec27f123afa97fabdba674ad7bddd52c916085 CVE-2023-6699,0,0,4a8624b4b6ea31b8237e0eb30e2c836ee2648ac75d07c3c9236303c77756ccbc,2024-01-17T00:02:15.700000 CVE-2023-6700,0,0,f0219c5bfda6880f7a4b7dfd99547dcb7d3f941c1a23751cf1548d4fdf181ac9,2024-02-09T16:38:05.687000 CVE-2023-6701,0,0,e7b9da218402eb475c88893181134a1075091971f38b27717010b5f52631c905,2024-02-09T17:08:07.160000 -CVE-2023-6702,0,1,6bf675bd4a37853b89b1aeb12421ec3df28608d32412ac4aac16f28bbf7aafa5,2024-10-08T15:35:22.107000 +CVE-2023-6702,0,0,6bf675bd4a37853b89b1aeb12421ec3df28608d32412ac4aac16f28bbf7aafa5,2024-10-08T15:35:22.107000 CVE-2023-6703,0,0,2c84ff0729cfb6e8075930d8c84b6489bd81b1e94481e1ea921218b795abe78e,2024-01-31T17:15:27.123000 CVE-2023-6704,0,0,e9d4a9e8bc4460346c077611a0951d8e678776d3d70b8711ff361cf57741f314,2024-01-31T17:15:27.477000 CVE-2023-6705,0,0,cc96fda9cfa36906542c74189dd45f7ff7ce84800173cd0f06e50e437fe77a01,2024-01-31T17:15:27.870000 @@ -241296,7 +241296,7 @@ CVE-2024-0053,0,0,1819b010c6a0341de8f41f40de4966b4aa1ac2481826c4f42a23be7eb74898 CVE-2024-0054,0,0,65ffdd62a15fbba9fa1857978982b951512db6bc7615451d76f1e47eca67a7de,2024-03-19T13:26:46 CVE-2024-0055,0,0,6423f35fac503e2236303ae5d235d6e391a2b6d4054c8cfb0ff929b519b2bfb9,2024-03-19T13:26:46 CVE-2024-0056,0,0,250eb566c316b11de6e07df616e14b6841dc4cdae760cc615b211d8501ed88cc,2024-05-29T00:15:10.920000 -CVE-2024-0057,0,0,5ab5673f2af739399b07e147370322a5ca65cb1474378035b1d3b1b450eb99db,2024-05-29T00:15:11.080000 +CVE-2024-0057,0,1,d6b5e2120e803459771f8d2d80d323babb44095797936fafd288749b16d7cafd,2024-10-08T16:15:05.277000 CVE-2024-0066,0,0,edf104f3d6f2429ec397ec7f6a0c69119750ee227dae9f3b2af25d9d29a03213,2024-06-20T12:44:01.637000 CVE-2024-0067,0,0,2510f3abf6d60bd3be95f588e4263e97377d419d6cb8663648142812a03c6ccf,2024-09-10T12:09:50.377000 CVE-2024-0068,0,0,6b8371ca9b4345af5aaf5fdf9359976122506646a267dd907e8079f7bfa63e11,2024-03-01T14:04:26.010000 @@ -243297,7 +243297,7 @@ CVE-2024-20360,0,0,b9376885f3bd33f8b376cfcd9d1a4c2997937c1a075603d8638d862812d3e CVE-2024-20361,0,0,8fc8c6bd1287a52550fd38650e66a5006a20e7eae1aa8f8c99b728af1c48ddd5,2024-05-22T18:59:20.240000 CVE-2024-20362,0,0,0fe85dbbc396fc356835f570820efb6142358d26355d59753469b06ab8b1d26f,2024-04-03T17:24:18.150000 CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000 -CVE-2024-20365,0,1,b941e81c62a5622fb3207cd284578983abbf20cf62d6c3be738ab76890047c8c,2024-10-08T14:28:42.727000 +CVE-2024-20365,0,0,b941e81c62a5622fb3207cd284578983abbf20cf62d6c3be738ab76890047c8c,2024-10-08T14:28:42.727000 CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f48f,2024-05-15T18:35:11.453000 CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000 CVE-2024-20368,0,0,11ba77e6ca928b43fcf33bd9b64c67655ca382b15bfec85a328bbca787a43cf3,2024-04-03T17:24:18.150000 @@ -243309,13 +243309,13 @@ CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0 CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000 CVE-2024-20381,0,0,464812231d2b2817edfcae33ccc382745503263af9ca1893bfbdb856a7d08246,2024-09-25T17:15:15.240000 CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000 -CVE-2024-20385,0,1,acb41bb9b0e8de27149b5546043f469887d2173135754c6ef5f9970c450eec9d,2024-10-08T14:22:34.120000 +CVE-2024-20385,0,0,acb41bb9b0e8de27149b5546043f469887d2173135754c6ef5f9970c450eec9d,2024-10-08T14:22:34.120000 CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000 CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000 CVE-2024-20390,0,0,7596f8a252957b7a86b18b13b44a3f994e7e9bd3a3934d5a22e0cf6b5c4165f3,2024-10-07T17:51:37.197000 CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,94a9ebb2bcbc95d69522cf1a691e2eef5f012e7892caae86240bb4af40e4b8c2,2024-05-15T18:35:11.453000 -CVE-2024-20393,0,1,56f0c590f5a1758c31f0f3dee030b0ef35919d5814194a1fa7e6d81db08805c8,2024-10-08T14:37:39.713000 +CVE-2024-20393,0,0,56f0c590f5a1758c31f0f3dee030b0ef35919d5814194a1fa7e6d81db08805c8,2024-10-08T14:37:39.713000 CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f23d,2024-05-15T18:35:11.453000 CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000 CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000 @@ -243338,9 +243338,9 @@ CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000 -CVE-2024-20432,0,1,7fd746c387447b9ece17aaab52e949ef84dfd8dfcd9de8216b6df6b205f1574f,2024-10-08T14:10:35.317000 +CVE-2024-20432,0,0,7fd746c387447b9ece17aaab52e949ef84dfd8dfcd9de8216b6df6b205f1574f,2024-10-08T14:10:35.317000 CVE-2024-20433,0,0,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bce20,2024-10-03T13:34:37.547000 -CVE-2024-20434,0,0,0cb17e35dccf65c93ef1b906404233c0df16e7c48c45f3c6354901aff0f73ccd,2024-09-26T13:32:02.803000 +CVE-2024-20434,0,1,904368830c218856dc09e88c749c79a929855ae5c25f03306a83a7691e310e6c,2024-10-08T16:20:30.933000 CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000 CVE-2024-20436,0,0,3c7df02e33d61650d38d57d2c6990631b27a955f7a69744385ef6542a639f024,2024-09-26T13:32:02.803000 CVE-2024-20437,0,0,3588a74a4857b2b89502e176f099e98223e6ee3f1fc87f57deb9e52b3c2e63bf,2024-09-26T13:32:02.803000 @@ -243351,10 +243351,10 @@ CVE-2024-20440,0,0,c9c53dc5c2cee258d8848cdc1782766d626f4ac361af7ec1e658341d1dc60 CVE-2024-20441,0,0,d55f8099b608b8adfd1a6d0d43acd3f45d687b76b8525513869a95df6ac3c297,2024-10-08T13:45:07.300000 CVE-2024-20442,0,0,805aefb18c510621a81c52eaa48c4a81152e7d64b4a9afb06dafc5cccb2f219c,2024-10-07T20:11:48.687000 CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000 -CVE-2024-20444,0,1,a12fb2570a5698911d0cc6e07bb095dabf95fbf72a3c4e45b591e21f1703dac8,2024-10-08T15:26:38.527000 +CVE-2024-20444,0,0,a12fb2570a5698911d0cc6e07bb095dabf95fbf72a3c4e45b591e21f1703dac8,2024-10-08T15:26:38.527000 CVE-2024-20446,0,0,e9357eb0aa4f61946fea3c9e67283cca574773e1e525326f07a38ede4840249f,2024-08-29T13:25:27.537000 -CVE-2024-20448,0,1,565fdf482c77d5556490294526189aac22203bda3136e1e644d46324e48508c6,2024-10-08T15:25:47.053000 -CVE-2024-20449,0,1,316480c4331efb1b0699079802002acf63f93477d88f4712b7f6bca9f927ba75,2024-10-08T15:33:29.210000 +CVE-2024-20448,0,0,565fdf482c77d5556490294526189aac22203bda3136e1e644d46324e48508c6,2024-10-08T15:25:47.053000 +CVE-2024-20449,0,0,316480c4331efb1b0699079802002acf63f93477d88f4712b7f6bca9f927ba75,2024-10-08T15:33:29.210000 CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000 CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000 CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000 @@ -243369,7 +243369,7 @@ CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aa CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 CVE-2024-20470,0,0,f4d0f370b33409c262c5ab31378ee827b9a245accc78a60dda7d13e5892b01f8,2024-10-04T13:50:43.727000 CVE-2024-20475,0,0,3f291467cc737decf2fac9adb4dea13bddd59923e910f2a0d4abb07dc30557b9,2024-10-03T17:49:17.797000 -CVE-2024-20477,0,0,9415aae0000366f15d440b0b995903e32c96b1adaac439a1f05ec5a156881d34,2024-10-04T13:50:43.727000 +CVE-2024-20477,0,1,546baafd3f9cb181a62a5bf8f2d6a935693c1d9566bac043856053043d6e851c,2024-10-08T16:00:30.167000 CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611029,2024-08-29T13:25:27.537000 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 @@ -243379,15 +243379,15 @@ CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e89 CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000 CVE-2024-20489,0,0,d68cce5506ad42f67e500e952ef8846db91b43a7e51bd083fc776681145c15d8,2024-10-03T01:40:11.637000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 -CVE-2024-20490,0,1,35fe5d8ca4a68248677c43c34084b321931d0d2945ab4df4da8782f5e23eb605,2024-10-08T15:15:39.160000 -CVE-2024-20491,0,1,a6a1b451f6dda658d800035b80719f5bd0d6502321ff1f094bbee2194c64d03b,2024-10-08T15:55:08.933000 -CVE-2024-20492,0,0,3f9685b0b1be7777a7f6564fba92e81c4939ec6ce44efaf33ca23f14213d7a2e,2024-10-04T13:50:43.727000 +CVE-2024-20490,0,0,35fe5d8ca4a68248677c43c34084b321931d0d2945ab4df4da8782f5e23eb605,2024-10-08T15:15:39.160000 +CVE-2024-20491,0,0,a6a1b451f6dda658d800035b80719f5bd0d6502321ff1f094bbee2194c64d03b,2024-10-08T15:55:08.933000 +CVE-2024-20492,0,1,2a16b24462714ef70d9e342f3dfc09a86ef4cf713f3ed6d37bd4c4f35d4f0135,2024-10-08T16:07:26.280000 CVE-2024-20496,0,0,f5b0a0efe19b6b0db008e04fb71a9ea99e46afaadc250932e3e257a3123133bb,2024-09-26T13:32:02.803000 CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000 CVE-2024-20498,0,0,ac38feff0f8c92a9d37f2efafc1cf83694a2cd4132fee4a8782db7247e8ed7c3,2024-10-04T13:50:43.727000 -CVE-2024-20499,0,0,61592d75aa53b8146669bfe8a0aa97a5213dba0a10c3d0b7a96d5f045b7e5c6b,2024-10-04T13:50:43.727000 +CVE-2024-20499,0,1,af741fbfe8ba612e25b241c47a3702ec521025f1b348ea1cb1ff419ea3749d42,2024-10-08T17:45:55.643000 CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000 -CVE-2024-20500,0,0,32da601e179d99235faf8d4482b9eac9e2131a63bac7887db9465cb018e2e86f,2024-10-04T13:50:43.727000 +CVE-2024-20500,0,1,82d0746516945976fa8bb6c081813b0ac8cf8cfa50075a8c7772d82e5b5ca5ba,2024-10-08T17:37:00.427000 CVE-2024-20501,0,0,a5cae9ebd3d86bee7a00d9257575d1e216817f56abf25596b4aae0c4ca8f9a1e,2024-10-04T13:50:43.727000 CVE-2024-20502,0,0,f14c4e5bfce0b759e503b5dcc838dbd5676399c8b9501a1480ecb3459a58c19d,2024-10-04T13:50:43.727000 CVE-2024-20503,0,0,e85721e4e1cede24d93f2a47467ca55ab63c155dde7e0c41a923091bcc7e874a,2024-09-13T19:24:37.420000 @@ -243398,7 +243398,7 @@ CVE-2024-20509,0,0,2edb036105d4f053d2cfe9878dd264ead880f73761ff63262a5126ef73f6c CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000 CVE-2024-20510,0,0,6fbdd0fde11e7a17f48951ee8a4206d5b5c8d1dcebb95035b098d9f8dc980dca,2024-10-03T14:52:22.627000 CVE-2024-20513,0,0,74f5044a10c6af04d90e400086824cc149d8a5254bc476b504929f4525101c4e,2024-10-04T13:50:43.727000 -CVE-2024-20515,0,0,8a62e6fc2239e2194580ca9bf583d26f95de684e4e5664da5cf57f3e5dce8559,2024-10-04T13:50:43.727000 +CVE-2024-20515,0,1,a97b9b776cc799ee1ad03753f84b5adbde8d922a71a988fa6a481a074da42b1e,2024-10-08T16:11:23.440000 CVE-2024-20516,0,0,38173375d3e97a2ca4a3ada633aa8363dffa90658c88f70a1b4706a56888fef7,2024-10-08T13:44:10.840000 CVE-2024-20517,0,0,e16ec70f044330107de46d11fc56880c1e349bbc113ae734e245e91f648488a8,2024-10-08T13:47:52.483000 CVE-2024-20518,0,0,8e8380063b7bae86a06b52e48e7b616d3efda15d98a84f667c17186639d1ad43,2024-10-08T13:50:14.730000 @@ -243447,7 +243447,7 @@ CVE-2024-20673,0,0,92359ae1babe87f9d2569c86c5d2659bf4645ee0674948fdd4bd4a81fec3d CVE-2024-20674,0,0,da1fed3fc9882951bbd9a307c57a38164e881c2c901c1975152e12872c8dd97c,2024-06-11T15:15:57.087000 CVE-2024-20675,0,0,b98c94ba0537e0de16b8285a626c5321bfc0cdbdb5db8e6828f00ad8bf380607,2024-06-11T15:15:57.287000 CVE-2024-20676,0,0,13113493e4a2f6cedc45c75bdd54e2f9fb80eb7c898747ec93528676198dacc0,2024-05-29T00:15:13.680000 -CVE-2024-20677,0,0,a2aeef4ecad648c1f3d15593f4bfdc73fde60aafec00a12aab9992fbdf80a8e0,2024-05-29T00:15:13.797000 +CVE-2024-20677,0,1,cde0974a373bbd5dd79827f591868a99007a77be992e918aa145881a798258bc,2024-10-08T16:15:07.840000 CVE-2024-20678,0,0,d272ae29a116ff41558f69d52e91d6a556fb0717f395dd8dc7da4cd57816db06,2024-04-10T13:24:22.187000 CVE-2024-20679,0,0,101428e0ef0099bbe0a9e2aba1bd57aeccba4af6d989f2d7d3a99d12dd5d3ff8,2024-05-29T00:15:13.920000 CVE-2024-2068,0,0,4bed827cb22253e1f951ac11cf23a18e72cba9bcdf9396eb51db572ac9f09510,2024-05-17T02:38:01.590000 @@ -243468,8 +243468,8 @@ CVE-2024-20692,0,0,e2fa5066b371c1a3b1fc696f039966e4eaebac0e73a93da7714a18adcd38c CVE-2024-20693,0,0,e36656e3691fc277b93f3d836b7e97adbd4d56d932dee95616958859eb9b63d9,2024-04-10T13:24:00.070000 CVE-2024-20694,0,0,799930f4a0dc953aa1e0a387163ddb52e0cab94c05be1b4ea6f14e9ad93cff63,2024-05-29T00:15:15.630000 CVE-2024-20695,0,0,2a5f5e1260ec7c1d8119736f06d36dc82a81a975b591c409f788618f54b834ce,2024-05-29T00:15:15.823000 -CVE-2024-20696,0,0,4c8d5b0d5ab5490ba857ac46acd8810af4b6c9193102ed1bd6f656e6f5e4b915,2024-06-08T13:15:54.193000 -CVE-2024-20697,0,0,316e12c3303b03177621b751adf5f0b6f3e1a70a0b1bbd14d81106b9392b983b,2024-06-10T18:15:25.050000 +CVE-2024-20696,0,1,4561ad01a1baefff9e58a0caeff1ff005ffbc1ba88338f2eb454252347b0210d,2024-10-08T16:15:09.433000 +CVE-2024-20697,0,1,af15495103b03547dad90153d69decbf2c180e6bdb63aaf869fe437a9cc84eb6,2024-10-08T16:15:09.587000 CVE-2024-20698,0,0,a60010c037f6b47d92f2aa100f7d8a53d79be2eb5769a2c8e9d02ceb6254a101,2024-05-29T00:15:16.343000 CVE-2024-20699,0,0,bbde4aa236aa5bd1aaf9161e47fb1a1aee0558a0b300c08e5e21499a50eacae3,2024-06-11T15:15:58.073000 CVE-2024-2070,0,0,5d32ea05e6f2f66047d01700931546aa730f575dbd8fb6cf9e3d97d558acf9d7,2024-05-17T02:38:01.770000 @@ -244000,7 +244000,7 @@ CVE-2024-21309,0,0,e42de9b10ccc4cb172b4eb001a1906bad68e5c01f7f4e95caadbd6b48108b CVE-2024-2131,0,0,1cb34f9d56ec47ef042f3c821793e28b992c0aa97bebd17cebc35d75ef97e21d,2024-03-25T01:51:01.223000 CVE-2024-21310,0,0,4d9491aad8c4981a0e612e0b44a97454aec3903d3f3c0f6171a0f5a3dd0a9019,2024-05-29T00:15:16.957000 CVE-2024-21311,0,0,b85deee0147897dd9ebd5279d519a41b6e4963ac4ffbf57bda4c41eb441cb707,2024-05-29T00:15:17.117000 -CVE-2024-21312,0,0,1f7ff851d179b65ee992029114a17773449cd534be3c27c6fad96d9aa31f4e3b,2024-05-29T00:15:17.477000 +CVE-2024-21312,0,1,2058606a20a71dfde8d831c290e66d0b6931b1f62dffc7b40391ad92886d984f,2024-10-08T16:15:10.870000 CVE-2024-21313,0,0,84d74bba1d9df7b2f90f14577b9a3a7c58e931843118784d67b2917662697de8,2024-05-29T00:15:17.620000 CVE-2024-21314,0,0,6930b57ece6bc92a908dde5d5920ba925f7e2ed0150ccc58bef0688fccd61155,2024-05-29T00:15:17.750000 CVE-2024-21315,0,0,67a5da33824ecd778f27844365bb36405f00090897685ced69c183058c104553,2024-05-29T00:15:17.893000 @@ -244237,7 +244237,7 @@ CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849 CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957324,2024-10-04T13:50:43.727000 CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000 CVE-2024-21532,0,0,92d820bffe745b853ea7bc0867f78565ed04403bb753f19bd9796f9764c035e3,2024-10-08T05:15:13.920000 -CVE-2024-21533,0,0,f97f985c18ca8222f6787711067490ca79c5632d823889aa5bd6892981b88db8,2024-10-08T05:15:14.180000 +CVE-2024-21533,0,1,c34539e5039e6d9b0369fa18fde90c79f00ce520597b9e1d7193444781c2d83b,2024-10-08T16:35:04.437000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 @@ -245573,7 +245573,7 @@ CVE-2024-23507,0,0,9f1e74438f7a431c88cc3f1e943e0b0c220b5eb2228888f80809d4e5e7cc9 CVE-2024-23508,0,0,ba485a6ca567595c27f5fde0cc5a58c2ce8ed1b7e564f1fd6f691c0966bbd1a6,2024-02-05T20:27:29.570000 CVE-2024-2351,0,0,454ed46662546daef74ff156caee96f8f0dd281652dd22a76c11c2f2dc2bfab6,2024-05-17T02:38:11.313000 CVE-2024-23510,0,0,4df882e9071a892ebd31be1a8fedd9465fdf0c99a47ed68fbd5b9f60063100df,2024-03-27T15:49:41.437000 -CVE-2024-23512,0,0,bac011dfb4765478503004da5eac9d71cce1147514013c32229389add9aeea2c,2024-02-12T14:19:54.330000 +CVE-2024-23512,0,1,c1ae57d0c13050ae0c78371a7313282ac4ec8c259a704d6dfb1070ac587b3014,2024-10-08T17:01:56.890000 CVE-2024-23513,0,0,291801cabc92e7deeb3a62c391e18f4bdc60cb94389b5c78d85579bdee6aba09,2024-02-12T14:19:54.330000 CVE-2024-23514,0,0,43f212f2373b29d3fb0a5b9c531298be76e50fedba33c0a6082121f457669800,2024-02-16T13:42:03.290000 CVE-2024-23515,0,0,d20eea55f8aafa9c04b09123ae5338ca19889d64c9e0627cce14e242969ca4da,2024-03-27T15:49:41.437000 @@ -246373,8 +246373,8 @@ CVE-2024-24792,0,0,fc8d65092f6cca5efb8fd01d1ad855c18addacabc045b62e3e589a8690259 CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,2ec7aaa5fb034c52f8b00845d9c4c8227ed450c5193d69bd944efff082e59c10,2024-02-20T19:50:53.960000 CVE-2024-24795,0,0,9b9dd61f6278a2805f43add70bd5f500b812e3c07bf29007fae7bbb2713c297e,2024-10-03T13:15:14.233000 -CVE-2024-24796,0,0,292fd4a31399bba86c5730ef4bd877b625e772494a5146bfd46b725d130f455b,2024-02-12T14:19:54.330000 -CVE-2024-24797,0,0,40724d1d3e1a03ea7253bf27a8e4cea3180b132258b4b1bc361005ab1c0591b9,2024-02-12T14:19:54.330000 +CVE-2024-24796,0,1,85eed318d88587914f28f0ebe16e879f7f13ca66da6c278d2c8f005b6e417987,2024-10-08T16:27:19.487000 +CVE-2024-24797,0,1,0ac1a2afc243bdf4159fe23f3838030dc5f8b6bb51e688188fe702679ce090f8,2024-10-08T16:31:14.093000 CVE-2024-24798,0,0,cd85ec8a42d6d377caab8567c4fbee58fe370929d305cf392fd538d90722fe41,2024-02-22T19:07:27.197000 CVE-2024-24799,0,0,7e17118584447ded0b6aaa11faf04a5cc2af6cbe77c21034dd3cea9412c4cb73,2024-03-26T12:55:05.010000 CVE-2024-2480,0,0,bfa4405ae6e950e58f1df499f83b730158f82c371a0c1d286903bce0f44fcf6a,2024-05-17T02:38:14.737000 @@ -246470,7 +246470,7 @@ CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a CVE-2024-24884,0,0,9cc0b3ec8c7734d1deb101b539045a2699ea3341a31f17e51491360af063871c,2024-02-12T14:19:54.330000 CVE-2024-24885,0,0,7a43d600d033d18ff5a631d3c78e01918ca77dcf41ffa14f3f93f7c9b4bb4ad4,2024-08-02T00:15:23.523000 CVE-2024-24886,0,0,07792f7aa43278f631451e24100471b838930227e2960a56c45baad7e36474f5,2024-02-15T05:03:32.117000 -CVE-2024-24887,0,0,3fa205656c57f3b8cc1d4a749bb5081ff0cd7206e500d6babbaa7ff6268845cb,2024-02-12T14:19:54.330000 +CVE-2024-24887,0,1,b91ba2c15170dd37eb83644d09105b152fe9fce4832e88e978eca355fc6a4e64,2024-10-08T16:48:35.663000 CVE-2024-24888,0,0,b2279e9f3983cebdf60d9673f5c59010be319c6bdc9838b075c80c6c5f9d13dc,2024-04-02T20:31:58.463000 CVE-2024-24889,0,0,eb653f1757b8d0ecc405604c127746de8af7f70043137ce0e6c52c2d047ea3f6,2024-09-05T14:25:21.160000 CVE-2024-2489,0,0,5384ec5793386f56145dcd2b7ed1bdc0cd85415e6fc1bf2ba31c17023cb1db63,2024-05-17T02:38:15.500000 @@ -246500,17 +246500,17 @@ CVE-2024-24922,0,0,bda94a90d640ecd2ba7e34e12527eb389478913d2fdef4a7a40374a4459c2 CVE-2024-24923,0,0,2914d41786fe2dec7ff522f5f2eb706270f4aedc4780a4e38cc90811caf537b3,2024-10-03T16:39:00.273000 CVE-2024-24924,0,0,0ded0a4e17e2540ae000f279a251d379404cfd6f06868e1f4d673fd4a0ac484a,2024-10-03T16:33:41.047000 CVE-2024-24925,0,0,cc8cb8a23e7dd73ee9a6766a6472337f9951d5bd5f10e6b3d86cff9f9a8fd3bb,2024-10-03T16:32:47.193000 -CVE-2024-24926,0,0,8cb03073dcda1a3471b0e952c44e5acf481c94b56ef073787e39b41d16296509,2024-02-12T14:19:54.330000 +CVE-2024-24926,0,1,38295bea3bda789c344cd170567452e0ad7a8fd29b84ef3b8c3e070c73711095,2024-10-08T16:32:41.983000 CVE-2024-24927,0,0,498deedbaaf34633a873e394b24fc22599d0197d1f8820d13e88108c986f9dc8,2024-02-16T13:41:18.167000 CVE-2024-24928,0,0,b52a130cd3a1fca2373b93c0aee35d2b93ee44fde3214af3b16b88860ab0a382,2024-02-16T13:41:04.027000 -CVE-2024-24929,0,0,d40f8899189d16ea262887986555e4ad60a1883451204ca02ec28bbb71298e93,2024-02-12T14:19:54.330000 +CVE-2024-24929,0,1,ac0e20cc5a11775861fdb560aa3700e2e47e7b7932f7cec090090920d6f7c81c,2024-10-08T16:45:27.380000 CVE-2024-2493,0,0,96aed5df52197bd88259ea3cc6ab782c7638621d951673d9b771020b7040a773,2024-04-23T12:52:09.397000 CVE-2024-24930,0,0,d5de5e9fa12d98001a3e352fb5044a00e1d7c294e5bd565fa5bde9e24426b735,2024-02-16T21:33:40.590000 CVE-2024-24931,0,0,8055144ef3f8276a1d5b57c6f0fd660d9917c6af314dcafe24753bf6523a62c9,2024-02-16T21:33:29.340000 CVE-2024-24932,0,0,2056b379fbe5985f3fd53a9192acf22ce6fa06e81d893ed294319ef18f424a4f,2024-02-16T21:35:59.587000 CVE-2024-24933,0,0,e5ee1d3dbd787e7f21467e6647a21787dcfe427189512859052e9cd08c161ae4,2024-02-16T19:29:53.437000 CVE-2024-24934,0,0,717ebd29baf0223147954ff4fc7b5abf7339ed99fc54fb4afa5bc07c2af82d00,2024-05-17T18:36:05.263000 -CVE-2024-24935,0,0,39b3b47eec290d795dff4288fa3e077d67ca6b2bbc4436ed0fecf9ebb566b6a7,2024-02-12T14:19:54.330000 +CVE-2024-24935,0,1,465c681cd617b90f181748d99f3f61e35e0d3328d1f3406b9445221bdf4597ef,2024-10-08T16:52:19.450000 CVE-2024-24936,0,0,2f4b3d891c0fd71fb32f3f7281dc7468776050ecaee7860140e85b8329051af2,2024-02-09T01:06:20.053000 CVE-2024-24937,0,0,c913638a2922af897146e30fa39c4ae1eedee29a56b43ae469e999010515ffd7,2024-02-09T01:05:30.783000 CVE-2024-24938,0,0,978a8e92d6abe74a239a68136614ec8b72eac7e14ad968791e1a3865ec19723c,2024-08-22T20:35:04.587000 @@ -247009,20 +247009,20 @@ CVE-2024-25693,0,0,ee3b1699756246429d08fcae77f5a3d1bf8999838fba0943d498908eefa0b CVE-2024-25694,0,0,e86a73d2b4a4e9b29012ceae3010a136ff34878b536bcfb90a6d69290ce28fe7,2024-10-07T17:48:28.117000 CVE-2024-25695,0,0,ae0f9f8b4640bad4ef7d98bcee5a49c1f9e646c53c1fb5af299b3d59dbeeccbf,2024-04-04T19:24:50.670000 CVE-2024-25696,0,0,b9ac53149f8eb62bad5c1e7fe3f9f0b5771bd4ade8a07c59c93d14f596dac225,2024-04-19T23:15:09.930000 -CVE-2024-25697,0,0,c5fc3bc25d1e4faa00aaa8e1bf09aa0f27faccc7403bf65bb6683bb0fb18ce4e,2024-04-19T23:15:10.003000 +CVE-2024-25697,0,1,00e09b3a3d399949d344c4792642676acc05306dfb8c33dc1b47547a03399a73,2024-10-08T17:15:29.717000 CVE-2024-25698,0,0,2e4c293fce5511a49d5e47901a449b88216e166f1733cf134304a504814cc36f,2024-04-19T23:15:10.093000 -CVE-2024-25699,0,0,3e9dc1ca7d7ef12af3ee3d1aaaf483e4da1216e3ad0038a8cd17a84a35540eaf,2024-09-20T03:15:02.197000 +CVE-2024-25699,0,1,9d693017a1c9d09a675540e3ff57b587b5c9e0a64b03ba2e5a4505b921a75e06,2024-10-08T17:15:29.917000 CVE-2024-2570,0,0,62ba08b313dad98b50886ef335be346def1e9e22dc58f4ebc2c3039b966f349e,2024-05-17T02:38:20.170000 CVE-2024-25700,0,0,9f93306ac6edcebea165bf5bf6cc8e9e96960ebf6d995fdefa65259eb1d6db09,2024-04-25T18:15:07.817000 CVE-2024-25701,0,0,fb0acc04edd8e6129d7e18302257d0475b8cc46294099a9f7b2a28d5e4af7884,2024-10-07T17:48:28.117000 CVE-2024-25702,0,0,f3e8de2c8081bd58ef3e73b671dc2c1b9812e9004fd627e4151ed8957347dac4,2024-10-07T17:48:28.117000 CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 -CVE-2024-25705,0,0,5ca69430603f53b765b272e130265438b144909f81658ee1f57122c8731be727,2024-04-25T19:15:49.660000 -CVE-2024-25706,0,0,4dd4cc8b40ffd759e2858b12b12503f34f8254db1728772434af1721de13bdfa,2024-04-25T19:15:49.720000 +CVE-2024-25705,0,1,c9fa71f2e3b4d60b760a7a0fbd06a7695a831b2f4ed1a8ae028fd9d80b77afff,2024-10-08T17:15:30.027000 +CVE-2024-25706,0,1,76cd46bef97f68be46879fc697c19397ad5a3588f032936cbf1c2ccf6233df59,2024-10-08T17:15:30.303000 CVE-2024-25707,0,0,3bb0ddd1c56cea2a265f7e18aa1195f02551815bae9729435bea1e331186d842,2024-10-07T17:48:28.117000 CVE-2024-25708,0,0,b995ea56334b971dfe3d8608dc1ee58bae4d9dee517e37442e06f48d1ac62cd2,2024-04-19T23:15:10.237000 -CVE-2024-25709,0,0,b6b49ac56fc8edff6641adaa6a566250a8f64a01f9aee5924b9059f6f7f1e1a6,2024-04-25T19:15:49.777000 +CVE-2024-25709,0,1,6187278f353e68f2e97f0f71714f293249b03a10e9b00415a06f8bd5449339e9,2024-10-08T17:15:30.607000 CVE-2024-2571,0,0,944818011263aece939e20c7251816424f7831487c7b65e2eb2d8bf532c69b9f,2024-05-17T02:38:20.267000 CVE-2024-25710,0,0,d1e1c2f14ac0fdaa17f43a1220d128117b47331cb5ccaceca080941af70611b1,2024-03-07T17:15:12.940000 CVE-2024-25711,0,0,c4c08c8cc09954759ac01254a6c034bf78d852c0e2f0fb9c387add767b4de561,2024-02-27T14:20:06.637000 @@ -249429,7 +249429,7 @@ CVE-2024-28882,0,0,1c2deedb6322663ef74bf2fde692de72490de1c075113953e26f68fdd4a28 CVE-2024-28883,0,0,7608553831e95dbd64a1629b16235d631ce647c64db4d36e5f31f95004223611,2024-05-08T17:05:24.083000 CVE-2024-28886,0,0,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000 CVE-2024-28887,0,0,02788ece8fafa84414db815e90d6fbdcb64e36e799546da1d80bab49ab148ef2,2024-09-12T18:51:49.010000 -CVE-2024-28888,0,1,0ce7c4f34166b44c7b4d23f6df0c163925bca0768a3984a15ef4f99dab43af91,2024-10-08T14:14:55.637000 +CVE-2024-28888,0,0,0ce7c4f34166b44c7b4d23f6df0c163925bca0768a3984a15ef4f99dab43af91,2024-10-08T14:14:55.637000 CVE-2024-28889,0,0,75e96a359aa914e62263deca001066e2c2cef2ce9a8bba57feb8d1aeb144a69f,2024-05-08T17:05:24.083000 CVE-2024-2889,0,0,28ef4975b1d9f79ab7d0703313acc039b0acfd9d3a75a1a425d92dbe5c73a986,2024-03-26T12:55:05.010000 CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2bd23,2024-07-03T01:51:54.973000 @@ -250304,7 +250304,7 @@ CVE-2024-30101,0,0,7930ed1d01b5b02ebc919bac3d4e56f05b80c135c47d9aae654fe173e1327 CVE-2024-30102,0,0,319135154fd92fe7d8106fde2ca3c4802e21706ca62151c235c5521e4367379c,2024-06-20T17:24:52.287000 CVE-2024-30103,0,0,cbcd73720f86b02c166360f547f14e75567d871ea6a9bb35fd8a94c030f28d7b,2024-06-20T17:26:40.603000 CVE-2024-30104,0,0,0d6554d17808fae404c18fd87f0cb343eeacec3983f90ccf7acd89f92adcb133,2024-06-20T17:27:01.447000 -CVE-2024-30105,0,0,454d0e6fd7b248d3734507e8d08c7914eb2aa5b4da6af2f79acdc1312788e0b9,2024-08-07T17:31:19.913000 +CVE-2024-30105,0,1,5c287591f93c13e98077376ded79fc92f7e3c347ae72d3d5f10ca6d6cbe0e5e4,2024-10-08T17:15:32.123000 CVE-2024-30107,0,0,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000 CVE-2024-30109,0,0,04881debc711277dac69677e9ba1bd3a604eac95048cd8a9d9b601fb19907fcf,2024-06-28T10:27:00.920000 CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf5482466d,2024-05-17T02:39:40.533000 @@ -250734,6 +250734,7 @@ CVE-2024-30565,0,0,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000 CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000 CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000 +CVE-2024-3057,1,1,b76a848e2e1b33420a96bdbc36f6b0d0dfad3c1f6745e3b5e1b0377d1018c41b,2024-10-08T17:15:53.770000 CVE-2024-30570,0,0,caed104332716a7853dfa2ec0af0a5363e33ead1c7830017a6995784a2222c35,2024-08-19T20:35:12.990000 CVE-2024-30571,0,0,d0b0ce739c22bcaf56190db28e9a8c1e2be7759ce3e5fac8f0fae70b3abe2c6e,2024-04-03T17:24:18.150000 CVE-2024-30572,0,0,04b75791693e289b4034f3fd29a8b35bcf61baa8fe2d36e853f3fe35bb0c8981,2024-04-03T17:24:18.150000 @@ -252733,7 +252734,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000 CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000 -CVE-2024-33506,1,1,72b74996bfe2d45f9f7b275001eb973d1722cd3f9f0e9e3042ae3b21f6a8aa4a,2024-10-08T15:15:14.717000 +CVE-2024-33506,0,0,72b74996bfe2d45f9f7b275001eb973d1722cd3f9f0e9e3042ae3b21f6a8aa4a,2024-10-08T15:15:14.717000 CVE-2024-33508,0,0,d23a8b5401a28ba62ac0963d4eaed374c04d8dedc9f220c45a2db9dd2382c9ce,2024-09-20T19:48:06.197000 CVE-2024-33509,0,0,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000 CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000 @@ -257955,7 +257956,7 @@ CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f262434 CVE-2024-41160,0,0,4405f1fa554ba7d9df44bc4bbb96ea93e068b229b76d85cd7934b300d79543d0,2024-09-09T12:21:53.383000 CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413824,2024-08-20T17:09:50.647000 CVE-2024-41162,0,0,e54fc1a9823f936d00354799974ba06adb4cc451d56f48d5711fb6c0d45b612e,2024-09-04T17:03:53.010000 -CVE-2024-41163,0,1,27e4d5214b7422b34fa104447f5b61de05cea94735fc481acd43b25292b276a1,2024-10-08T14:47:56.787000 +CVE-2024-41163,0,0,27e4d5214b7422b34fa104447f5b61de05cea94735fc481acd43b25292b276a1,2024-10-08T14:47:56.787000 CVE-2024-41164,0,0,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-41170,0,0,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000 @@ -258125,15 +258126,15 @@ CVE-2024-41583,0,0,1f005d1031fdcb8c9fbd4906210734632d6902f2542d73f974724022c9aa8 CVE-2024-41584,0,0,68b94596ec41fb07148f3ccd64f3f267bab10beb49b58cefc1308a96f8b6488a,2024-10-04T13:50:43.727000 CVE-2024-41585,0,0,eeea4c108dbb2dac54e81fd473e2f3e107b47c0414ed5a60775a9a2eb5295c17,2024-10-07T19:37:13.900000 CVE-2024-41586,0,0,837f69300649f91553628210cc544eb3742b53056d8761afc7c78beb5b8a3c63,2024-10-04T13:50:43.727000 -CVE-2024-41587,0,1,2117db0c5d43fb4969d619b3d399c1877698054ee611d4c38da346c9431235f9,2024-10-08T15:32:18.313000 +CVE-2024-41587,0,0,2117db0c5d43fb4969d619b3d399c1877698054ee611d4c38da346c9431235f9,2024-10-08T15:32:18.313000 CVE-2024-41588,0,0,d3171451841d54cc8701d78143ba90f1e69577d24f358df37b30520acd50c7ae,2024-10-07T19:37:15.063000 CVE-2024-41589,0,0,04f9923f1d234a8dd6e0bf13471b52d9382898606729d057bb8885e65bf1609d,2024-10-04T13:50:43.727000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 CVE-2024-41590,0,0,d9e01f1710ca2fb6ae50a41d8a8ab885b0163706b9348a2a519cd117acbe24d1,2024-10-07T19:37:16.150000 -CVE-2024-41591,0,1,b601ac74fd37298e2fc5ed9a0bbbd65797d2e8f8115d8ad1b7cd224f9a1c6a69,2024-10-08T15:34:46.453000 +CVE-2024-41591,0,0,b601ac74fd37298e2fc5ed9a0bbbd65797d2e8f8115d8ad1b7cd224f9a1c6a69,2024-10-08T15:34:46.453000 CVE-2024-41592,0,0,f6de19b04cf0bb9aa23a631a0152acf3c16683ccba4ebd341bd77b629281497b,2024-10-04T13:50:43.727000 -CVE-2024-41593,0,1,a189f5d55756489fda0fc936cd73dd6693efd45f78ff053d92f5617bf449bc53,2024-10-08T15:35:04.583000 -CVE-2024-41594,0,1,d9714c7600399689b54c6aedb499a5881aaf286dbf7c701ddb5d0df945056ef2,2024-10-08T15:31:47.907000 +CVE-2024-41593,0,0,a189f5d55756489fda0fc936cd73dd6693efd45f78ff053d92f5617bf449bc53,2024-10-08T15:35:04.583000 +CVE-2024-41594,0,0,d9714c7600399689b54c6aedb499a5881aaf286dbf7c701ddb5d0df945056ef2,2024-10-08T15:31:47.907000 CVE-2024-41595,0,0,f4fa709962dab0c7305f9f36894e62c834649fae846a2fd438d736156c5061dc,2024-10-04T13:50:43.727000 CVE-2024-41596,0,0,07ef332ab0c1cc02af1af9479944d0586c6d5e720d06e9433d72b4111aba2578,2024-10-04T13:50:43.727000 CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000 @@ -258358,7 +258359,7 @@ CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e CVE-2024-41916,0,0,066c2f671cf06af6f38789b8644af442aa1cd06119863d905974296f8fe86611,2024-09-11T14:25:46.180000 CVE-2024-41918,0,0,444713f57f29ae6ab3503ccd6ce1c7bde4d2698bbfadab74cd1692649dedb241,2024-08-30T16:05:23.737000 CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000 -CVE-2024-41922,0,1,e74eafa8dae3435748ffca19fa95b96197b916af17ab6ca60fc1f7456a8ceeb3,2024-10-08T14:48:47.087000 +CVE-2024-41922,0,0,e74eafa8dae3435748ffca19fa95b96197b916af17ab6ca60fc1f7456a8ceeb3,2024-10-08T14:48:47.087000 CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280973,2024-08-01T13:59:15.743000 CVE-2024-41925,0,0,bfb2b8699763360b751a0b9d4cd96dc0b4b643c91e40e4714e322c144c6bed9a,2024-10-04T13:50:43.727000 CVE-2024-41926,0,0,d7564816d433232552fda23a5f10a79963d6c502f628c4841f8484c17aa4f54f,2024-09-04T16:55:35.570000 @@ -258764,7 +258765,7 @@ CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa CVE-2024-42412,0,0,7ea410a30890f641de68bc8b7a39cf35396bac17868b4fd498b764e1359ef0b7,2024-09-03T14:55:58.757000 CVE-2024-42415,0,0,4839bf77179277d2cfa194bfc1f048a9b9d9e918e55805643fbe033d66c830d0,2024-10-04T13:50:43.727000 CVE-2024-42416,0,0,0c0ba6b9334c7e838b8d455f49871ca47f5d5630f34ccb39214f945ba545086b,2024-09-05T21:25:09.273000 -CVE-2024-42417,0,1,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475a69,2024-10-08T15:43:05.720000 +CVE-2024-42417,0,0,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475a69,2024-10-08T15:43:05.720000 CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001f8b,2024-09-04T18:22:22.583000 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 CVE-2024-42423,0,0,d28867b0d8eebf1aff8bd3b42424cd5e577a7dd9340d9f0359d41e2fac4ef5ea,2024-09-20T19:42:20.417000 @@ -259432,7 +259433,7 @@ CVE-2024-43693,0,0,86a2418e4d1748f5ff1d2c010cf8ecb2f43f15c3955c5a628ff84ac9fa94c CVE-2024-43694,0,0,1f38ed43c98bb35b4ccdf138bc4e0fc802b17a5cb43658b2fe1564d43a70cd61,2024-10-07T19:40:04.147000 CVE-2024-43696,0,0,836cbdd93481f79b0376c146c7b443dbf891e4bf0fab15650f321deba707f358,2024-10-08T04:15:07.680000 CVE-2024-43697,0,0,e124d7e703440f5967c60e0f2f0a8b1b2278f58414864320362c8e94b9551b09,2024-10-08T04:15:07.913000 -CVE-2024-43699,0,1,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c52e4,2024-10-08T15:44:29.183000 +CVE-2024-43699,0,0,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c52e4,2024-10-08T15:44:29.183000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-43700,0,0,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000 CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000 @@ -259467,7 +259468,7 @@ CVE-2024-43791,0,0,2bd2bc46ca8d9e06de5a015638de614e582ba6d4dc15a542dfa7ce0b054d1 CVE-2024-43792,0,0,5dfd532d611c334ef7463fb3ed0a1e3a14dcc1ccfb2dfd854fb0c34158bf7c9e,2024-09-16T16:26:18.063000 CVE-2024-43793,0,0,28f7d2c5a02a2888bcaeed49e9492d6763c121916beec115ab73cecaf6424a4a,2024-09-16T16:28:45.233000 CVE-2024-43794,0,0,012282e0e09ace65c9817dd3efc52ee0130360e07c8e8e9b08cf3adc91c29f00,2024-08-23T18:46:31.730000 -CVE-2024-43795,0,1,7be53d0aea9a821ac901ee206df09b530ade8b5a6941bca83727a0eababcf814,2024-10-08T14:01:16.883000 +CVE-2024-43795,0,0,7be53d0aea9a821ac901ee206df09b530ade8b5a6941bca83727a0eababcf814,2024-10-08T14:01:16.883000 CVE-2024-43796,0,0,7eab0f98e9cc4b529e67976e2e3e5108a50bbe0663aaa9206477dd6bf141453b,2024-09-20T16:07:47.997000 CVE-2024-43797,0,0,93bf50c44e46a55d09c378845b20b036c0751fae29a6426402d2fc53d3595af8,2024-09-13T19:49:33.803000 CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000 @@ -259832,6 +259833,7 @@ CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc CVE-2024-44340,0,0,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000 CVE-2024-44341,0,0,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000 CVE-2024-44342,0,0,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb76b2,2024-08-30T14:57:40.020000 +CVE-2024-44349,1,1,f25139b7db7aedb5bc8648597dd66271d7a9357660217946bad9e21008bae478,2024-10-08T17:15:54.027000 CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000 CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000 @@ -259855,7 +259857,7 @@ CVE-2024-44411,0,0,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b49 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000 CVE-2024-44430,0,0,f640e237da24007d6a0c1a8b89d52bdbc13fc34691f8dcc93f05041c29090cb1,2024-09-19T01:38:06.317000 -CVE-2024-44439,0,0,6e2edee17e5631b0dee8cb8df18a6b15192f2188e415ab7f8346c0341ccc1375,2024-10-07T17:48:28.117000 +CVE-2024-44439,0,1,01e4f3d3412577124a013be036b11fcbbf43e12440c39e65930279b003b2f0ad,2024-10-08T16:35:05.540000 CVE-2024-4444,0,0,b8ab3a280e1fea7a38298a9a71737680ed9a07734ba58de04ed034a8b48f0be8,2024-05-14T16:11:39.510000 CVE-2024-44445,0,0,a7fbd12929c70124ad58671357453d511722d2c695ced38a6c3dd4a33f4c6a6b,2024-09-20T12:31:20.110000 CVE-2024-4445,0,0,bc137eb49d08335d8d2b32a3f413016c50b301d09f6a742095c80df385aba82a,2024-05-14T19:17:55.627000 @@ -260208,6 +260210,8 @@ CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a8 CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000 CVE-2024-45229,0,0,9c8c70fcda9c99c754f0fdd9cd19b64ab40d1023f96876f950167f9ed6ee6a43,2024-09-26T13:32:55.343000 CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000 +CVE-2024-45230,1,1,aab5756a2529c0118a4a4c2eb6f22fe4b297d08a29a9b51a4b0b78115e637f22,2024-10-08T16:15:11.903000 +CVE-2024-45231,1,1,a4be396448b7bec21fad40e6758ec45d305867761240fcfecc83435700327f5b,2024-10-08T16:15:11.997000 CVE-2024-45232,0,0,d2eccd07147c0ab2f9f7e5560b5b1bac422f5ad79377d7ed727039bcaf25bbd4,2024-08-30T16:34:39.270000 CVE-2024-45233,0,0,5285670af66f459db0801c25719b83bc6fb78721d233b9411020bb578be83355,2024-08-30T16:33:56.720000 CVE-2024-45234,0,0,4b3eecbe75c64cf8d46066aeb4347cf8775538d743d35431815d363ef479920c,2024-08-27T15:45:44.560000 @@ -260281,7 +260285,7 @@ CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f75b,2024-09-20T16:23:51.397000 CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 -CVE-2024-45330,1,1,6b509b82c72aeb53d4058cf040cfa8f4a1daa414ee8b4544b7dbe85ebddc83f7,2024-10-08T15:15:15.010000 +CVE-2024-45330,0,0,6b509b82c72aeb53d4058cf040cfa8f4a1daa414ee8b4544b7dbe85ebddc83f7,2024-10-08T15:15:15.010000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000 CVE-2024-45348,0,0,f8397568e636cad274a96a56fcdbc01af3feb6775d5986faa9442985588b0658,2024-09-26T13:32:55.343000 @@ -260531,15 +260535,16 @@ CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b CVE-2024-45870,0,0,f92d175154659b1ccfde1cb7d2443c500aaf2564bba36f9202b2dbe5a7292031,2024-10-04T13:50:43.727000 CVE-2024-45871,0,0,728c8e6e25f852a5194b96b816339c6dea2f278495c76d4d9d6d904a9357f28f,2024-10-04T13:50:43.727000 CVE-2024-45872,0,0,8e87b92fe22bbef6284d58a5e62493b4717b48305cf479255ef9a674e1d360d9,2024-10-04T13:50:43.727000 -CVE-2024-45873,0,1,e0117a2bb2b64d2b34ea5d363eeffff9da792173a59d3c86c557ce95c4ed4cea,2024-10-08T14:35:03.647000 -CVE-2024-45874,0,1,d4b19b90aa9b804fe8840615965a6df7afef07416e84bb9113973355b1bd8c7f,2024-10-08T14:35:04.530000 +CVE-2024-45873,0,0,e0117a2bb2b64d2b34ea5d363eeffff9da792173a59d3c86c557ce95c4ed4cea,2024-10-08T14:35:03.647000 +CVE-2024-45874,0,0,d4b19b90aa9b804fe8840615965a6df7afef07416e84bb9113973355b1bd8c7f,2024-10-08T14:35:04.530000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 -CVE-2024-45880,1,1,2caea1ecc913db5d4edcc53f7e6f558b8069e0ff24869808fba176320409f547,2024-10-08T15:15:15.217000 +CVE-2024-45880,0,1,b881799f37a96b816b0a8deb7b2a10a9843b0cd46f256e82ae05842fd90005ba,2024-10-08T16:35:06.407000 CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000 CVE-2024-45894,0,0,cc1b0068c433f6523cffdce49c1faf5c71294267a8da0701d851750ddd0859a0,2024-10-07T19:15:09.980000 CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000 CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000 -CVE-2024-45919,0,1,552b9322f64bef2610b09f931b72a22433f0955d738ffab82033309ab72bc0d0,2024-10-08T14:35:05.300000 +CVE-2024-45918,1,1,9660b8a20eea40312d170b39d7e7f27fe809c04fd14a81bbddd4a79a6189d7c7,2024-10-08T17:15:54.120000 +CVE-2024-45919,0,0,552b9322f64bef2610b09f931b72a22433f0955d738ffab82033309ab72bc0d0,2024-10-08T14:35:05.300000 CVE-2024-4592,0,0,14c53bd50ede1a956ff9d7a3d25f38fbc0411a373abc96f1d6d1bef77fb32c4e,2024-06-04T19:20:43.560000 CVE-2024-45920,0,0,ea56e67e89fba77fab53ce0c18965669797ee29dd0e8472343575caa10980571,2024-10-04T13:51:25.567000 CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb2101508b,2024-06-20T20:15:19.237000 @@ -261005,7 +261010,7 @@ CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816 CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000 CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000 CVE-2024-46976,0,0,02f78d527d01c9aa774dc796f1ceed3fea7faea62af60e78d26c9cc8325cba03,2024-09-23T18:27:05.920000 -CVE-2024-46977,0,1,5fe07ded9851f376d26307ff56bac27430f6dca48e690a88893ad782618f46ca,2024-10-08T14:02:04.173000 +CVE-2024-46977,0,0,5fe07ded9851f376d26307ff56bac27430f6dca48e690a88893ad782618f46ca,2024-10-08T14:02:04.173000 CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3ef1,2024-09-20T12:30:17.483000 CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000 CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000 @@ -261024,7 +261029,12 @@ CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000 CVE-2024-47001,0,0,2bb4bf673c202add583b3cb6aa8d87ad17a722980665125974c3d12c60f8fe21,2024-09-20T12:30:51.220000 CVE-2024-47003,0,0,c6454df65c14575f310d6ef1594423fd9063d7eb945a40e78647d22752216edb,2024-09-26T18:42:29.383000 +CVE-2024-47007,1,1,ebf24d9d5d7eb4e3627843cf34438622778e3d4cae2ddeb5b64896eb56804258,2024-10-08T17:15:54.210000 +CVE-2024-47008,1,1,e374d8539b2bbdc976e4bcf352e47a94f35b8b6ac8b0545bf758db2d64d641ab,2024-10-08T17:15:54.463000 +CVE-2024-47009,1,1,3fa8b403746a402f37cd1a74cd465554028e8b7557df4efcc337a63f89a833a6,2024-10-08T17:15:54.777000 CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000 +CVE-2024-47010,1,1,f5ca0947571652c4cbc3d17408d6e1b5da6457940a27bf28da5217699db47ff5,2024-10-08T17:15:55.240000 +CVE-2024-47011,1,1,61f0ed66f562f21f262d488feed924a5c71897b5fe275ff8a68f6f036cc519f2,2024-10-08T17:15:55.533000 CVE-2024-4702,0,0,dd020b59844aa3c2b904a852a1e5f578b8784127317756ef97f595c083848ea0,2024-05-15T16:40:19.330000 CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000 CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000 @@ -261089,6 +261099,7 @@ CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f CVE-2024-47159,0,0,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847502,2024-09-24T18:09:50.877000 CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000 CVE-2024-47160,0,0,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000 +CVE-2024-47161,1,1,867b0a5fae8494b99f3973c72157b929d00578c60e0f73402201c424e3ddf7a9,2024-10-08T16:15:12.147000 CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000 CVE-2024-47169,0,0,3d7d577c82be13838843013d038c262ca65c719ce4179d733fb886eea7d8c747,2024-09-30T12:46:20.237000 CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000 @@ -261279,8 +261290,8 @@ CVE-2024-47611,0,0,0f71d2d3efa3e10b2943a85569330dc65bf1be2a06e9f4bba711a7ffd62c7 CVE-2024-47612,0,0,d7d4b9bef3eb832e4635f62133a590b34d92b314497901a1cf4e0bce3640a5d9,2024-10-04T13:50:43.727000 CVE-2024-47614,0,0,5fe3af92e23232b8b36de76214704cdba0d6642b9d9b0303d25099dae284db0c,2024-10-04T13:50:43.727000 CVE-2024-47616,0,0,858e2824018889ba67f8cabdb1c66da573f6d5732aaa656ab4224aec4de643a1,2024-10-04T13:50:43.727000 -CVE-2024-47617,0,1,893202612bb2cbe992d30dda8f1578f8d9ef69378c0888fbaac381961f242589,2024-10-08T14:23:38.597000 -CVE-2024-47618,0,1,68976b00387b110cbd1e20513b5a971bd128fd97cc106896c4afbee985714757,2024-10-08T14:31:08.180000 +CVE-2024-47617,0,0,893202612bb2cbe992d30dda8f1578f8d9ef69378c0888fbaac381961f242589,2024-10-08T14:23:38.597000 +CVE-2024-47618,0,0,68976b00387b110cbd1e20513b5a971bd128fd97cc106896c4afbee985714757,2024-10-08T14:31:08.180000 CVE-2024-47621,0,0,e8b43c6946cd89c946e6f0e8241753ff7dff16af1bee79786407ce0f97d0689b,2024-10-07T17:47:48.410000 CVE-2024-47622,0,0,2e8247e218d8e217900d3be88f2df495717b0afb1aba9ab912a35f4769d9020e,2024-10-07T17:47:48.410000 CVE-2024-47623,0,0,79b2aba30289ad0615e4cf02860068fc1310e91c8af2ef3dbee425a81c5a0707,2024-10-07T17:47:48.410000 @@ -261346,7 +261357,7 @@ CVE-2024-47806,0,0,7da0bb8e7fc9c3b1d389ccbc624a09ba22b5eddfdda079b80b993589f773a CVE-2024-47807,0,0,6f73fcbd170bbcb4214e07d010ddde34567b580923105f0e5418ba9615969635,2024-10-04T13:50:43.727000 CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000 CVE-2024-47814,0,0,f8dd235a57639bef21bfc7a4761f0e828d8ef79df395aec1e49ec750d206ccbf,2024-10-07T22:15:03.657000 -CVE-2024-47817,0,1,a8978e2cff17b63ee249f998983f4eff08d98ca0b11639ba8434d107030ba806,2024-10-08T15:35:24.303000 +CVE-2024-47817,0,0,a8978e2cff17b63ee249f998983f4eff08d98ca0b11639ba8434d107030ba806,2024-10-08T15:35:24.303000 CVE-2024-47818,0,0,598d35845d5c9531ef399cca4570ef2326935f542cd6df2c80239a96fe7c21e2,2024-10-07T22:15:04.037000 CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 @@ -261374,7 +261385,11 @@ CVE-2024-47913,0,0,7dc94fcd4cdeeb6c0d9aba640aeb2f6806a34afc409a57e9cc79ea392fd74 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000 +CVE-2024-47948,1,1,0c05ddd3543b0397550c17cf270ca66a44ee9d6571288cc34a60b0bbd6969554,2024-10-08T16:15:12.453000 +CVE-2024-47949,1,1,af6d353ede769578fd8823e05d2cacadbb08a06f092ba124906d5b8dff382e74,2024-10-08T16:15:12.673000 CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e298,2024-06-04T19:20:49.590000 +CVE-2024-47950,1,1,b25c6a91746a27976b0bed60386e445383e9361eb52bcf89751eaccce780302f,2024-10-08T16:15:12.963000 +CVE-2024-47951,1,1,c8abc81d85003b041925b96886e82fff95d64502ee85ad2aadfc035052064689,2024-10-08T16:15:13.190000 CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000 CVE-2024-47967,0,0,553e2aa1f3371379fa110abe6002e03b2897c2b09916e75eedf48c33d0a0dd8c,2024-10-07T22:15:04.300000 CVE-2024-47968,0,0,955d887e942404b2c819d11f2a644f3211758fa19b1f6da99f75535e28409af9,2024-10-07T22:15:04.480000 @@ -263728,6 +263743,7 @@ CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a CVE-2024-7609,0,0,dd287019708dc32756806d00da78ef364565c2b83873d7c121b6afe97b890f01,2024-09-23T09:15:03.473000 CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000 CVE-2024-7611,0,0,10540ac694e0cb733f0dd15b5e1be30ed97e53e896e1f9f9af3198a202850b56,2024-09-26T16:42:58.157000 +CVE-2024-7612,1,1,28a3c98f1e7809412d44cc84f3c395f7ba938aa6362f4d155133cefdf6a48ce7,2024-10-08T17:15:55.870000 CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 @@ -264171,6 +264187,7 @@ CVE-2024-8211,0,0,5b4e9b28e2816d2f35d4acb0350fc0e49e8657272045690c600cf9f90950ab CVE-2024-8212,0,0,66b37a4b12b90b5cc5591d36a74e4618a857f5189c3555eee7f804c09d611757,2024-08-29T15:53:02.077000 CVE-2024-8213,0,0,f08a4d7a28e82e7ff3d3e2612b90a791fae0345ea2975bd689f142229b49ea1c,2024-08-29T15:51:33.390000 CVE-2024-8214,0,0,e8cd969458fd2099a6e262b11999fd6101bb9998ecb02205d2db626dce16672e,2024-08-29T15:44:45.280000 +CVE-2024-8215,1,1,fdd16ffe4344de21250db079917352fcb27228eef0176050e7e0917746ac7163,2024-10-08T16:15:13.380000 CVE-2024-8216,0,0,78f2e4469e404dfd9cf88b824b412b7d502e32bdaad0782bdef10dbca38d2a4b,2024-08-29T15:41:34.107000 CVE-2024-8217,0,0,3bb02b114c9683c5910dc1625ecdc6a0f8feff4dd9d0f42f36fc7a4e8c780af7,2024-08-29T15:39:43.643000 CVE-2024-8218,0,0,87eba2797b2b8c4fb49de9ac2fc9a1cf44c9da007d2eef048ba8b4f51ffca907,2024-08-29T15:38:10.610000 @@ -264269,7 +264286,7 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3 CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000 CVE-2024-8349,0,0,c5156d79e59cd80a9f637ce807d739d5f9bbbaf01e3f3140af43137a484694a9,2024-10-02T16:50:09.673000 CVE-2024-8350,0,0,c0d58d04c994f4448c198b4f5c8008888aa77e46ed6f78c2de3ffb535372e657,2024-10-02T17:10:47.267000 -CVE-2024-8352,0,1,5a5f68f5ec484916db4444535073a8328ae60240cafa9ec29cea43f16684fb68,2024-10-08T14:17:34.707000 +CVE-2024-8352,0,0,5a5f68f5ec484916db4444535073a8328ae60240cafa9ec29cea43f16684fb68,2024-10-08T14:17:34.707000 CVE-2024-8353,0,0,dcc35089fec5ab9bf27f5fe03523b4e62e247a4803b51263049a1132141d0f36,2024-10-01T14:31:21.430000 CVE-2024-8354,0,0,cccb2137017cf69831f7ecbf78dca654eaa8501214a295601783df83128f0494,2024-10-01T13:15:02.903000 CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000 @@ -264442,6 +264459,7 @@ CVE-2024-8621,0,0,da11617ee187bea39361c3e736358efdd8e000970ca04e836eaac8c5eeb75d CVE-2024-8622,0,0,3dd68829fc11e22f0c21c42ebfb82eece7f179bcaa47d99ccdf324ecdb81f1e2,2024-09-26T14:59:27.770000 CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac79041136,2024-09-26T16:46:28.590000 CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000 +CVE-2024-8626,1,1,864214a6153c9f26d9da12e37b92e3c077849aaa65999fc092f27a208345f840,2024-10-08T17:15:56.240000 CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000 CVE-2024-8629,0,0,261b663c7cfcd787ea083ff9c75f783b204a7baba7d6f01c8db0c578a0339b07,2024-10-08T10:15:05.550000 CVE-2024-8630,0,0,171e223312e05c108be17689ae4f899562cfc4dd591123d96527e97a9f5e9c7e,2024-09-30T12:45:57.823000 @@ -264672,7 +264690,7 @@ CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000 CVE-2024-9068,0,0,01b6ceee3583b3b207ab2eeaf4c2684cbe8e9990b1a6178aa8ad730654493f98,2024-10-02T19:55:50.547000 CVE-2024-9069,0,0,904bb0393747d55de1840c322bbad7ae9d27b3e14c3398a0999f4d003e7be886,2024-10-02T19:37:49.777000 -CVE-2024-9071,0,0,f9ccce463774fc4e139ec7d30a8ab7db7abce266388831263f44fe5606425203,2024-10-04T13:50:43.727000 +CVE-2024-9071,0,1,6a3b91964e28255133515a40cea9164b7d6e82b1113f289183d17f39a22489d5,2024-10-08T16:21:04.180000 CVE-2024-9073,0,0,e1a3718934b1c8aa8070be1e5efd6407ed841e421f9f505c84906bd05d8d4d7e,2024-10-02T19:32:43.047000 CVE-2024-9075,0,0,3b33ab99769a9c852230df8e8b6083f862011911d6a5bcadbdc727ad6f83ab66,2024-09-30T15:27:39.313000 CVE-2024-9076,0,0,8c57021a64484b6edbf7ffabe5a971516c1732fccafbf97d4089a67e7015212f,2024-09-27T16:14:04.977000 @@ -264705,6 +264723,7 @@ CVE-2024-9120,0,0,741803f92bc286dd2201245dc8ffb354e00af92f2ccee9f63963d21a0888db CVE-2024-9121,0,0,eed3fa8b5aa214ac1e28e4851470b90d1a58e721a279141f5883437250a9a8a8,2024-09-26T13:32:02.803000 CVE-2024-9122,0,0,8303a0c1b693e1f9637d76c62abb1e6e7e78f3941c479dc3e2dfaa8a5c17fa42,2024-09-26T13:32:02.803000 CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c661,2024-09-26T13:32:02.803000 +CVE-2024-9124,1,1,e550e2e220e6b46567cd4b31b7442b6340f0c6cacdc88ecc87df9566201a1974,2024-10-08T17:15:56.390000 CVE-2024-9125,0,0,178fee32dc964661b9c65fa72adfd723833bc712092eacf5141ac942799ac520,2024-10-01T14:00:52.460000 CVE-2024-9127,0,0,2a57398f5cef1966c50482248e5fdb86e0eae0bed7d0a3c554fbb9c182ab0a8a,2024-10-01T14:09:26.017000 CVE-2024-9130,0,0,c55ec493e0918bdc6346df7de1c7b50119b1912e830881716d5b60020f91e1cd,2024-10-04T17:18:59.130000 @@ -264719,6 +264738,7 @@ CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a1 CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000 CVE-2024-9161,0,0,64c617d54e278f215ea553b63862cfa05f613731871770da9abd12448d8f4117,2024-10-07T17:48:28.117000 CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000 +CVE-2024-9167,1,1,3cd3df9e444eac441e63bb7b7e65eb1a8a0f7ca49796eef5bdab3caee0243adf,2024-10-08T17:15:56.517000 CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000 CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000 CVE-2024-9172,0,0,034a99897a51af814f0df2d5d72fe86e0f6fbd56311750554470cbdfec5b6edd,2024-10-04T13:50:43.727000 @@ -264734,22 +264754,22 @@ CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5 CVE-2024-9204,0,0,8709d8f31d12084fc2eba23d41169bb9ba345e1a3d3bed7d676463fdbec26c9b,2024-10-04T13:50:43.727000 CVE-2024-9207,0,0,5836b45f1e3b6f3c0b90cd0a57c81bf3d815110bb015ec2874126aceaef92c8b,2024-10-08T11:15:13.870000 CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000 -CVE-2024-9210,0,1,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000 -CVE-2024-9218,0,1,1fe5a0dc5cbc5663db71bfb2b02fdc2baeca2012618f21fc2618b5a68d78cab6,2024-10-08T15:33:58.617000 +CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000 +CVE-2024-9218,0,0,1fe5a0dc5cbc5663db71bfb2b02fdc2baeca2012618f21fc2618b5a68d78cab6,2024-10-08T15:33:58.617000 CVE-2024-9220,0,0,6bac7ddea6b917eb69cb1f74123e8b2dddc4799202193b6b6e16b0128e05e777,2024-10-07T19:19:59.487000 -CVE-2024-9222,0,1,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931ef,2024-10-08T15:34:13.250000 +CVE-2024-9222,0,0,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931ef,2024-10-08T15:34:13.250000 CVE-2024-9224,0,0,1efb870d30ff5afb9078703fdeff1bc29463ebfa0c91ad435c25d902219ffec9,2024-10-07T19:19:38.157000 CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409ea,2024-10-07T20:24:41.420000 CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000 CVE-2024-9237,0,0,6dd007338b51674bd9fefd8518a997a164b381519066f168810e8e196c9bbc64,2024-10-04T13:50:43.727000 CVE-2024-9241,0,0,6c5cc70c23164aeead7a2ffa985d7e69869a7cd0428a8503a9e9f624c0c87b24,2024-10-07T18:51:20.950000 -CVE-2024-9242,0,0,a9c44b4c9508f7017de498ffe453e49c7dc8184d2c772872f479c4093c97dfd4,2024-10-04T13:50:43.727000 +CVE-2024-9242,0,1,2931ce38d642cfa320383051a5a41609f3e037ff0fe51760f16b233825fad051,2024-10-08T16:26:06.147000 CVE-2024-9265,0,0,370ae511e2a3bdf95824ac5c42b3e844c54d5bb7a6631dfac66939ebcd808076,2024-10-07T18:48:15.380000 CVE-2024-9266,0,0,9897e7bd01e8f0fea686bbe0969277eb0e59373ffc16090ed1770b5ca7125283,2024-10-04T13:50:43.727000 CVE-2024-9267,0,0,e1783d6d7b8ba5585243c45fe350fa65068fd1659c19369f548dec592743f878,2024-10-04T13:51:25.567000 CVE-2024-9268,0,0,7e7771d589d5219f5f8e1d4b856d8a4ecc833e195b34661fddc76da01954ef5a,2024-09-27T17:15:14.497000 CVE-2024-9269,0,0,89e3d14dbb396872dee171ef3aa7d49f480ae977e81c830f9aba067690d7384e,2024-10-04T13:51:25.567000 -CVE-2024-9271,0,0,f3c202c0ad500e792ae6ebdab959c950d5bc6954e7743984e8f43b766b6f4279,2024-10-04T13:50:43.727000 +CVE-2024-9271,0,1,66e01cc911285d725adb63f03395bcee28ec66abccf0b01c43138b6af47fb79f,2024-10-08T16:17:29.110000 CVE-2024-9272,0,0,a24b66874e7208e8487d25208cbebeb411ca8d85bf3090e22e1f2bb545069376,2024-10-04T13:51:25.567000 CVE-2024-9273,0,0,d541667891e816199f828382e531f52a986321fd7f85b5856a4bc94c161620a8,2024-09-27T17:15:14.550000 CVE-2024-9274,0,0,2037630015d7981ca2f17f5b5ebd5ed888a888a70c321160893203ffe30592cc,2024-10-04T13:51:25.567000 @@ -264776,7 +264796,7 @@ CVE-2024-9299,0,0,0e06149ad72b9bceed8023fce5d46e4c2d87e230ca1e26b3a70118742de53d CVE-2024-9300,0,0,8cf4fd8be1a68079d9b09593a267df47fb69eec7140ede32d9eeb623680961c8,2024-10-01T13:34:58.760000 CVE-2024-9301,0,0,8bd5a6d252ad4356c723578db918b42e690d26a3308bebd8024d27b2807bcd16,2024-10-07T13:12:48.953000 CVE-2024-9304,0,0,f4e2b697051bb54ba85260a74446cf2ab04e7ed5a9a99551a585b1547839152d,2024-10-04T13:51:25.567000 -CVE-2024-9306,0,0,c8859ae4f31fd9a0006087320a8c378196469fd682a39c8fee84f5eee69b53c2,2024-10-04T13:50:43.727000 +CVE-2024-9306,0,1,ac26ad903bb36889edec0c6ea9a2822945801fec7c4fdd4634c75606f4fc1bfd,2024-10-08T16:25:29.877000 CVE-2024-9313,0,0,8eab8e6a12fcb7dddda62f8c34fd34d547229d6ef4cec2e38f61189642da0e5f,2024-10-04T13:50:43.727000 CVE-2024-9314,0,0,a38936eed4619dcb3327257a1c570731c2950b1dc59439e66bd5a7e1f84786fb,2024-10-07T17:48:28.117000 CVE-2024-9315,0,0,dcae3590349756096f3149f913fcd278d961f7a38fe3ece525d39bf3aa5da14a,2024-10-01T13:33:59.480000 @@ -264796,8 +264816,8 @@ CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c3 CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000 CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000 CVE-2024-9341,0,0,6f06f8dbcaa27a536f49e7e7f0e59eeeae4e39f281abffa47a8e4056674c26ad,2024-10-04T13:51:25.567000 -CVE-2024-9344,0,1,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 -CVE-2024-9345,0,0,f92a961dbc4f0c8ba79f679ac584baeb5523dd310ce30414d422a425c8fd1782,2024-10-04T13:50:43.727000 +CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 +CVE-2024-9345,0,1,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9349,0,0,d93ebf21205a68549107b9eb4027ef2497abf7f2b80843c1be13a041c232bc94,2024-10-04T13:50:43.727000 CVE-2024-9353,0,0,b924aba767123c53d0fe02fb416cc00784b5397574d1ca21e990936e9a08f0ad,2024-10-04T13:50:43.727000 CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000 @@ -264808,6 +264828,9 @@ CVE-2024-9368,0,0,e7a9c605e0cbf9cdb1d319aa8ea22e93a6f5e80855432922ca5e53112d3a4b CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044af6,2024-10-04T13:50:43.727000 CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 +CVE-2024-9379,1,1,55c78e30dfa386c2414282e28f1741a9d6a5ac18382903f5fadf93ad729709f0,2024-10-08T17:15:56.727000 +CVE-2024-9380,1,1,73c2dad6dd4808f2199fea19ecffc8a058cc84ea931e4b639a11fea08563ac3e,2024-10-08T17:15:56.970000 +CVE-2024-9381,1,1,cc48b0c94354735826bd90917d8a4f1bd25f02a01e3be77523bffb72c1d63efa,2024-10-08T17:15:57.183000 CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000 CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 @@ -264831,12 +264854,12 @@ CVE-2024-9417,0,0,3a253693d9f258d17d8c6435732a7f997d65ff8389871880258fe316da3e80 CVE-2024-9421,0,0,9a8bea0e59d0ab668a3cbf6b96506990581414c04a5ce69b672a275a746007d3,2024-10-04T13:50:43.727000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000 -CVE-2024-9435,0,0,dd30383dc280040df042a11097fa6cc76ccaa80c55710936c096ba1dc41cada4,2024-10-04T13:50:43.727000 +CVE-2024-9435,0,1,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000 CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 CVE-2024-9445,0,0,0c93ce7f42df628ab9963b0c4991253722d7526551714beaaf6a06be3b0d53b0,2024-10-04T13:50:43.727000 CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000 -CVE-2024-9460,0,1,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 +CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 CVE-2024-9481,0,0,d47799c935f3894a1eb77a57851e2857614dcde60b18ca54bd2e7df5819c5f83,2024-10-04T13:50:43.727000 CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c7e,2024-10-04T13:50:43.727000 CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000 @@ -264877,3 +264900,6 @@ CVE-2024-9572,0,0,48e7b64a51d97968f2f4ae64bc31c4f07ee5cd17c624939ab5a0a5544a5be0 CVE-2024-9573,0,0,0365b35bdaba39b64be916c871acd7620f8618f0d496a50e2b9489d653229e54,2024-10-07T17:47:48.410000 CVE-2024-9574,0,0,44fd4cb724678a3ca04c6044b9d4dccdbf88a02eef88f0efe932a712dd58a42f,2024-10-07T17:47:48.410000 CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03f5,2024-10-07T17:47:48.410000 +CVE-2024-9620,1,1,0379fb1d0864218f96bae79eafc674616cceed6a1d6b1c374718286d73008692,2024-10-08T17:15:57.357000 +CVE-2024-9621,1,1,93a648e082c2d430d057ddc9e3ada713aaa0a2bb50686998ccd1adc379bccdce,2024-10-08T17:15:57.573000 +CVE-2024-9622,1,1,c63b888866eff50e6fa5697d58bf1e64edc668dfb35cefc907fc3210c84ae5d9,2024-10-08T17:15:57.790000