diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45817.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45817.json new file mode 100644 index 00000000000..a18d0571fcf --- /dev/null +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45817.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2023-45817", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-14T18:15:03.630", + "lastModified": "2024-10-14T18:15:03.630", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-9823. Reason: This candidate is a reservation duplicate of CVE-2024-9823. Notes: All CVE users should reference CVE-2024-9823 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48082.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48082.json new file mode 100644 index 00000000000..c6dffff685e --- /dev/null +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48082.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-48082", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-14T19:15:10.780", + "lastModified": "2024-10-14T19:15:10.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nagios XI before 5.11.3 2024R1 was discovered to improperly handle API keys generation (randomly-generated), allowing attackers to possibly generate the same set of API keys for all users and utilize them to authenticate." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.nagios.com/change-log/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46528.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46528.json new file mode 100644 index 00000000000..fab1f31477a --- /dev/null +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46528.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46528", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-14T18:15:03.847", + "lastModified": "2024-10-14T18:15:03.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference (IDOR) vulnerability in KubeSphere v3.4.1 and v4.1.1 allows low-privileged authenticated attackers to access sensitive resources without proper authorization checks." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://kubesphere.com", + "source": "cve@mitre.org" + }, + { + "url": "https://okankurtulus.com.tr/2024/09/09/idor-vulnerability-in-kubesphere/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46980.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46980.json new file mode 100644 index 00000000000..4afa23372ea --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46980.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-46980", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-14T18:15:03.947", + "lastModified": "2024-10-14T18:15:03.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Enalean/tuleap/commit/dd94a799982cd78ab06142008d745edf9e8fd494", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-9fc9-47h6-82jj", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=dd94a799982cd78ab06142008d745edf9e8fd494", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=39689", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46988.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46988.json new file mode 100644 index 00000000000..14a88172d3a --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46988.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-46988", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-14T18:15:04.173", + "lastModified": "2024-10-14T18:15:04.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-g76g-hc92-96xw", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=39686", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47766.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47766.json new file mode 100644 index 00000000000..c26cdb87c89 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47766.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-47766", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-14T18:15:04.387", + "lastModified": "2024-10-14T18:15:04.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Enalean/tuleap/commit/529d11b70796589767dd27a40ebadf3eaf8f5674", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-qfrh-fv84-93hx", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=529d11b70796589767dd27a40ebadf3eaf8f5674", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=39736", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47767.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47767.json new file mode 100644 index 00000000000..1bf5c3b09f9 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47767.json @@ -0,0 +1,84 @@ +{ + "id": "CVE-2024-47767", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-14T18:15:04.593", + "lastModified": "2024-10-14T18:15:04.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, users might see tracker names they should not have access to. Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Enalean/tuleap/commit/16d9efccb2fad8e10343be2604e94c9058ef2c89", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/commit/e5ce81279766115dc0f126a11d6b5065b5db7eec", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/commit/f89d7093d2c576ad5e2b35a6a096fcdaf563d1df", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j342-v27q-329v", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=16d9efccb2fad8e10343be2604e94c9058ef2c89", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=e5ce81279766115dc0f126a11d6b5065b5db7eec", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=f89d7093d2c576ad5e2b35a6a096fcdaf563d1df", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=39728", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47826.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47826.json new file mode 100644 index 00000000000..909585443af --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47826.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-47826", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-14T18:15:04.800", + "lastModified": "2024-10-14T18:15:04.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "eLabFTW is an open source electronic lab notebook for research labs. A vulnerability in versions prior to 5.1.5 allows an attacker to inject arbitrary HTML tags in the pages: \"experiments.php\" (show mode), \"database.php\" (show mode) or \"search.php\". It works by providing HTML code in the extended search string, which will then be displayed back to the user in the error message. This means that injected HTML will appear in a red \"alert/danger\" box, and be part of an error message. Due to some other security measures, it is not possible to execute arbitrary javascript from this attack. As such, this attack is deemed low impact. Users should upgrade to at least version 5.1.5 to receive a patch. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/elabftw/elabftw/security/advisories/GHSA-cjww-pr9f-4c4w", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.acunetix.com/vulnerabilities/web/html-injection", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47831.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47831.json new file mode 100644 index 00000000000..1f71ed631d6 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47831.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47831", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-14T18:15:05.013", + "lastModified": "2024-10-14T18:15:05.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47885.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47885.json new file mode 100644 index 00000000000..4c9fad2de13 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47885.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-47885", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-14T19:15:10.903", + "lastModified": "2024-10-14T19:15:10.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Astro web framework has a DOM Clobbering gadget in the client-side router starting in version 3.0.0 and prior to version 4.16.1. It can lead to cross-site scripting (XSS) in websites enables Astro's client-side routing and has *stored* attacker-controlled scriptless HTML elements (i.e., `iframe` tags with unsanitized `name` attributes) on the destination pages. This vulnerability can result in cross-site scripting (XSS) attacks on websites that built with Astro that enable the client-side routing with `ViewTransitions` and store the user-inserted scriptless HTML tags without properly sanitizing the `name` attributes on the page. Version 4.16.1 contains a patch for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/withastro/astro/blob/7814a6cad15f06931f963580176d9b38aa7819f2/packages/astro/src/transitions/router.ts#L135-L156", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/withastro/astro/commit/a4ffbfaa5cb460c12bd486fd75e36147f51d3e5e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/withastro/astro/security/advisories/GHSA-m85w-3h95-hcf9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48789.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48789.json new file mode 100644 index 00000000000..927fd8b4ded --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48789.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48789", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-14T18:15:05.230", + "lastModified": "2024-10-14T18:15:05.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in INATRONIC com.inatronic.drivedeck.home 2.6.23 allows a remote attacker to obtain sensitve information via the firmware update process." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drivedeck.de/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.inatronic.drivedeck.home/com.inatronic.drivedeck.home.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48790.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48790.json new file mode 100644 index 00000000000..6b4b215e7c7 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48790.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48790", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-14T18:15:05.323", + "lastModified": "2024-10-14T18:15:05.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in ILIFE com.ilife.home.global 1.8.7 allows a remote attacker to obtain sensitive information via the firmware update process." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ilife.home.global/com.ilife.home.global.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.iliferobot.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48791.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48791.json new file mode 100644 index 00000000000..76233a3215f --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48791.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48791", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-14T18:15:05.420", + "lastModified": "2024-10-14T18:15:05.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Plug n Play Camera com.starvedia.mCamView.zwave 5.5.1 allows a remote attacker to obtain sensitive information via the firmware update process" + } + ], + "metrics": {}, + "references": [ + { + "url": "http://www.starvedia.com/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.starvedia.mCamView.zwave/com.starvedia.mCamView.zwave.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48792.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48792.json new file mode 100644 index 00000000000..6377bd6bd2f --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48792.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48792", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-14T18:15:05.520", + "lastModified": "2024-10-14T18:15:05.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Hideez com.hideez 2.7.8.3 allows a remote attacker to obtain sensitive information via the firmware update process." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.hideez/com.hideez.md", + "source": "cve@mitre.org" + }, + { + "url": "https://hideez.com/en-int", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48793.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48793.json new file mode 100644 index 00000000000..ab0bef636a5 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48793.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48793", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-14T18:15:05.620", + "lastModified": "2024-10-14T18:15:05.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in INATRONIC com.inatronic.bmw 2.7.1 allows a remote attacker to obtain sensitive information via the firmware update process." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drivedeck.de/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.inatronic.bmw/com.inatronic.bmw.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48795.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48795.json new file mode 100644 index 00000000000..5d37c657e4d --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48795.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48795", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-14T18:15:05.717", + "lastModified": "2024-10-14T18:15:05.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Creative Labs Pte Ltd com.creative.apps.xficonnect 2.00.02 allows a remote attacker to obtain sensitive information via the firmware update process." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.creative.apps.xficonnect/com.creative.apps.xficonnect.md", + "source": "cve@mitre.org" + }, + { + "url": "https://hk.creative.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 173cb5b074e..41809f1fe9f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-14T18:00:18.159658+00:00 +2024-10-14T20:00:18.001794+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-14T17:15:13.857000+00:00 +2024-10-14T19:15:10.903000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265509 +265525 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `16` -- [CVE-2023-50780](CVE-2023/CVE-2023-507xx/CVE-2023-50780.json) (`2024-10-14T16:15:03.477`) -- [CVE-2024-41997](CVE-2024/CVE-2024-419xx/CVE-2024-41997.json) (`2024-10-14T16:15:03.640`) -- [CVE-2024-45731](CVE-2024/CVE-2024-457xx/CVE-2024-45731.json) (`2024-10-14T17:15:11.177`) -- [CVE-2024-45732](CVE-2024/CVE-2024-457xx/CVE-2024-45732.json) (`2024-10-14T17:15:11.410`) -- [CVE-2024-45733](CVE-2024/CVE-2024-457xx/CVE-2024-45733.json) (`2024-10-14T17:15:11.657`) -- [CVE-2024-45734](CVE-2024/CVE-2024-457xx/CVE-2024-45734.json) (`2024-10-14T17:15:11.850`) -- [CVE-2024-45735](CVE-2024/CVE-2024-457xx/CVE-2024-45735.json) (`2024-10-14T17:15:12.053`) -- [CVE-2024-45736](CVE-2024/CVE-2024-457xx/CVE-2024-45736.json) (`2024-10-14T17:15:12.253`) -- [CVE-2024-45737](CVE-2024/CVE-2024-457xx/CVE-2024-45737.json) (`2024-10-14T17:15:12.453`) -- [CVE-2024-45738](CVE-2024/CVE-2024-457xx/CVE-2024-45738.json) (`2024-10-14T17:15:12.660`) -- [CVE-2024-45739](CVE-2024/CVE-2024-457xx/CVE-2024-45739.json) (`2024-10-14T17:15:12.860`) -- [CVE-2024-45740](CVE-2024/CVE-2024-457xx/CVE-2024-45740.json) (`2024-10-14T17:15:13.047`) -- [CVE-2024-45741](CVE-2024/CVE-2024-457xx/CVE-2024-45741.json) (`2024-10-14T17:15:13.250`) -- [CVE-2024-46535](CVE-2024/CVE-2024-465xx/CVE-2024-46535.json) (`2024-10-14T17:15:13.440`) -- [CVE-2024-48150](CVE-2024/CVE-2024-481xx/CVE-2024-48150.json) (`2024-10-14T16:15:03.750`) -- [CVE-2024-48153](CVE-2024/CVE-2024-481xx/CVE-2024-48153.json) (`2024-10-14T16:15:03.840`) -- [CVE-2024-48168](CVE-2024/CVE-2024-481xx/CVE-2024-48168.json) (`2024-10-14T17:15:13.520`) -- [CVE-2024-48796](CVE-2024/CVE-2024-487xx/CVE-2024-48796.json) (`2024-10-14T17:15:13.610`) -- [CVE-2024-48797](CVE-2024/CVE-2024-487xx/CVE-2024-48797.json) (`2024-10-14T17:15:13.690`) -- [CVE-2024-48798](CVE-2024/CVE-2024-487xx/CVE-2024-48798.json) (`2024-10-14T17:15:13.770`) -- [CVE-2024-48799](CVE-2024/CVE-2024-487xx/CVE-2024-48799.json) (`2024-10-14T17:15:13.857`) -- [CVE-2024-6762](CVE-2024/CVE-2024-67xx/CVE-2024-6762.json) (`2024-10-14T16:15:03.930`) -- [CVE-2024-6763](CVE-2024/CVE-2024-67xx/CVE-2024-6763.json) (`2024-10-14T16:15:04.163`) -- [CVE-2024-8184](CVE-2024/CVE-2024-81xx/CVE-2024-8184.json) (`2024-10-14T16:15:04.380`) +- [CVE-2023-45817](CVE-2023/CVE-2023-458xx/CVE-2023-45817.json) (`2024-10-14T18:15:03.630`) +- [CVE-2023-48082](CVE-2023/CVE-2023-480xx/CVE-2023-48082.json) (`2024-10-14T19:15:10.780`) +- [CVE-2024-46528](CVE-2024/CVE-2024-465xx/CVE-2024-46528.json) (`2024-10-14T18:15:03.847`) +- [CVE-2024-46980](CVE-2024/CVE-2024-469xx/CVE-2024-46980.json) (`2024-10-14T18:15:03.947`) +- [CVE-2024-46988](CVE-2024/CVE-2024-469xx/CVE-2024-46988.json) (`2024-10-14T18:15:04.173`) +- [CVE-2024-47766](CVE-2024/CVE-2024-477xx/CVE-2024-47766.json) (`2024-10-14T18:15:04.387`) +- [CVE-2024-47767](CVE-2024/CVE-2024-477xx/CVE-2024-47767.json) (`2024-10-14T18:15:04.593`) +- [CVE-2024-47826](CVE-2024/CVE-2024-478xx/CVE-2024-47826.json) (`2024-10-14T18:15:04.800`) +- [CVE-2024-47831](CVE-2024/CVE-2024-478xx/CVE-2024-47831.json) (`2024-10-14T18:15:05.013`) +- [CVE-2024-47885](CVE-2024/CVE-2024-478xx/CVE-2024-47885.json) (`2024-10-14T19:15:10.903`) +- [CVE-2024-48789](CVE-2024/CVE-2024-487xx/CVE-2024-48789.json) (`2024-10-14T18:15:05.230`) +- [CVE-2024-48790](CVE-2024/CVE-2024-487xx/CVE-2024-48790.json) (`2024-10-14T18:15:05.323`) +- [CVE-2024-48791](CVE-2024/CVE-2024-487xx/CVE-2024-48791.json) (`2024-10-14T18:15:05.420`) +- [CVE-2024-48792](CVE-2024/CVE-2024-487xx/CVE-2024-48792.json) (`2024-10-14T18:15:05.520`) +- [CVE-2024-48793](CVE-2024/CVE-2024-487xx/CVE-2024-48793.json) (`2024-10-14T18:15:05.620`) +- [CVE-2024-48795](CVE-2024/CVE-2024-487xx/CVE-2024-48795.json) (`2024-10-14T18:15:05.717`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -- [CVE-2024-9142](CVE-2024/CVE-2024-91xx/CVE-2024-9142.json) (`2024-10-14T16:35:01.033`) -- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-14T16:15:04.653`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 19d1f039263..ae4d1568c53 100644 --- a/_state.csv +++ b/_state.csv @@ -234322,6 +234322,7 @@ CVE-2023-45813,0,0,bef63104b125ee7d94335edc7a351bfa093e8066b493aec55c81f14224285 CVE-2023-45814,0,0,153e88d335fae0dd2da779a7cda4259b69d1854e63e63750b77aae7567b56669,2023-10-30T17:16:15.390000 CVE-2023-45815,0,0,381db8ec2d60cf9d70138a9d8575df9d816b1ef03a4ceb545fa7fdc065d01b8e,2023-10-30T15:31:17.737000 CVE-2023-45816,0,0,fc7c9d52628d81aa06d2095118a7e61badcb7b879ac6aa1f5817abfdccbe4815,2023-11-16T19:38:00.193000 +CVE-2023-45817,1,1,3afb39f08c3ae4757fce309c2cfaaa2be5844e1b60228357103bdb71a16516db,2024-10-14T18:15:03.630000 CVE-2023-45818,0,0,5599bbff76f9abbfbc1d07cce206fcc712b2111034120fc45e2caf24476be2d8,2023-10-26T16:32:24.767000 CVE-2023-45819,0,0,ea1566a0fb1a952b25413ab14d6f21b6c3f9ffe167f5ea428676eeb376e29ff5,2023-10-26T16:30:27.223000 CVE-2023-4582,0,0,7b3abe25df0e96f6cccb8e076f11761c931c1642548ef52dd59cdff69dd28186,2024-09-19T20:35:19.947000 @@ -235903,6 +235904,7 @@ CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09 CVE-2023-4807,0,0,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000 CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000 CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000 +CVE-2023-48082,1,1,96034bbad322c5ad209cad6de9d973e6bc853cef3ec2bc988c9623b055860d55,2024-10-14T19:15:10.780000 CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000 CVE-2023-48085,0,0,ad24d46a2c7d3c2e30b77344324b90919c3f0291c86071ef906b236a00e55787,2023-12-19T18:41:59.183000 CVE-2023-48087,0,0,9729ddec6f348b3a3c6a59a1ffe393a6cd2fd40ee60944b2ab3b3e235f9546cb,2023-11-21T02:42:52.163000 @@ -237793,7 +237795,7 @@ CVE-2023-50777,0,0,df0d9de6b8a0baaf3efff27900ebb62bf75a216074a2617fe71f734fe044c CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edbd60,2023-12-18T19:10:26.547000 CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000 CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000 -CVE-2023-50780,1,1,997ce97484e991ac4325541ba8de0cd441dbe9708d3ca1f82502bec6f09a06cf,2024-10-14T16:15:03.477000 +CVE-2023-50780,0,0,997ce97484e991ac4325541ba8de0cd441dbe9708d3ca1f82502bec6f09a06cf,2024-10-14T16:15:03.477000 CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000 CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000 CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000 @@ -258495,7 +258497,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913 CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000 CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000 -CVE-2024-41997,1,1,feb93180957d926c3a2515af9caa2596a5a805e498da40f2eabee214b9d19034,2024-10-14T16:15:03.640000 +CVE-2024-41997,0,0,feb93180957d926c3a2515af9caa2596a5a805e498da40f2eabee214b9d19034,2024-10-14T16:15:03.640000 CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000 @@ -260700,18 +260702,18 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000 CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000 -CVE-2024-45731,1,1,64f3b076e1ba73dffdf0c460512babb747cd809745bbab294692b67d6edcedab,2024-10-14T17:15:11.177000 -CVE-2024-45732,1,1,4e5072a835dfaa21d6aa1c1f6e7186ca3a2566f20a3b2446f1311cd0df57600a,2024-10-14T17:15:11.410000 -CVE-2024-45733,1,1,26b12148a3d1f105c07f5ec4d630a2627962ac0992e8874fa66efb919b028102,2024-10-14T17:15:11.657000 -CVE-2024-45734,1,1,60f6ad0bd39b15a28edbbec8142bfd65f3dd6893675910d2f5a63b73b1510f5b,2024-10-14T17:15:11.850000 -CVE-2024-45735,1,1,d1f5a904ff4ce2124f50a1bcd5480da3acc1d59dfb44c552ef8762f57a0c1d19,2024-10-14T17:15:12.053000 -CVE-2024-45736,1,1,f78c0cba5a890982b2563a6304d5814ab3232334c5657217d2788ee254c5ee03,2024-10-14T17:15:12.253000 -CVE-2024-45737,1,1,6f1419b68d8eca19f450336f3fec46602dda1e328d1cee2a20bb0db8b44f3328,2024-10-14T17:15:12.453000 -CVE-2024-45738,1,1,5d1da984cf863288c52eaff3ff6108b50ab539a8a304723020a2fd2eac1740c7,2024-10-14T17:15:12.660000 -CVE-2024-45739,1,1,01a43068fb72c181b3efa5733fc8e8be54627ae8a8ac05fdef7e7315f4ba75ed,2024-10-14T17:15:12.860000 +CVE-2024-45731,0,0,64f3b076e1ba73dffdf0c460512babb747cd809745bbab294692b67d6edcedab,2024-10-14T17:15:11.177000 +CVE-2024-45732,0,0,4e5072a835dfaa21d6aa1c1f6e7186ca3a2566f20a3b2446f1311cd0df57600a,2024-10-14T17:15:11.410000 +CVE-2024-45733,0,0,26b12148a3d1f105c07f5ec4d630a2627962ac0992e8874fa66efb919b028102,2024-10-14T17:15:11.657000 +CVE-2024-45734,0,0,60f6ad0bd39b15a28edbbec8142bfd65f3dd6893675910d2f5a63b73b1510f5b,2024-10-14T17:15:11.850000 +CVE-2024-45735,0,0,d1f5a904ff4ce2124f50a1bcd5480da3acc1d59dfb44c552ef8762f57a0c1d19,2024-10-14T17:15:12.053000 +CVE-2024-45736,0,0,f78c0cba5a890982b2563a6304d5814ab3232334c5657217d2788ee254c5ee03,2024-10-14T17:15:12.253000 +CVE-2024-45737,0,0,6f1419b68d8eca19f450336f3fec46602dda1e328d1cee2a20bb0db8b44f3328,2024-10-14T17:15:12.453000 +CVE-2024-45738,0,0,5d1da984cf863288c52eaff3ff6108b50ab539a8a304723020a2fd2eac1740c7,2024-10-14T17:15:12.660000 +CVE-2024-45739,0,0,01a43068fb72c181b3efa5733fc8e8be54627ae8a8ac05fdef7e7315f4ba75ed,2024-10-14T17:15:12.860000 CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 -CVE-2024-45740,1,1,9d225636a0ff30313e82d40744acf0f9d64b6da60e9d3a775ea47d422a68fd76,2024-10-14T17:15:13.047000 -CVE-2024-45741,1,1,2446936f73030d260e2103cbcab9418fbd70c8e0a8e075e9a5a2ac2e64abaf06,2024-10-14T17:15:13.250000 +CVE-2024-45740,0,0,9d225636a0ff30313e82d40744acf0f9d64b6da60e9d3a775ea47d422a68fd76,2024-10-14T17:15:13.047000 +CVE-2024-45741,0,0,2446936f73030d260e2103cbcab9418fbd70c8e0a8e075e9a5a2ac2e64abaf06,2024-10-14T17:15:13.250000 CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000 CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000 CVE-2024-45746,0,0,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000 @@ -260961,9 +260963,10 @@ CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0 CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f9e7,2024-10-04T13:51:25.567000 CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000 CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000 +CVE-2024-46528,1,1,473262510e24cb9558455fa1fe479cce4ec5b58505162ffb48d8cf9e8eef11a5,2024-10-14T18:15:03.847000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 CVE-2024-46532,0,0,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000 -CVE-2024-46535,1,1,236faad90efb2cca4a33db405473a6420ce807a7b23b2f487d5ed937562d9418,2024-10-14T17:15:13.440000 +CVE-2024-46535,0,0,236faad90efb2cca4a33db405473a6420ce807a7b23b2f487d5ed937562d9418,2024-10-14T17:15:13.440000 CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000 @@ -261286,12 +261289,14 @@ CVE-2024-46977,0,0,5fe07ded9851f376d26307ff56bac27430f6dca48e690a88893ad782618f4 CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3ef1,2024-09-20T12:30:17.483000 CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000 CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000 +CVE-2024-46980,1,1,4358f5ee462e64b5eb817d966373f64a4f1673d26f80265233783ad704c84fb6,2024-10-14T18:15:03.947000 CVE-2024-46982,0,0,3d9f669d24afb928408eff7284c81bba148f4b4b0d8de4608d668ca1c9286073,2024-09-20T12:30:51.220000 CVE-2024-46983,0,0,ec8817c062e2bbc441fd890e19bc6c98486be5ca90653148f7abcab9b4d72f76,2024-09-25T17:46:48.927000 CVE-2024-46984,0,0,8ed08a9f75ebb534fe57273695d27a9994db3769e0e07c54bfc9165453c74828,2024-09-25T17:49:17.007000 CVE-2024-46985,0,0,f289d0c2db76b1e0a673c959417469497f1df2bc55eed06198e333b29817e22e,2024-09-27T16:35:25.473000 CVE-2024-46986,0,0,b1e8ecab8ee8344e09d3e8f66f5ec81add204bc763f66591964d8fcd8895b71d,2024-09-24T16:30:55.167000 CVE-2024-46987,0,0,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10371,2024-09-24T16:27:30.457000 +CVE-2024-46988,1,1,2f93d243a7a11386b1f2ea8d381c5e14aa755bbb7c5aa2eeb1f6c8d7965581ed,2024-10-14T18:15:04.173000 CVE-2024-46989,0,0,fa29cba3c1dce457e1dbba7936349383199f9bdd1c6535b099705e0bc06fa139,2024-09-20T12:30:17.483000 CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000 CVE-2024-46990,0,0,a651df2006ba8ce24b06699e6e89ccb4decc32abf73ae7975ae4d0581b357bf8,2024-09-20T12:30:17.483000 @@ -261677,6 +261682,8 @@ CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1 CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000 CVE-2024-47764,0,0,b7aba4870e1203663c4fa6abc120a30e41523fde8e72997d929896b167fbbd57,2024-10-07T17:48:28.117000 CVE-2024-47765,0,0,a65b089ee1fbe8158413dce3d4bb6a7a005d6b3f8045c2a8b0cf8a91ea4da578,2024-10-07T17:48:28.117000 +CVE-2024-47766,1,1,57911a4df8a8f028164d131f0c029fd91ac3b0145f90492c1fa63dd87585d098,2024-10-14T18:15:04.387000 +CVE-2024-47767,1,1,f79a911452d49bd371c9f3a339c89ed6f90934ea80af345395502aaf28c03395,2024-10-14T18:15:04.593000 CVE-2024-47768,0,0,f403a0de6ad99844ca2cbb93a58b82a840eb5e868f9e8f1d631547e4814a24ea,2024-10-07T17:48:28.117000 CVE-2024-47769,0,0,89e2e7df1b1b68f8d9732f48769437016eda3284d5a81e91e9482d5022e6eda8,2024-10-07T17:48:28.117000 CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737be4,2024-06-10T17:16:34.070000 @@ -261706,9 +261713,11 @@ CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000 CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000 +CVE-2024-47826,1,1,83afdde2058bfb9fc96f1a52c30a662ccb9fb41bc80740663697467d19d9d5be,2024-10-14T18:15:04.800000 CVE-2024-47828,0,0,20037a2831594572185910fec3fa22739c3e04d0ddf5a1652087e64bcac4c0e3,2024-10-10T12:51:56.987000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 CVE-2024-47830,0,0,078fd3f57c1e124fe25812fa092e081898b54bb5455f5ac15a9ac7b0028bfea1,2024-10-11T15:15:05.613000 +CVE-2024-47831,1,1,dc0d5b8907a903b7c42dba23600b340d59f3c682425d0c124126175bff3792ec,2024-10-14T18:15:05.013000 CVE-2024-47832,0,0,2db718b13b3751bc3ef92e2930bbfe31f27f0a24beb6f2f6f579c1ed94f36d1a,2024-10-10T12:51:56.987000 CVE-2024-47833,0,0,c198216a715effb211db9429fe892ad76ab094f250667361ca1b8e1df62c0332,2024-10-10T12:51:56.987000 CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 @@ -261735,6 +261744,7 @@ CVE-2024-47875,0,0,078af0f210e8e30655ff63e30537d1f8dba962d087e301c359afca4f246d0 CVE-2024-47877,0,0,7531e66ff0397e313d2f97552017c7592a6d7da9498d96e0b29b6c2d6bd21145,2024-10-11T17:15:04.450000 CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 CVE-2024-47884,0,0,8ad0ffb865c1d8a187664122ed1b8bd87a0aaa3d88b8a0a88659a06bdd059aed,2024-10-11T20:15:04.993000 +CVE-2024-47885,1,1,bdbb62e5df9db89022a0d9d9152e29bbacf763b43b550618bca00b5a48f9fc68,2024-10-14T19:15:10.903000 CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000 CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 @@ -261789,10 +261799,10 @@ CVE-2024-48120,0,0,c62e5be74f0d961b12e910dcf29c3c75e41c7914cfe890c3077ff6c43d8c8 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000 -CVE-2024-48150,1,1,19f1376e02c9f64643f71be368bb63d9dab50859eebf81f919523183a5c16d63,2024-10-14T16:15:03.750000 -CVE-2024-48153,1,1,3cfd46a773704ab0a351a2b6ce72427b77a3ce4f0b94a6c1ddac6ddeed3918df,2024-10-14T16:15:03.840000 +CVE-2024-48150,0,0,19f1376e02c9f64643f71be368bb63d9dab50859eebf81f919523183a5c16d63,2024-10-14T16:15:03.750000 +CVE-2024-48153,0,0,3cfd46a773704ab0a351a2b6ce72427b77a3ce4f0b94a6c1ddac6ddeed3918df,2024-10-14T16:15:03.840000 CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000 -CVE-2024-48168,1,1,a09a7c75736c5a01c0400c19554fc92c3c8fd8dbfe7d3f38b5cf9ce5962080e1,2024-10-14T17:15:13.520000 +CVE-2024-48168,0,0,a09a7c75736c5a01c0400c19554fc92c3c8fd8dbfe7d3f38b5cf9ce5962080e1,2024-10-14T17:15:13.520000 CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000 CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 @@ -261862,11 +261872,17 @@ CVE-2024-48784,0,0,413a91fa2c4a61a33f7467c2f5b8058034c18bbf6bb09d8c92a1fe8bc8383 CVE-2024-48786,0,0,c860c3ab3f85be5742131f9576a41113cc68380c4baa10b74833d50923537b25,2024-10-11T20:15:06.277000 CVE-2024-48787,0,0,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000 CVE-2024-48788,0,0,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000 +CVE-2024-48789,1,1,f753d881cee613229d5c0d3513312e6c1c29bd865f11c631f5344baf63c91d31,2024-10-14T18:15:05.230000 CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000 -CVE-2024-48796,1,1,7879f1aa8bab9a14d016d74ec58af4d0baf4610a66493dc7e696e44b7ca1bc91,2024-10-14T17:15:13.610000 -CVE-2024-48797,1,1,a42b610d7f725207e7958ca937816046c91c2ceb35bdd5acafea0351793590bf,2024-10-14T17:15:13.690000 -CVE-2024-48798,1,1,f8e79fb9df797037d2a83f075374be88a20179dcf01384173fccd3a6fc8fb0f0,2024-10-14T17:15:13.770000 -CVE-2024-48799,1,1,a3b8aa531325723a40f231e31c933f25fd306c627d1f496d1ce1b3883fd1201f,2024-10-14T17:15:13.857000 +CVE-2024-48790,1,1,f3b14bd2d7bf479628eda81581339ad913ebd0b311d16b7ddbbe1576a0ef3128,2024-10-14T18:15:05.323000 +CVE-2024-48791,1,1,9ad30c1d188d7db43e25626cfed907eb29cd4a02dd903861370ef046be560a27,2024-10-14T18:15:05.420000 +CVE-2024-48792,1,1,b0a9215b342225ce7704838f7f4c2596ad3588455e6f3d7e3207337c7025ccac,2024-10-14T18:15:05.520000 +CVE-2024-48793,1,1,3470fd35bb5bb600bfdc8ad59a815c1314223a35d16eb72c69bb7a341d166458,2024-10-14T18:15:05.620000 +CVE-2024-48795,1,1,f11405ce0a78a5199503fe7a48897f37ce37a249acf7cf38f391d3859ee7938c,2024-10-14T18:15:05.717000 +CVE-2024-48796,0,0,7879f1aa8bab9a14d016d74ec58af4d0baf4610a66493dc7e696e44b7ca1bc91,2024-10-14T17:15:13.610000 +CVE-2024-48797,0,0,a42b610d7f725207e7958ca937816046c91c2ceb35bdd5acafea0351793590bf,2024-10-14T17:15:13.690000 +CVE-2024-48798,0,0,f8e79fb9df797037d2a83f075374be88a20179dcf01384173fccd3a6fc8fb0f0,2024-10-14T17:15:13.770000 +CVE-2024-48799,0,0,a3b8aa531325723a40f231e31c933f25fd306c627d1f496d1ce1b3883fd1201f,2024-10-14T17:15:13.857000 CVE-2024-4881,0,0,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000 CVE-2024-48813,0,0,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 @@ -263514,8 +263530,8 @@ CVE-2024-6758,0,0,eba9276bccb667ada2a9e6cadd00c35035c829f464cb8fc5793fac965ac82f CVE-2024-6759,0,0,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000 CVE-2024-6760,0,0,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000 CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000 -CVE-2024-6762,1,1,053cd62e78397cb397f65a69e92749587baeeba6b06a23b25c2cde3a3e8e2412,2024-10-14T16:15:03.930000 -CVE-2024-6763,1,1,2e3832a111ef9e1563172f5ed131b6afed3503a9ae140bbd5550f3cc5f769987,2024-10-14T16:15:04.163000 +CVE-2024-6762,0,0,053cd62e78397cb397f65a69e92749587baeeba6b06a23b25c2cde3a3e8e2412,2024-10-14T16:15:03.930000 +CVE-2024-6763,0,0,2e3832a111ef9e1563172f5ed131b6afed3503a9ae140bbd5550f3cc5f769987,2024-10-14T16:15:04.163000 CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000 CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000 CVE-2024-6767,0,0,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000 @@ -264611,7 +264627,7 @@ CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 -CVE-2024-8184,1,1,8c163146049144fdada87d362eb75f578744ca06a2fab167b1d676e981e40114,2024-10-14T16:15:04.380000 +CVE-2024-8184,0,0,8c163146049144fdada87d362eb75f578744ca06a2fab167b1d676e981e40114,2024-10-14T16:15:04.380000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000 CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000 @@ -265205,7 +265221,7 @@ CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a CVE-2024-9137,0,0,9065b9986e350cb1955cfbec462f81d3d3a9a0cca2dc3d030de4540532f9abca,2024-10-14T09:15:04.403000 CVE-2024-9139,0,0,09eb3f13c3e60192800512c2b76c94742b9d9d7d743e90f5437ddfac8bcedf34,2024-10-14T09:15:04.693000 CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000 -CVE-2024-9142,0,1,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000 +CVE-2024-9142,0,0,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000 CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000 CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000 CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 @@ -265479,7 +265495,7 @@ CVE-2024-9817,0,0,aa4071cf5ce97bf162c1cca4a7f07d25d51157e1698481fe4534c2979d4a7e CVE-2024-9818,0,0,0b4965dc9157be1c79882236820da1fc50a01232d912ae1b867d598f551f291b,2024-10-10T23:15:03.680000 CVE-2024-9821,0,0,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000 CVE-2024-9822,0,0,31c5fa39db5fe31c5cd7802827b5c169adace5e7cdcfe1c09d420a2a1af019c6,2024-10-11T03:15:10.967000 -CVE-2024-9823,0,1,797ad589a845f20d3c764555cd88dd01739b03d274a2154c13310668db597c99,2024-10-14T16:15:04.653000 +CVE-2024-9823,0,0,797ad589a845f20d3c764555cd88dd01739b03d274a2154c13310668db597c99,2024-10-14T16:15:04.653000 CVE-2024-9824,0,0,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000 CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000 CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000