Auto-Update: 2024-09-19T20:00:17.597789+00:00

This commit is contained in:
cad-safe-bot 2024-09-19 20:03:16 +00:00
parent cb37cfe2ff
commit 1aa41e63c7
59 changed files with 3085 additions and 434 deletions

View File

@ -2,10 +2,10 @@
"id": "CVE-2013-0643",
"sourceIdentifier": "psirt@adobe.com",
"published": "2013-02-27T00:55:01.017",
"lastModified": "2024-09-18T19:35:01.410",
"vulnStatus": "Modified",
"lastModified": "2024-09-19T19:48:10.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\r\n\r\n'Flash Player 11.6.602.168 and earlier versions for Windows \r\nFlash Player 11.6.602.167 and earlier versions for Macintosh\r\nFlash Player 11.2.202.270 and earlier for Linux'",
"evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\n\n'Flash Player 11.6.602.168 and earlier versions for Windows \nFlash Player 11.6.602.167 and earlier versions for Macintosh\nFlash Player 11.2.202.270 and earlier for Linux'",
"cisaExploitAdd": "2024-09-17",
"cisaActionDue": "2024-10-08",
"cisaRequiredAction": "The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",
@ -22,6 +22,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -76,7 +96,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "NVD-CWE-noinfo"
}
]
},
@ -102,16 +122,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3",
"versionEndExcluding": "10.3.183.67",
"matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57"
"matchCriteriaId": "1CCB5060-546D-4023-8E02-E330E9DF33A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.6",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.6.602.171",
"matchCriteriaId": "429D84D8-F0CF-4532-B0C8-EF3B4700F191"
"matchCriteriaId": "73216ADC-DAB5-4679-835E-0601EBC9E828"
}
]
},
@ -143,16 +162,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3",
"versionEndExcluding": "10.3.183.67",
"matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.2",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.2.202.273",
"matchCriteriaId": "BB9395A3-F409-45B2-B877-5D4F5DD20F72"
"matchCriteriaId": "0FE3C70F-1D0D-4FB8-A747-4F3594A888DF"
}
]
},
@ -168,6 +180,81 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
"matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
}
]
}
]
}
],
"references": [
@ -175,24 +262,21 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
@ -206,6 +290,7 @@
"url": "http://www.adobe.com/support/security/bulletins/apsb13-08.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-0648",
"sourceIdentifier": "psirt@adobe.com",
"published": "2013-02-27T00:55:01.160",
"lastModified": "2024-09-18T19:35:02.327",
"vulnStatus": "Modified",
"lastModified": "2024-09-19T19:51:57.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\r\n\r\n'Flash Player 11.6.602.168 and earlier versions for Windows \r\nFlash Player 11.6.602.167 and earlier versions for Macintosh\r\nFlash Player 11.2.202.270 and earlier for Linux'",
"cisaExploitAdd": "2024-09-17",
@ -22,6 +22,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -92,16 +112,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3",
"versionEndExcluding": "10.3.183.67",
"matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57"
"matchCriteriaId": "1CCB5060-546D-4023-8E02-E330E9DF33A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.6",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.6.602.171",
"matchCriteriaId": "429D84D8-F0CF-4532-B0C8-EF3B4700F191"
"matchCriteriaId": "73216ADC-DAB5-4679-835E-0601EBC9E828"
}
]
},
@ -133,16 +152,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3",
"versionEndExcluding": "10.3.183.67",
"matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.2",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.2.202.273",
"matchCriteriaId": "BB9395A3-F409-45B2-B877-5D4F5DD20F72"
"matchCriteriaId": "0FE3C70F-1D0D-4FB8-A747-4F3594A888DF"
}
]
},
@ -158,6 +170,81 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
"matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
]
}
]
}
],
"references": [
@ -165,24 +252,21 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
@ -196,6 +280,7 @@
"url": "http://www.adobe.com/support/security/bulletins/apsb13-08.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-0497",
"sourceIdentifier": "psirt@adobe.com",
"published": "2014-02-05T05:15:29.897",
"lastModified": "2024-09-18T19:35:02.543",
"vulnStatus": "Modified",
"lastModified": "2024-09-19T19:56:17.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-17",
"cisaActionDue": "2024-10-08",
@ -21,6 +21,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -75,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-191"
}
]
},
@ -101,9 +121,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.2.202.336",
"matchCriteriaId": "E069816A-A585-4546-B344-6E7831B8749C"
"matchCriteriaId": "0FFB96CE-2C20-471A-BA61-36909F36400F"
}
]
},
@ -130,16 +149,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.7.700.261",
"matchCriteriaId": "73692E91-A04B-4F58-8AC4-B635E3848540"
"matchCriteriaId": "D00F33E5-B1D9-4D70-9BA7-994BB84A423D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.8",
"versionStartIncluding": "11.8.800.94",
"versionEndExcluding": "12.0.0.44",
"matchCriteriaId": "0CD2FFF0-5A3C-4593-A6F5-9C6941747468"
"matchCriteriaId": "53CBCC27-0B1B-4DAA-990E-A724720C3C58"
}
]
},
@ -160,6 +178,134 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "32.0.1700.107",
"matchCriteriaId": "D956DCBD-B205-4A80-A8C5-82C186F50DEF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
}
]
}
]
}
],
"references": [
@ -167,13 +313,14 @@
"url": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html",
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
"Release Notes"
]
},
{
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-04.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -182,24 +329,21 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
@ -213,6 +357,7 @@
"url": "http://secunia.com/advisories/56437",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -220,6 +365,7 @@
"url": "http://secunia.com/advisories/56737",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -227,6 +373,7 @@
"url": "http://secunia.com/advisories/56780",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -234,6 +381,7 @@
"url": "http://secunia.com/advisories/56799",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -241,6 +389,7 @@
"url": "http://secunia.com/advisories/56839",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -263,6 +412,7 @@
"url": "http://www.securityfocus.com/bid/65327",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -271,6 +421,7 @@
"url": "http://www.securitytracker.com/id/1029715",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-0502",
"sourceIdentifier": "psirt@adobe.com",
"published": "2014-02-21T05:07:00.017",
"lastModified": "2024-09-18T19:35:03.393",
"vulnStatus": "Modified",
"lastModified": "2024-09-19T19:53:44.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-17",
"cisaActionDue": "2024-10-08",
@ -21,6 +21,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -75,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-415"
}
]
},
@ -101,23 +121,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.7.700.269",
"matchCriteriaId": "6C9AF7F7-0F10-49B7-B488-F0E12692FCD0"
"matchCriteriaId": "CE22099C-BC63-499E-A515-EFFEA7F5EEFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.8",
"versionEndExcluding": "11.8.800.175",
"matchCriteriaId": "EF750BDF-A76B-4967-8BD4-9B6F3336156D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.9",
"versionStartIncluding": "11.8.800.94",
"versionEndExcluding": "12.0.0.70",
"matchCriteriaId": "2ECFF685-8C36-4804-9815-E5A9484D4253"
"matchCriteriaId": "5695E310-F309-4E89-B0B2-A43E922BEF26"
}
]
},
@ -127,8 +139,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
},
{
"vulnerable": false,
@ -165,9 +177,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.2.202.341",
"matchCriteriaId": "EBCC4F71-82B0-41D9-B184-96652760AAE5"
"matchCriteriaId": "1AF78710-B045-41A8-A080-FA287D72BB8F"
}
]
},
@ -177,8 +188,36 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.0.1628",
"matchCriteriaId": "6ED74F32-A4F4-424C-B9E7-C54F3DAFFDE6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
@ -192,9 +231,73 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.0.1628",
"matchCriteriaId": "6ED74F32-A4F4-424C-B9E7-C54F3DAFFDE6"
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
]
}
@ -206,6 +309,7 @@
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -214,24 +318,21 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html",
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
@ -252,6 +353,7 @@
"url": "http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/",
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
@ -259,6 +361,7 @@
"url": "https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html",
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1069",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-06-12T14:29:04.337",
"lastModified": "2024-09-19T01:00:03.107",
"vulnStatus": "Modified",
"lastModified": "2024-09-19T19:58:01.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-18",
"cisaActionDue": "2024-10-09",
@ -22,8 +22,8 @@
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -40,15 +40,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -121,54 +119,54 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37097C39-D588-4018-B94D-5EB87B1E3D5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*",
"matchCriteriaId": "530DF8C9-467C-4F4F-9FCA-CDD934BADF3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3156",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-26T21:15:12.987",
"lastModified": "2024-09-18T17:15:13.843",
"vulnStatus": "Modified",
"lastModified": "2024-09-19T19:58:23.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-06",
"cisaActionDue": "2022-04-27",
@ -760,7 +760,11 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-30464",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.080",
"lastModified": "2024-09-18T21:15:13.080",
"lastModified": "2024-09-19T19:35:01.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack."
},
{
"lang": "es",
"value": "CoreDNS hasta la versi\u00f3n 1.10.1 permite a los atacantes lograr envenenamiento de cach\u00e9 DNS e inyectar respuestas falsas a trav\u00e9s de un ataque de cumplea\u00f1os."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40654",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-10-08T04:15:57.893",
"lastModified": "2023-10-11T19:08:04.547",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T18:35:02.187",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43983",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-05T20:15:13.250",
"lastModified": "2023-10-07T02:52:28.870",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:04.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44833",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-05T16:15:11.807",
"lastModified": "2023-10-07T03:17:11.587",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:05.797",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44834",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-05T16:15:11.863",
"lastModified": "2023-10-07T03:17:41.593",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:06.803",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44835",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-05T16:15:11.917",
"lastModified": "2023-10-07T03:17:27.913",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:07.573",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44836",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-05T16:15:11.973",
"lastModified": "2023-10-06T15:20:09.927",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:08.333",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44837",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-05T16:15:12.020",
"lastModified": "2023-10-06T15:19:36.920",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:09.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45282",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-06T19:15:12.950",
"lastModified": "2023-11-02T01:23:35.490",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:10.307",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-1321"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45303",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-06T19:15:13.040",
"lastModified": "2023-10-12T18:10:31.853",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:11.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "CWE-74"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45370",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T06:15:10.470",
"lastModified": "2023-10-12T16:05:00.760",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T18:35:05.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45372",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T06:15:10.607",
"lastModified": "2023-10-12T16:04:34.703",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T18:35:05.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45374",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T06:15:10.723",
"lastModified": "2023-10-12T16:06:05.330",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T18:35:06.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4585",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-09-11T09:15:09.797",
"lastModified": "2023-12-21T00:57:28.747",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T19:35:12.583",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0220",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2024-02-22T11:15:08.840",
"lastModified": "2024-05-27T08:15:09.070",
"lastModified": "2024-09-19T18:15:05.000",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,16 +46,12 @@
"description": [
{
"lang": "en",
"value": "CWE-311"
"value": "CWE-1240"
},
{
"lang": "en",
"value": "CWE-319"
},
{
"lang": "en",
"value": "CWE-326"
},
{
"lang": "en",
"value": "CWE-94"

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-0335",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2024-04-03T19:15:43.743",
"lastModified": "2024-04-04T12:48:41.700",
"lastModified": "2024-09-19T18:15:05.150",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may \nbe used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)\n\nThis issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2.\n\n"
"value": "ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may \nbe used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)\n\n\nThis issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-23"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-25673",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T19:15:24.093",
"lastModified": "2024-09-19T19:15:24.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Couchbase Server 7.6.x before 7.6.2, 7.2.x before 7.2.6, and all earlier versions allows HTTP Host header injection."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
"source": "cve@mitre.org"
},
{
"url": "https://forums.couchbase.com/tags/security",
"source": "cve@mitre.org"
},
{
"url": "https://www.couchbase.com/alerts/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27348",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-22T14:15:07.420",
"lastModified": "2024-09-19T01:00:03.120",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T19:55:24.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-18",
"cisaActionDue": "2024-10-09",
@ -21,6 +21,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -44,6 +64,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -55,18 +85,75 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:hugegraph:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "1.3.0",
"matchCriteriaId": "5DDD7AA3-3439-48D7-B24B-1D9D31B284BD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:oracle:jdk:8:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA29D0B-F022-4711-ABE9-4221E57FAF17"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:oracle:jdk:11:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD5164A-75F9-46AC-A7D4-0323A4A2D915"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:oracle:jre:8:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A9D4C2-98A6-43F0-A925-8A84AB3040AA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:oracle:jre:11:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5E4F97-F7D9-42CE-8A7A-902B4768C60F"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/22/3",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://hugegraph.apache.org/docs/config/config-authentication/#configure-user-authentication",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Product"
]
},
{
"url": "https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-31414",
"sourceIdentifier": "CybersecurityCOE@eaton.com",
"published": "2024-09-13T17:15:11.707",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:48:25.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Eaton Foreseer software provides users the capability to customize the dashboard in WebView pages. However, the input fields for this feature in the Eaton Foreseer software lacked proper input sanitization on the server-side, which could lead to injection and execution of malicious scripts when abused by bad actors."
},
{
"lang": "es",
"value": "El software Eaton Foreseer ofrece a los usuarios la posibilidad de personalizar el panel de control en las p\u00e1ginas WebView. Sin embargo, los campos de entrada para esta funci\u00f3n en el software Eaton Foreseer carec\u00edan de una desinfecci\u00f3n de entrada adecuada en el lado del servidor, lo que pod\u00eda provocar la inyecci\u00f3n y ejecuci\u00f3n de scripts maliciosos cuando los actores maliciosos los utilizaban de forma abusiva."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.8.600",
"matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89"
}
]
}
]
}
],
"references": [
{
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
"source": "CybersecurityCOE@eaton.com"
"source": "CybersecurityCOE@eaton.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-31415",
"sourceIdentifier": "CybersecurityCOE@eaton.com",
"published": "2024-09-13T17:15:11.907",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:50:27.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Eaton Foreseer software provides the feasibility for the user to configure external servers for multiple purposes such as network management, user management, etc. The software uses encryption to store these configurations securely on the host machine. However, the keys used for this encryption were insecurely stored, which could be abused to possibly change or remove the server configuration."
},
{
"lang": "es",
"value": "El software Eaton Foreseer ofrece al usuario la posibilidad de configurar servidores externos para m\u00faltiples prop\u00f3sitos, como administraci\u00f3n de red, administraci\u00f3n de usuarios, etc. El software utiliza cifrado para almacenar estas configuraciones de forma segura en la m\u00e1quina host. Sin embargo, las claves utilizadas para este cifrado se almacenaron de forma insegura, lo que podr\u00eda utilizarse de forma indebida para cambiar o eliminar la configuraci\u00f3n del servidor."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
},
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@ -47,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.8.600",
"matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89"
}
]
}
]
}
],
"references": [
{
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
"source": "CybersecurityCOE@eaton.com"
"source": "CybersecurityCOE@eaton.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-31416",
"sourceIdentifier": "CybersecurityCOE@eaton.com",
"published": "2024-09-13T17:15:12.090",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T19:06:59.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow."
},
{
"lang": "es",
"value": "El software Eaton Foreseer ofrece m\u00faltiples campos de entrada personalizables para que los usuarios configuren par\u00e1metros en la herramienta, como alarmas, informes, etc. Algunos de estos campos de entrada no verificaban la longitud y los l\u00edmites del valor ingresado. Si un actor malintencionado aprovecha esta falla de seguridad, puede resultar en un consumo excesivo de memoria o un desbordamiento de n\u00fameros enteros."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
},
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.8.600",
"matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89"
}
]
}
]
}
],
"references": [
{
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
"source": "CybersecurityCOE@eaton.com"
"source": "CybersecurityCOE@eaton.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-33109",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T19:15:24.170",
"lastModified": "2024-09-19T19:15:24.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal in the web interface of the Tiptel IP 286 with firmware version 2.61.13.10 allows attackers to overwrite arbitrary files on the phone via the Ringtone upload function."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "http://tiptel.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.bdosecurity.de/en-gb/advisories/cve-2024-33109",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34343",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-05T21:15:38.257",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T19:57:52.007",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nuxt:nuxt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.12.4",
"matchCriteriaId": "BB92C785-9011-406E-A048-9FEC653045EC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nuxt/nuxt/security/advisories/GHSA-vf6r-87q4-2vjf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40125",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T19:15:24.350",
"lastModified": "2024-09-19T19:15:24.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the Media Manager function of Closed-Loop Technology CLESS Server v4.5.2 allows attackers to execute arbitrary code via uploading a crafted PHP file to the upload endpoint."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/brendontkl/My-CVEs/tree/main/CVE-2024-40125",
"source": "cve@mitre.org"
},
{
"url": "https://www.closed-loop.biz/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-40568",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.390",
"lastModified": "2024-09-18T21:15:13.390",
"lastModified": "2024-09-19T19:35:13.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in btstack mesh commit before v.864e2f2b6b7878c8fab3cf5ee84ae566e3380c58 allows a remote attacker to execute arbitrary code via the pb_adv_handle_tranaction_cont function in the src/mesh/pb_adv.c component"
},
{
"lang": "es",
"value": "La vulnerabilidad de desbordamiento de b\u00fafer en el commit de btstack mesh anterior a v.864e2f2b6b7878c8fab3cf5ee84ae566e3380c58 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n pb_adv_handle_tranaction_cont en el componente src/mesh/pb_adv.c"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xiaobye-ctf/My-CVE/tree/main/BTstack/CVE-2024-40568",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45159",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-05T19:15:13.150",
"lastModified": "2024-09-06T12:08:04.550",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T18:26:24.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,82 @@
"value": "Se descubri\u00f3 un problema en Mbed TLS 3.x antes de la versi\u00f3n 3.6.1. Con TLS 1.3, cuando un servidor habilita la autenticaci\u00f3n opcional del cliente, si el certificado proporcionado por el cliente no tiene los valores adecuados en las extensiones if keyUsage o extKeyUsage, el valor de retorno de mbedtls_ssl_get_verify_result() tendr\u00eda incorrectamente los bits MBEDTLS_X509_BADCERT_KEY_USAGE y MBEDTLS_X509_BADCERT_KEY_USAGE limpios. Como resultado, un atacante que tuviera un certificado v\u00e1lido para usos distintos a la autenticaci\u00f3n de cliente TLS podr\u00eda usarlo de todos modos para la autenticaci\u00f3n de cliente TLS. Solo los servidores TLS 1.3 se vieron afectados, y solo con autenticaci\u00f3n opcional (con la autenticaci\u00f3n requerida, el protocolo de enlace se cancelar\u00eda con una alerta fatal)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.2.0",
"versionEndExcluding": "3.6.1",
"matchCriteriaId": "21841FE2-FFD3-4EF1-9257-7A31C00B14C2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Mbed-TLS/mbedtls/releases/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45400",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-06T00:15:02.507",
"lastModified": "2024-09-06T12:08:04.550",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T18:04:36.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mlewand:open_link:*:*:*:*:*:ckeditor:*:*",
"versionEndExcluding": "1.0.7",
"matchCriteriaId": "B3A98245-1561-49F7-9C6B-2527AEFCABE2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mlewand/ckeditor-plugin-openlink/commit/402391fdd4d9cfd079031372f9caebbf54993ffb",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/mlewand/ckeditor-plugin-openlink/security/advisories/GHSA-qj47-6x6q-m3c9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45401",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-05T18:15:06.227",
"lastModified": "2024-09-06T12:08:21.290",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T18:12:52.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stripe:stripe-cli:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.11.1",
"versionEndExcluding": "1.21.3",
"matchCriteriaId": "F43365D4-FD7D-470A-9948-88FC4B3DE261"
}
]
}
]
}
],
"references": [
{
"url": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/stripe/stripe-cli/security/advisories/GHSA-fv4g-gwpj-74gr",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45455",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-15T08:15:13.150",
"lastModified": "2024-09-16T15:30:28.733",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:51:15.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.5.14",
"matchCriteriaId": "71245A69-8CD3-456C-98B2-99EC31276371"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-5-13-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45456",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-15T08:15:13.350",
"lastModified": "2024-09-16T15:30:28.733",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:38:57.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.5.14",
"matchCriteriaId": "71245A69-8CD3-456C-98B2-99EC31276371"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-5-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45458",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-15T08:15:13.763",
"lastModified": "2024-09-16T15:30:28.733",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:55:46.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.9.14",
"matchCriteriaId": "2CD91243-6FF0-44AA-AE85-B1C4B6604A9F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45620",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T22:15:05.743",
"lastModified": "2024-09-12T19:38:16.130",
"lastModified": "2024-09-19T19:21:38.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
"exploitabilityScore": 0.5,
"impactScore": 3.4
},
{
"source": "secalert@redhat.com",
@ -96,6 +96,22 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.26.0",
"matchCriteriaId": "3220C607-8358-4E23-AB07-11E55FD2727F"
}
]
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4554",
"sourceIdentifier": "security@opentext.com",
"published": "2024-08-28T07:15:09.330",
"lastModified": "2024-09-12T15:01:12.217",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-19T18:15:10.433",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-79"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-46373",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.497",
"lastModified": "2024-09-18T21:15:13.497",
"lastModified": "2024-09-19T19:35:14.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dedecms V5.7.115 contains an arbitrary code execution via file upload vulnerability in the backend."
},
{
"lang": "es",
"value": "Dedecms V5.7.115 contiene una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de carga de archivos en el backend."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46373.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-46374",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T21:15:13.543",
"lastModified": "2024-09-18T21:15:13.543",
"lastModified": "2024-09-19T19:35:15.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Best House Rental Management System 1.0 contains a SQL injection vulnerability in the delete_category() function of the file rental/admin_class.php."
},
{
"lang": "es",
"value": "Best House Rental Management System 1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n delete_category() del archivo rental/admin_class.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46374.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46681",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-13T06:15:12.710",
"lastModified": "2024-09-13T14:06:04.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:10:49.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,100 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pktgen: uso de cpus_read_lock() en pg_net_init() He visto que WARN_ON(smp_processor_id() != cpu) se activa en pktgen_thread_worker() durante las pruebas. Debemos usar cpus_read_lock()/cpus_read_unlock() alrededor del bucle for_each_online_cpu(cpu). Mientras estamos en ello, use WARN_ON_ONCE() para evitar una posible inundaci\u00f3n de syslog."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.12",
"versionEndExcluding": "6.10.8",
"matchCriteriaId": "2DDC3632-2BC6-4270-A2DC-12DF4F03FA06"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5f5f7366dda8ae870e8305d6e7b3c0c2686cd2cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/979b581e4c69257acab1af415ddad6b2d78a2fa5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46684",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-13T06:15:13.103",
"lastModified": "2024-09-13T14:06:04.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:04:22.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,100 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binfmt_elf_fdpic: se corrige el c\u00e1lculo del tama\u00f1o de AUXV cuando se define ELF_HWCAP2 create_elf_fdpic_tables() no tiene en cuenta correctamente el espacio para el vector AUX cuando una arquitectura tiene definido ELF_HWCAP2. Antes del commit 10e29251be0e (\"binfmt_elf_fdpic: fix /proc//auxv\"), esto provocaba que la \u00faltima entrada del vector AUX se estableciera en cero, pero con ese cambio se produce un ERROR del kernel. Corrija esto a\u00f1adiendo uno al n\u00famero de entradas AUXV (nitems) cuando se define ELF_HWCAP2."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.8",
"matchCriteriaId": "2CE718D7-41ED-4D4A-AED5-326C3D4383FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/c507da85e4f80c630deb9e98222ccf4118cbe6f8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6a09e342f8e6d3cac7f7c5c14085236aca284b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46688",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-13T06:15:13.547",
"lastModified": "2024-09-13T14:06:04.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:01:43.037",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,95 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: erofs: se corrige el acceso fuera de los l\u00edmites cuando z_erofs_gbuf_growsize() falla parcialmente Si z_erofs_gbuf_growsize() falla parcialmente en un b\u00fafer global debido a un error en la asignaci\u00f3n de memoria o inyecci\u00f3n de fallas (como lo inform\u00f3 syzbot [1]), se deben liberar nuevas p\u00e1ginas compar\u00e1ndolas con las p\u00e1ginas existentes para evitar fugas de memoria. Sin embargo, la matriz gbuf->pages[] anterior puede no ser lo suficientemente grande, lo que puede provocar un acceso fuera de los l\u00edmites o una desreferencia de ptr nula. Corrija esto verificando con gbuf->nrpages de antemano. [1] https://lore.kernel.org/r/000000000000f7b96e062018c6e3@google.com"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.8",
"matchCriteriaId": "2CE718D7-41ED-4D4A-AED5-326C3D4383FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0005e01e1e875c5e27130c5e2ed0189749d1e08a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/49c0e081998008cde0c872c0ff9affa1ece4b878",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46694",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-13T06:15:14.240",
"lastModified": "2024-09-13T14:06:04.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:16:22.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,128 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: evitar usar un objeto nulo de framebuffer En lugar de usar state->fb->obj[0] directamente, obtener el objeto de framebuffer llamando a drm_gem_fb_get_obj() y devolver un c\u00f3digo de error cuando el objeto es nulo para evitar usar un objeto nulo de framebuffer. (seleccionado del commit 73dd0ad9e5dad53766ea3e631303430116f834b3)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.1.108",
"matchCriteriaId": "3807A5A8-BA5F-4F06-88B1-DC5FEB956E74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.49",
"matchCriteriaId": "1191B7F1-F275-45F5-9E82-A012FF517BFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.8",
"matchCriteriaId": "1B5D46C3-56A4-4380-9309-27BF73DF29A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/093ee72ed35c2338c87c26b6ba6f0b7789c9e14e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3b9a33235c773c7a3768060cf1d2cf8a9153bc37",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/49e1b214f3239b78967c6ddb8f8ec47ae047b051",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f6f5e39a3fe7cbdba190f42b28b40bdff03c8cf0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47159",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-09-19T18:15:09.803",
"lastModified": "2024-09-19T18:15:09.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains YouTrack before 2024.3.44799 user without appropriate permissions could restore workflows attached to a project"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47160",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-09-19T18:15:10.013",
"lastModified": "2024-09-19T18:15:10.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains YouTrack before 2024.3.44799 access to global app config data without appropriate permissions was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47162",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-09-19T18:15:10.227",
"lastModified": "2024-09-19T18:15:10.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains YouTrack before 2024.3.44799 token could be revealed on Imports page"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -2,16 +2,42 @@
"id": "CVE-2024-6087",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-09-13T17:15:13.027",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T19:32:14.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper access control vulnerability exists in lunary-ai/lunary at the latest commit (a761d83) on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target users upon registration for their own arbitrary organizations. The attacker can invite a target email, obtain a one-time use token, retract the invite, and later use the token to reset the password of the target user, leading to full account takeover."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de control de acceso indebido en lunary-ai/lunary en la \u00faltima confirmaci\u00f3n (a761d83) en la rama principal. La vulnerabilidad permite a un atacante utilizar los tokens de autenticaci\u00f3n emitidos por la funci\u00f3n \"invitar usuario\" para obtener tokens JWT v\u00e1lidos. Estos tokens se pueden utilizar para comprometer a los usuarios objetivo al registrarse en sus propias organizaciones arbitrarias. El atacante puede invitar a un correo electr\u00f3nico objetivo, obtener un token de uso \u00fanico, retractarse de la invitaci\u00f3n y, m\u00e1s tarde, utilizar el token para restablecer la contrase\u00f1a del usuario objetivo, lo que lleva a la toma de control total de la cuenta."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -37,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,14 +83,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.9",
"matchCriteriaId": "6C97FEE4-5604-4DA0-B695-116366C729AB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/844e8855c7a713dc7371766dba4125de4007b1cf",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/bd9f2301-11c7-4cbd-8d77-3e9225bd67e8",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,42 @@
"id": "CVE-2024-6582",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-09-13T17:15:13.220",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T19:45:30.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A broken access control vulnerability exists in the latest version of lunary-ai/lunary. The `saml.ts` file allows a user from one organization to update the Identity Provider (IDP) settings and view the SSO metadata of another organization. This vulnerability can lead to unauthorized access and potential account takeover if the email of a user in the target organization is known."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de control de acceso en la \u00faltima versi\u00f3n de lunary-ai/lunary. El archivo `saml.ts` permite que un usuario de una organizaci\u00f3n actualice la configuraci\u00f3n del proveedor de identidad (IDP) y vea los metadatos de SSO de otra organizaci\u00f3n. Esta vulnerabilidad puede provocar acceso no autorizado y una posible apropiaci\u00f3n de cuentas si se conoce el correo electr\u00f3nico de un usuario de la organizaci\u00f3n de destino."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -36,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
@ -47,14 +83,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.9",
"matchCriteriaId": "6C97FEE4-5604-4DA0-B695-116366C729AB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/1f043d8798ad87346dfe378eea723bff78ad7433",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/251d138c-3911-4a81-96e5-5a4ab59a0b59",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,42 @@
"id": "CVE-2024-6862",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-09-13T17:15:13.420",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:37:20.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in lunary-ai/lunary version 1.2.34 due to overly permissive CORS settings. This vulnerability allows an attacker to sign up for and create projects or use the instance as if they were a user with local access. The main attack vector is for instances hosted locally on personal machines, which are not publicly accessible. The CORS settings in the backend permit all origins, exposing unauthenticated endpoints to CSRF attacks."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la versi\u00f3n 1.2.34 de lunary-ai/lunary debido a una configuraci\u00f3n CORS demasiado permisiva. Esta vulnerabilidad permite que un atacante se registre y cree proyectos o utilice la instancia como si fuera un usuario con acceso local. El principal vector de ataque son las instancias alojadas localmente en m\u00e1quinas personales, que no son de acceso p\u00fablico. La configuraci\u00f3n CORS en el backend permite todos los or\u00edgenes, lo que expone los endpoints no autenticados a ataques CSRF."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -47,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:1.2.34:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D4C592-3D6E-4371-A03F-BA35C1A6473F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/3451fcd7b9d95e9091d62c515752f39f2faa6e54",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/0b1d851e-3455-480c-ad5a-23565894976f",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,42 @@
"id": "CVE-2024-6867",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-09-13T17:15:13.613",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:28:05.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An information disclosure vulnerability exists in the lunary-ai/lunary, specifically in the `runs/{run_id}/related` endpoint. This endpoint does not verify that the user has the necessary access rights to the run(s) they are accessing. As a result, it returns not only the specified run but also all runs that have the `run_id` listed as their parent run. This issue affects the main branch, commit a761d833. The vulnerability allows unauthorized users to obtain information about non-public runs and their related runs, given the `run_id` of a public or non-public run."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en lunary-ai/lunary, espec\u00edficamente en el punto de conexi\u00f3n `runs/{run_id}/related`. Este punto de conexi\u00f3n no verifica que el usuario tenga los derechos de acceso necesarios a las ejecuciones a las que est\u00e1 accediendo. Como resultado, no solo devuelve la ejecuci\u00f3n especificada, sino tambi\u00e9n todas las ejecuciones que tienen el `run_id` indicado como su ejecuci\u00f3n principal. Este problema afecta a la rama principal, commit a761d833. La vulnerabilidad permite a usuarios no autorizados obtener informaci\u00f3n sobre ejecuciones no p\u00fablicas y sus ejecuciones relacionadas, dado el `run_id` de una ejecuci\u00f3n p\u00fablica o no p\u00fablica."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -47,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9F0DAD2D-0C97-49C3-908F-E3BA6B8E6FFA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/35afd4439464571eb016318cd7b6f85a162225ca",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/460df515-164c-4435-954b-0233a181545f",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7591",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-05T18:15:06.480",
"lastModified": "2024-09-06T12:08:21.290",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T18:19:12.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,10 +81,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kemptechnologies:loadmaster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.40.0",
"versionEndIncluding": "7.2.60.0",
"matchCriteriaId": "C477074C-D2DF-4BDB-87FD-76133561BABB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kemptechnologies:multi-tenant_hypervisor_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.35.4",
"versionEndExcluding": "7.1.35.11",
"matchCriteriaId": "A696FEC5-08C0-4297-9684-03CC7C1BE9B6"
}
]
}
]
}
],
"references": [
{
"url": "https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7618",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-10T08:15:03.620",
"lastModified": "2024-09-10T12:09:50.377",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:20:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,30 +81,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.4.6.0",
"matchCriteriaId": "AFC63B3E-224E-4106-864F-6FCB8EBB1519"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.4.0/templates/reactions/admin_reaction.php#L112",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigreactions.php?rev=3147528#L88",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3147528/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://wordpress.org/plugins/peepso-core/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.peepso.com/changelog/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edf2e060-5ae4-4b46-bc68-22ae5f516fe8?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7655",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-10T08:15:03.830",
"lastModified": "2024-09-10T12:09:50.377",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T18:20:53.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
@ -51,30 +71,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.4.6.0",
"matchCriteriaId": "AFC63B3E-224E-4106-864F-6FCB8EBB1519"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigfields.php?rev=3147528#L17",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3147528/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://wordpress.org/plugins/peepso-core/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.peepso.com/6-4-6-0/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.peepso.com/changelog/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e85ee611-ae81-4736-b4f0-b9d06714da18?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8417",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-04T18:15:06.273",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T19:53:12.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,22 +150,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yunknet:online_school_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.5.6",
"matchCriteriaId": "306CF7F4-C30C-4602-94C5-FA26F591A346"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.276496",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276496",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.402376",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wiki.shikangsi.com/post/share/d31fefa1-ca08-48d7-a671-727d63bfaf65",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-8963",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-09-19T18:15:10.600",
"lastModified": "2024-09-19T18:15:10.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-19T18:00:17.803773+00:00
2024-09-19T20:00:17.597789+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-19T17:59:23.113000+00:00
2024-09-19T19:58:23.870000+00:00
```
### Last Data Feed Release
@ -33,57 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
263450
263457
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `7`
- [CVE-2024-31570](CVE-2024/CVE-2024-315xx/CVE-2024-31570.json) (`2024-09-19T17:15:12.623`)
- [CVE-2024-38016](CVE-2024/CVE-2024-380xx/CVE-2024-38016.json) (`2024-09-19T17:15:12.947`)
- [CVE-2024-45752](CVE-2024/CVE-2024-457xx/CVE-2024-45752.json) (`2024-09-19T16:15:04.910`)
- [CVE-2024-45861](CVE-2024/CVE-2024-458xx/CVE-2024-45861.json) (`2024-09-19T16:15:05.103`)
- [CVE-2024-45862](CVE-2024/CVE-2024-458xx/CVE-2024-45862.json) (`2024-09-19T16:15:05.227`)
- [CVE-2024-7736](CVE-2024/CVE-2024-77xx/CVE-2024-7736.json) (`2024-09-19T16:15:05.520`)
- [CVE-2024-7737](CVE-2024/CVE-2024-77xx/CVE-2024-7737.json) (`2024-09-19T16:15:05.727`)
- [CVE-2024-8375](CVE-2024/CVE-2024-83xx/CVE-2024-8375.json) (`2024-09-19T16:15:06.023`)
- [CVE-2024-8651](CVE-2024/CVE-2024-86xx/CVE-2024-8651.json) (`2024-09-19T17:15:15.173`)
- [CVE-2024-8652](CVE-2024/CVE-2024-86xx/CVE-2024-8652.json) (`2024-09-19T17:15:15.360`)
- [CVE-2024-8653](CVE-2024/CVE-2024-86xx/CVE-2024-8653.json) (`2024-09-19T17:15:15.503`)
- [CVE-2024-8698](CVE-2024/CVE-2024-86xx/CVE-2024-8698.json) (`2024-09-19T16:15:06.177`)
- [CVE-2024-8883](CVE-2024/CVE-2024-88xx/CVE-2024-8883.json) (`2024-09-19T16:15:06.403`)
- [CVE-2024-25673](CVE-2024/CVE-2024-256xx/CVE-2024-25673.json) (`2024-09-19T19:15:24.093`)
- [CVE-2024-33109](CVE-2024/CVE-2024-331xx/CVE-2024-33109.json) (`2024-09-19T19:15:24.170`)
- [CVE-2024-40125](CVE-2024/CVE-2024-401xx/CVE-2024-40125.json) (`2024-09-19T19:15:24.350`)
- [CVE-2024-47159](CVE-2024/CVE-2024-471xx/CVE-2024-47159.json) (`2024-09-19T18:15:09.803`)
- [CVE-2024-47160](CVE-2024/CVE-2024-471xx/CVE-2024-47160.json) (`2024-09-19T18:15:10.013`)
- [CVE-2024-47162](CVE-2024/CVE-2024-471xx/CVE-2024-47162.json) (`2024-09-19T18:15:10.227`)
- [CVE-2024-8963](CVE-2024/CVE-2024-89xx/CVE-2024-8963.json) (`2024-09-19T18:15:10.600`)
### CVEs modified in the last Commit
Recently modified CVEs: `39`
Recently modified CVEs: `50`
- [CVE-2024-39317](CVE-2024/CVE-2024-393xx/CVE-2024-39317.json) (`2024-09-19T16:08:43.417`)
- [CVE-2024-40865](CVE-2024/CVE-2024-408xx/CVE-2024-40865.json) (`2024-09-19T17:58:37.370`)
- [CVE-2024-41565](CVE-2024/CVE-2024-415xx/CVE-2024-41565.json) (`2024-09-19T16:19:59.317`)
- [CVE-2024-42698](CVE-2024/CVE-2024-426xx/CVE-2024-42698.json) (`2024-09-19T16:29:51.217`)
- [CVE-2024-44589](CVE-2024/CVE-2024-445xx/CVE-2024-44589.json) (`2024-09-19T17:35:04.797`)
- [CVE-2024-45176](CVE-2024/CVE-2024-451xx/CVE-2024-45176.json) (`2024-09-19T17:56:15.603`)
- [CVE-2024-45304](CVE-2024/CVE-2024-453xx/CVE-2024-45304.json) (`2024-09-19T17:26:37.030`)
- [CVE-2024-45440](CVE-2024/CVE-2024-454xx/CVE-2024-45440.json) (`2024-09-19T17:38:40.100`)
- [CVE-2024-46695](CVE-2024/CVE-2024-466xx/CVE-2024-46695.json) (`2024-09-19T17:59:23.113`)
- [CVE-2024-46697](CVE-2024/CVE-2024-466xx/CVE-2024-46697.json) (`2024-09-19T17:53:43.173`)
- [CVE-2024-46706](CVE-2024/CVE-2024-467xx/CVE-2024-46706.json) (`2024-09-19T17:51:07.670`)
- [CVE-2024-6053](CVE-2024/CVE-2024-60xx/CVE-2024-6053.json) (`2024-09-19T17:22:36.697`)
- [CVE-2024-6142](CVE-2024/CVE-2024-61xx/CVE-2024-6142.json) (`2024-09-19T17:47:00.270`)
- [CVE-2024-6143](CVE-2024/CVE-2024-61xx/CVE-2024-6143.json) (`2024-09-19T17:47:33.370`)
- [CVE-2024-6144](CVE-2024/CVE-2024-61xx/CVE-2024-6144.json) (`2024-09-19T17:48:27.787`)
- [CVE-2024-6145](CVE-2024/CVE-2024-61xx/CVE-2024-6145.json) (`2024-09-19T17:50:17.250`)
- [CVE-2024-6146](CVE-2024/CVE-2024-61xx/CVE-2024-6146.json) (`2024-09-19T17:50:48.247`)
- [CVE-2024-6251](CVE-2024/CVE-2024-62xx/CVE-2024-6251.json) (`2024-09-19T16:50:07.723`)
- [CVE-2024-6252](CVE-2024/CVE-2024-62xx/CVE-2024-6252.json) (`2024-09-19T16:51:12.527`)
- [CVE-2024-6266](CVE-2024/CVE-2024-62xx/CVE-2024-6266.json) (`2024-09-19T16:53:36.647`)
- [CVE-2024-6268](CVE-2024/CVE-2024-62xx/CVE-2024-6268.json) (`2024-09-19T17:06:24.663`)
- [CVE-2024-8006](CVE-2024/CVE-2024-80xx/CVE-2024-8006.json) (`2024-09-19T17:46:03.447`)
- [CVE-2024-8260](CVE-2024/CVE-2024-82xx/CVE-2024-8260.json) (`2024-09-19T16:08:58.863`)
- [CVE-2024-8304](CVE-2024/CVE-2024-83xx/CVE-2024-8304.json) (`2024-09-19T17:39:46.687`)
- [CVE-2024-8395](CVE-2024/CVE-2024-83xx/CVE-2024-8395.json) (`2024-09-19T17:53:45.753`)
- [CVE-2024-31416](CVE-2024/CVE-2024-314xx/CVE-2024-31416.json) (`2024-09-19T19:06:59.787`)
- [CVE-2024-34343](CVE-2024/CVE-2024-343xx/CVE-2024-34343.json) (`2024-09-19T19:57:52.007`)
- [CVE-2024-40568](CVE-2024/CVE-2024-405xx/CVE-2024-40568.json) (`2024-09-19T19:35:13.880`)
- [CVE-2024-45159](CVE-2024/CVE-2024-451xx/CVE-2024-45159.json) (`2024-09-19T18:26:24.687`)
- [CVE-2024-45400](CVE-2024/CVE-2024-454xx/CVE-2024-45400.json) (`2024-09-19T18:04:36.627`)
- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2024-09-19T18:12:52.220`)
- [CVE-2024-45455](CVE-2024/CVE-2024-454xx/CVE-2024-45455.json) (`2024-09-19T18:51:15.433`)
- [CVE-2024-45456](CVE-2024/CVE-2024-454xx/CVE-2024-45456.json) (`2024-09-19T18:38:57.500`)
- [CVE-2024-45458](CVE-2024/CVE-2024-454xx/CVE-2024-45458.json) (`2024-09-19T18:55:46.513`)
- [CVE-2024-4554](CVE-2024/CVE-2024-45xx/CVE-2024-4554.json) (`2024-09-19T18:15:10.433`)
- [CVE-2024-45620](CVE-2024/CVE-2024-456xx/CVE-2024-45620.json) (`2024-09-19T19:21:38.653`)
- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2024-09-19T19:35:14.767`)
- [CVE-2024-46374](CVE-2024/CVE-2024-463xx/CVE-2024-46374.json) (`2024-09-19T19:35:15.573`)
- [CVE-2024-46681](CVE-2024/CVE-2024-466xx/CVE-2024-46681.json) (`2024-09-19T18:10:49.623`)
- [CVE-2024-46684](CVE-2024/CVE-2024-466xx/CVE-2024-46684.json) (`2024-09-19T18:04:22.623`)
- [CVE-2024-46688](CVE-2024/CVE-2024-466xx/CVE-2024-46688.json) (`2024-09-19T18:01:43.037`)
- [CVE-2024-46694](CVE-2024/CVE-2024-466xx/CVE-2024-46694.json) (`2024-09-19T18:16:22.247`)
- [CVE-2024-6087](CVE-2024/CVE-2024-60xx/CVE-2024-6087.json) (`2024-09-19T19:32:14.710`)
- [CVE-2024-6582](CVE-2024/CVE-2024-65xx/CVE-2024-6582.json) (`2024-09-19T19:45:30.283`)
- [CVE-2024-6862](CVE-2024/CVE-2024-68xx/CVE-2024-6862.json) (`2024-09-19T18:37:20.910`)
- [CVE-2024-6867](CVE-2024/CVE-2024-68xx/CVE-2024-6867.json) (`2024-09-19T18:28:05.477`)
- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-09-19T18:19:12.210`)
- [CVE-2024-7618](CVE-2024/CVE-2024-76xx/CVE-2024-7618.json) (`2024-09-19T18:20:00.000`)
- [CVE-2024-7655](CVE-2024/CVE-2024-76xx/CVE-2024-7655.json) (`2024-09-19T18:20:53.617`)
- [CVE-2024-8417](CVE-2024/CVE-2024-84xx/CVE-2024-8417.json) (`2024-09-19T19:53:12.383`)
## Download and Usage

View File

@ -58299,12 +58299,12 @@ CVE-2013-0639,0,0,b31be035ceb64b0d082ddfacc740a4210652cc5e7e0dde51ddff1158c160dc
CVE-2013-0640,0,0,124b8bb226f7e9d6096b31adba4a0e431bfd4cafe81871fe0024db93f6d5836d,2024-07-16T17:36:16.623000
CVE-2013-0641,0,0,8b435cbf77af4b23b70d0392c35e373c862cd1b7676f3d77a9653fe18e07ad76,2024-07-16T17:36:05.960000
CVE-2013-0642,0,0,bfadc58d9042f0563f6f464599e9d26f03ce9f43f5f43c002304603f48da66a2,2018-12-06T19:47:16.903000
CVE-2013-0643,0,0,729305f657b64058679da68ad515dc2a54231958b32050c68b1c86f5c900050c,2024-09-18T19:35:01.410000
CVE-2013-0643,0,1,ac028e28f0c58cfd927fcc5eee044da647ef72101b764105bdbe0ec010bc29b2,2024-09-19T19:48:10.033000
CVE-2013-0644,0,0,79820981c348e4e64b9198c5d6054f480e970cc8d8c247ee3d548bff6c82ac85,2018-12-06T19:48:02.123000
CVE-2013-0645,0,0,6125d0f7d22b366190241b77a7b5922adc7339604421994dce13d534098c6aea,2018-12-06T19:48:36.513000
CVE-2013-0646,0,0,c06c944b7c73de3e62d948a2b222d45721d45f6414f5e68a92e11e952ff01974,2014-03-26T04:44:11.977000
CVE-2013-0647,0,0,eef38ab0e06ece5be29234416a43368cf2dc4818ff0481da512aa8e96cfa7923,2018-12-06T19:50:48.563000
CVE-2013-0648,0,0,6b0666a3ff66920f1be6ded6a96213840168c4e3336527f9bfefe5c13da1df25,2024-09-18T19:35:02.327000
CVE-2013-0648,0,1,1bbefef5fe7b99ef5472e70aee3444d59a0b886e0a86d2abe59f31dd3051169e,2024-09-19T19:51:57.317000
CVE-2013-0649,0,0,08f618eda7f64799433610eda3b01050cfd3e669aa064372e20a16c5d61237e1,2018-12-06T19:50:14.467000
CVE-2013-0650,0,0,05a6fa43599436cf52455a9e658850893592583b2a41594c4c9c1629f1ff4728,2014-03-26T04:44:15.773000
CVE-2013-0651,0,0,f49ccbeee68ba586b35032f2fc9fbd62aa3c838e205fd987ab565ea2bea44c76,2013-01-30T05:00:00
@ -64974,12 +64974,12 @@ CVE-2014-0493,0,0,5980f8ce7bccecebd2e70dd6b857cb4b656971c59fbacbb63249cc45b51f75
CVE-2014-0494,0,0,8b294b47a486336cd6b4db3f06f91abe3b0268360260099a12dc8b5ebb59c596,2017-08-29T01:34:11.030000
CVE-2014-0495,0,0,671e97412a74358a5c6e50a3bb0dbb2b494498ae12e83fc145a13daedb649abf,2018-12-13T15:50:35.977000
CVE-2014-0496,0,0,943eee2f6677ecbddd894736d06d754908e933d15ae4ea4f9cfea3e0ddbbf17b,2018-12-13T15:50:55.103000
CVE-2014-0497,0,0,d6e32f9fc77d829dbf50e0c69e55537733d441acc9da96160dfc9a69312dffe9,2024-09-18T19:35:02.543000
CVE-2014-0497,0,1,52c8371071aa4fd7738da924f81c155923a24cc665bb1c815f7c347dec1de3d5,2024-09-19T19:56:17.247000
CVE-2014-0498,0,0,1618f11598fb67e87357bcde2d1122794a71c785ac05d06e2d56fd17028571fc,2018-12-13T15:54:15.917000
CVE-2014-0499,0,0,0361066feb81eae85003bd40e34d63a55b78a3c7f0bdfd41851c555d91004b71,2018-12-13T15:54:47.153000
CVE-2014-0500,0,0,97edfd619058dc26ad56cf33391d9dc91362a50dec1d0dbc02abb7edf993b617,2018-01-03T02:29:03.130000
CVE-2014-0501,0,0,4025edf733331396525b490cf3d77ea02dc26b06228603a4b61385c7de6588f2,2018-01-03T02:29:03.210000
CVE-2014-0502,0,0,0aec5223f09074d52a34e1c752542c3e472ac2f8b486fe6bc9d439bb474a1256,2024-09-18T19:35:03.393000
CVE-2014-0502,0,1,411a92a14510541e15575d6525d0a6e735d616f03fe8f2886da4486c39f075fb,2024-09-19T19:53:44.480000
CVE-2014-0503,0,0,c67bf98b7682ef5050d13c43497f2af42e7aa350e509586400ddb6191e666325,2018-12-13T16:00:37.443000
CVE-2014-0504,0,0,e6a68e9a83d1aff357dde03fe34200e26c34033a1843fb3b1a467a539bb2000a,2018-12-13T16:00:23.630000
CVE-2014-0505,0,0,9cf82e807986acb6181ee7efa5d77d0a8127ac7e93c1c91848a81dbe58937cd2,2014-03-14T17:07:42.850000
@ -128928,7 +128928,7 @@ CVE-2019-10686,0,0,071dffbfdea10181bb98b77b81173ea1ee44c0bf3f27125b70455662edc40
CVE-2019-10687,0,0,4d2aa4f6c0463103aef2503f43b6f1e6753450b125b2eb1b959d173389b0f8e1,2019-08-27T15:51:11.620000
CVE-2019-10688,0,0,139389dbc249e8cae439573037005e32285d24298cd9752f9767fbd85f7cada6,2019-06-17T16:15:11.653000
CVE-2019-10689,0,0,3a6ff66e02d9a27391650c9b85af3797719e726b15e08ea64568eab01a8deea0,2019-06-27T17:26:21.897000
CVE-2019-1069,0,0,f31e90e4331009e9da44368d612d680d5b98b6b04c978425b0ce779643dd7237,2024-09-19T01:00:03.107000
CVE-2019-1069,0,1,0515bb971e4f7a4465e7951022bb244d8e5b1246162c1944d1f49a5443592e90,2024-09-19T19:58:01.950000
CVE-2019-10691,0,0,e8e0d767bb2f3b5e08db6f24e350ea086b46abac68877bbd2cba7819c236f317,2023-11-07T03:02:32.480000
CVE-2019-10692,0,0,8adff711cac0bb2de2edadfdf1000b35b700fb5b209d412cad8743610b43de23,2023-05-23T20:30:59.777000
CVE-2019-10694,0,0,9582148ff7994145825de46f0455936b126d6116ce2adec095540a2cc82c30a9,2022-01-24T16:46:01.133000
@ -175555,7 +175555,7 @@ CVE-2021-31555,0,0,7de5df80bc06456a2bd06cb1ed2fa6bf25b8a0e66ee1e2ceff5a7504cc2b9
CVE-2021-31556,0,0,93b949700d04612fa67f7aa21454bcfa0dedb54b45feb534dfde6a346bbdbf4e,2023-11-07T03:34:58.647000
CVE-2021-31558,0,0,ceed4d2a05c41f9fdd58ce2921315e67a6e46f1c89b4c2da0bce257ffbc7f901,2021-12-28T14:54:32.527000
CVE-2021-31559,0,0,c056101e3a724e5296c3096cffa3217710e8d3f22622b1fbc675682800b56fdf,2022-10-25T16:42:38.307000
CVE-2021-3156,0,0,756a4c61ba757c306e336a56d1a3eabd3a978cd9871d60b7e3550598effb17de,2024-09-18T17:15:13.843000
CVE-2021-3156,0,1,c9f0ccb5f8e0b0bd0d85e1cc30dd2ecceb494b21ff9563b3056182a6d1fce82a,2024-09-19T19:58:23.870000
CVE-2021-31562,0,0,ac50e4387893ec363455949ced3c17ca407e9a27f3f2c3f523390c3482b094df,2022-01-28T15:55:53.923000
CVE-2021-31566,0,0,801f1236a607222712dc7741b61bbdda3061d826b7fd22f878d0c5c45a130a15,2024-03-27T16:04:30.260000
CVE-2021-31567,0,0,0da3da305c7b1718259a905dc09c36fc318ae57a531df276f807be7858b88fad,2022-02-03T17:09:44.553000
@ -213190,7 +213190,7 @@ CVE-2023-0632,0,0,d83115f04f4989ede052facc5d8104ea2fb79fa2a1de534b7f13673b082097
CVE-2023-0633,0,0,c55f2b66671ce085b4ad3974c5b038c8c1ffd9a2f567e03eea54fc854cda175a,2023-09-25T18:32:19.187000
CVE-2023-0634,0,0,e1f434232229f0b69e5813912fc243d281927b7062ddb545130690b604bd0d71,2023-11-07T04:01:03.280000
CVE-2023-0635,0,0,d81026f71e5aca952558a8d499cbeb71f364c949b09c316ae202aeba51d2fc8c,2024-09-19T15:15:12.403000
CVE-2023-0636,0,1,daf2ae1675c4a664309e700bd6ab90b8f65b32aff69a932fba6e183e64ec4bda,2024-09-19T17:15:12.017000
CVE-2023-0636,0,0,daf2ae1675c4a664309e700bd6ab90b8f65b32aff69a932fba6e183e64ec4bda,2024-09-19T17:15:12.017000
CVE-2023-0637,0,0,89cd23cbb4fa4626e47231bb03b58900a8eed173642bad665a49a10f9ff14366,2024-05-17T02:17:27.057000
CVE-2023-0638,0,0,ba94fa67c2ce1ebb9da3f45635b51b7bc32a46cbd4ca9f565be0d8435038da97,2024-05-17T02:17:27.163000
CVE-2023-0639,0,0,97ebc3e83332f93df2d560c117d07a78fd7479e47b3a71fd746d3fbb9a517457,2024-05-17T02:17:27.273000
@ -222909,7 +222909,7 @@ CVE-2023-30458,0,0,48c15acc8080e55dcad253897d98be087ef3a613a48400bab015ca689a5a0
CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05326,2023-04-25T15:56:57.943000
CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000
CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31
CVE-2023-30464,0,0,7ed8486907cd9811a99dcb420b4c9fa8895464d669565a41f685a043dcdf6d95,2024-09-18T21:15:13.080000
CVE-2023-30464,0,1,3aae22a2e0f43047e68f03e1c3bca7b8e0d56717d49f06b096746b3b526617e7,2024-09-19T19:35:01.113000
CVE-2023-30465,0,0,03cb642b9d155b8fc540b2b5aab3b36429c8caf9db77ee091c34798766c54d43,2023-04-18T19:30:08.003000
CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000
CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000
@ -225565,7 +225565,7 @@ CVE-2023-33833,0,0,8cabb27c4a96645953c1a4f1036d344749d66b348828bd126020c3efb5d4e
CVE-2023-33834,0,0,8a99184e234095ae4700b728415aa680a907977cb94f44aaa995a53c8fcba752,2023-09-01T20:48:26.573000
CVE-2023-33835,0,0,da6214caf650e801b3a9fdeb758dc442525c15d94e4f974e5b44154e1073b4df,2023-09-01T20:48:06.953000
CVE-2023-33836,0,0,13579f69f5ba3df93b75aa9b258f2d9f33b31ebbc257567a3ea6c574557bd8d7,2023-10-19T16:27:02.050000
CVE-2023-33837,0,1,50b24b6dd685668a1aa425c6457e8db215df45025fbdff151f60f7fdf3b7780b,2024-09-19T16:15:03.897000
CVE-2023-33837,0,0,50b24b6dd685668a1aa425c6457e8db215df45025fbdff151f60f7fdf3b7780b,2024-09-19T16:15:03.897000
CVE-2023-33839,0,0,bc28ce9c837b78c2fb043e0a611220533f03485c577d075d53f20054bb056fac,2023-10-28T03:31:20.867000
CVE-2023-3384,0,0,c366782f96c01b6685af33932f5b3dbfa67631b1a69a8be3fadc1c8aad177b98,2023-11-07T04:18:39.110000
CVE-2023-33840,0,0,586d7d4f70d01d8ed3bf3edb820638ca5a1ed02b7e9e624c28a81439ca6eb363,2023-10-28T03:32:15.907000
@ -225576,7 +225576,7 @@ CVE-2023-33847,0,0,82ca8aa0bc2d03362319c542ea5b2770d3d85f3edc1d48ee0a623bf42e800
CVE-2023-33848,0,0,8c230bcaf355a577515ed758441936574666148d6f8eb2c4fef9542b77704701,2023-06-15T15:08:53.457000
CVE-2023-33849,0,0,cee19490ece517fd373f4e7e8ed6adf35f850894b189fbcc578bbd8d63ec8305,2023-06-15T16:56:56.460000
CVE-2023-3385,0,0,9500094f984a4b5d1e66b5fa4a2c7e1b713d3f8f392f6fc06da408d890552a37,2023-08-04T19:19:04.697000
CVE-2023-33850,0,1,fbba5b69c67c9acf3b1ad18d606a9ab31046ef79599a8260c291e9eb0693cf7e,2024-09-19T16:15:04.047000
CVE-2023-33850,0,0,fbba5b69c67c9acf3b1ad18d606a9ab31046ef79599a8260c291e9eb0693cf7e,2024-09-19T16:15:04.047000
CVE-2023-33851,0,0,4ac32a90038a96c4290f8386bc4de44c14e956a2c207f0eac7a85d82111f6074,2024-02-12T19:54:23.117000
CVE-2023-33852,0,0,bc3c73250f73c64645e886b9ff4fe0ce89bb90d67afa464822661d78d1e66b51,2023-08-29T04:43:06.033000
CVE-2023-33855,0,0,aa3542d64ac11799927f1e76ad33cc287cefdca6570205fddaaa45ff2dc14b58,2024-03-26T17:09:53.043000
@ -226424,7 +226424,7 @@ CVE-2023-35006,0,0,5acb31cc1556024eeb64b08b60260767e246691f5242ee9df31af625e2b32
CVE-2023-35009,0,0,d8de65d8c74d095102650d61033fbe6e6edcf88ae0bfa7092ac4ef92348c016e,2024-06-21T19:15:27.300000
CVE-2023-3501,0,0,a76559ca80d102957b322b035a4ffefc79e9201575b2cccb00498046008bf9e4,2023-11-07T04:18:51.230000
CVE-2023-35011,0,0,38ddb64d0651455b912949926db10e88999c3cf7ce781799eb53e2740057a3b5,2024-06-21T19:15:27.467000
CVE-2023-35012,0,1,f81d33aa7d3186d868c53d1111ace48462742e3ef54c4edf2c8b154c222007b6,2024-09-19T17:15:12.223000
CVE-2023-35012,0,0,f81d33aa7d3186d868c53d1111ace48462742e3ef54c4edf2c8b154c222007b6,2024-09-19T17:15:12.223000
CVE-2023-35013,0,0,534ee78f8c171fc79a4adeb51556f3dbd30c4450c8c4b3cfa11fe98e966cbdbc,2023-10-19T16:42:30.197000
CVE-2023-35016,0,0,4fa91503d6f6db95a191dff0d99a0bfebb7cd1f190858d458e96118cac712474,2023-08-04T17:23:18.223000
CVE-2023-35018,0,0,6d336ce3e2614937180971b4858c079e9a4762f40daaf2f592acb48025066235,2023-10-19T16:20:10.327000
@ -230784,7 +230784,7 @@ CVE-2023-40650,0,0,352b9f0a42924a10ae1ec80f36517882f8a68e0276912361872f5d0ea9707
CVE-2023-40651,0,0,4b7377a587c45b53860a7f5cef45bd5433fa18a2bfcf837a51529a6560be5347,2023-10-11T17:35:31.657000
CVE-2023-40652,0,0,a18e3fe3990e80f554e1b4f55aa445ad66414551a973c9af4895cf611c407613,2023-10-11T17:35:49.427000
CVE-2023-40653,0,0,88eeb937a3e4c749b0b049debb5babce5dcc6cdc9ad79aae89cfb1d78ecb1fb7,2024-02-15T20:53:14.203000
CVE-2023-40654,0,0,8d852dea043a9db45de1594e9fa2b1213b47065b3e199c550a2cc4f0930babdb,2023-10-11T19:08:04.547000
CVE-2023-40654,0,1,75ef0ecb7c1b4344a60dff2f1c173adf0d9c0494c9c6a83bf973de2bf626831c,2024-09-19T18:35:02.187000
CVE-2023-40655,0,0,4328cdbb4187e8b0234c53d0517ebc655578d5acdd9d3f7f4547eb76c952f50d,2023-12-19T17:09:11.113000
CVE-2023-40656,0,0,19b49d5f2f04f7adc1e8ec42eabd1ec41b91195134dc054a4b5906547d33a983,2023-12-19T16:53:42.183000
CVE-2023-40657,0,0,de372f5606a6a9c0eb353d9acefa85fa576d984d78e2f34c3e3bafeafb5ce44c,2023-12-19T16:10:07.447000
@ -233121,7 +233121,7 @@ CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a23020
CVE-2023-43980,0,0,bbbdf96fe43913bc9148a2be4e4cf79c095e8946d088cfcca396bde192a42883,2023-10-06T16:26:51.337000
CVE-2023-43981,0,0,7bc0b04a874fb37912d5a49421c2f5f408de1077870392e33bb57c9ca9c75f89,2023-10-07T02:52:59.353000
CVE-2023-43982,0,0,36c050839890ac22e9c1d01ac6e12f62ba92c226ca1aa60fc6850304f993fad5,2023-11-09T22:07:27.420000
CVE-2023-43983,0,0,6d9211a02e0a131adf3e167416c4fcfa68bb60a61bdffb8dcb0aef2773cbd238,2023-10-07T02:52:28.870000
CVE-2023-43983,0,1,9159a914c282ab44b718a500a523f5b25649be59fcdc42674f05ea6f2949ffee,2024-09-19T19:35:04.850000
CVE-2023-43984,0,0,734f41a89a1d8239b9e46c66d768f28b73875d461f17b4c52b2f21e0399d5916,2024-09-05T13:35:00.617000
CVE-2023-43985,0,0,d6426e07dde5bc7e003721bf3af2143d307be62b95406f9014be4ad2380774e6,2024-01-25T20:07:56.693000
CVE-2023-43986,0,0,f6e814df340a370055926dfb76c8e5c7ca2c32dbd5d8ca11c76fab82aae5e055,2023-10-25T19:57:40.860000
@ -233637,11 +233637,11 @@ CVE-2023-44829,0,0,5db7752f8ecb00403264ccf21f2659fe0ddfcfbbceb6f5c8ddddc55c7780b
CVE-2023-44830,0,0,f49977dfe516745c571ff61090d55c8fc4270a5fd142bbbdb6ce53b5908f7adf,2023-10-07T03:18:38.277000
CVE-2023-44831,0,0,b97e9b1170ac4de59d7ff19e0fb6f009616c576284357e866bbfe60abc61bb12,2023-10-07T03:16:56.033000
CVE-2023-44832,0,0,9c1b721dcfa1a8d8e89ace89b9c1b3507031d5009c9747a3da72e27d19da2342,2023-10-07T03:15:46.517000
CVE-2023-44833,0,0,c2b3c7d97797d8e23ef25182b7d4eadd3c4bf2687e1609987205fb358fa89dd0,2023-10-07T03:17:11.587000
CVE-2023-44834,0,0,e7d05c7046c9a3cee4e8fdbbf7577987637ea30fb78e39f8a73ce48b0cebfd95,2023-10-07T03:17:41.593000
CVE-2023-44835,0,0,4087f2df3b958b6a40d6db323c9a86117da5378d28c84199c00ff8f3d171417b,2023-10-07T03:17:27.913000
CVE-2023-44836,0,0,2ef940f84d5706190363ff3de97961d61304db78caa9a1d358045f9a54e24843,2023-10-06T15:20:09.927000
CVE-2023-44837,0,0,5aee9220517509b69f4bde4ec41abe9da85d39e01f66ffd26cc455e41c8ce77f,2023-10-06T15:19:36.920000
CVE-2023-44833,0,1,0c804cc3c43204c5befa90250fbfba4df8a5bf5007c06fd8daefda112103f533,2024-09-19T19:35:05.797000
CVE-2023-44834,0,1,08996b4cba22df2276f30026a7a29031ecdcee6cb18029b0142bf849bd6c516d,2024-09-19T19:35:06.803000
CVE-2023-44835,0,1,e17d982550d6512cf6fe9c365f1e06a437afe69d67fde550145cafbe5bb73011,2024-09-19T19:35:07.573000
CVE-2023-44836,0,1,62a6ff921417f32c3e565b38aade4a341ea0660c3ac13f7991d1da446ddfc7c8,2024-09-19T19:35:08.333000
CVE-2023-44837,0,1,6edc4c0f7cb805a39f28f03e490a78fd2c9751dfa21d9ab0c3067871839fa870,2024-09-19T19:35:09.180000
CVE-2023-44838,0,0,826bd96275d8c94caef15f783d57a0f555324313131d73e5992ad76971191292,2023-10-06T15:18:30.847000
CVE-2023-44839,0,0,a0e587d190a99eed8b1b0978216fd7d1258814f55b89567589a009468b22137d,2023-10-06T14:59:00.183000
CVE-2023-44846,0,0,f34b0705d17778a0a98e8c488cd79f0636bd3cd4cc85846f0269be4cceaf4a53,2024-09-19T15:35:06.370000
@ -233901,7 +233901,7 @@ CVE-2023-45234,0,0,52d30ab5beac57d2cd298224003e0bee22da7a17b147520a845e2ba90bf70
CVE-2023-45235,0,0,cff23e65f01ec655fd14e6d133970016dc039673f6b11aca9b36e51667543adf,2024-03-13T02:15:50.617000
CVE-2023-45236,0,0,92efaaa1bc2b9526c3c29cdc6dca31efe1a1886632750ddc1bb644329a7afb03,2024-03-07T17:15:10.670000
CVE-2023-45237,0,0,0f5d91aa15f206eb3d1e77aa53043c5accebb7aca7118063aaf11d800c2c94eb,2024-03-07T17:15:10.760000
CVE-2023-45239,0,1,2545b4f732ace5a74a14a9e3677c47c49ff70212481a6cf990b811f00b194a93,2024-09-19T17:35:03.203000
CVE-2023-45239,0,0,2545b4f732ace5a74a14a9e3677c47c49ff70212481a6cf990b811f00b194a93,2024-09-19T17:35:03.203000
CVE-2023-4524,0,0,6171a24003395a10a6c4523565599e5d20b99c80085550635695f5cb34ea1af7,2023-11-07T04:22:41.293000
CVE-2023-45240,0,0,f711761fc8cac003e2c7eefd2a3014f0b4173d214c89b3d991292a0dafe0873d,2023-10-10T14:55:56.860000
CVE-2023-45241,0,0,db8de00a92ca3a17a0e4f01f86babfe2ffbe4970691655ee4146d59ab57686c2,2024-02-27T17:15:10.147000
@ -233932,7 +233932,7 @@ CVE-2023-45279,0,0,898ce636410e7ee87b3770444fcac6d3f827786fce9dcb4b413820160cb82
CVE-2023-4528,0,0,fb6f9d976b6ad831fd6e3df0b8811afbfab41e66da4fc9cbcc5aac0b556464af,2023-09-13T01:02:46.907000
CVE-2023-45280,0,0,587e5e1ce24b098e3665aa207a0ea7ded3e3371b3bf4c75269401122fcd388cb,2023-10-25T19:05:48.603000
CVE-2023-45281,0,0,cd0978c74ba2a3ae2f0cd409990a0511bfb93e86139e2ad7fb10f6ba5d1be143,2023-10-25T14:47:01.093000
CVE-2023-45282,0,0,6ed2c2cc801c83a19d22a9f4cb86f11cebdf6066eee12a34876ad1251c661720,2023-11-02T01:23:35.490000
CVE-2023-45282,0,1,368524b1a0238251df4f98fe6fa760382cdd08500bee7e40ce4ccc29c50e3928,2024-09-19T19:35:10.307000
CVE-2023-45283,0,0,cd5d279d60eb7cff2b94547ec8e6d00135f36cff01f6563cfb3f789184507d96,2023-12-14T10:15:07.947000
CVE-2023-45284,0,0,73d119dc77c426359595c7c8f0829890e7bf623858b010da63a96abc58828085,2024-09-03T19:35:05.593000
CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a300d,2024-01-20T04:15:08.013000
@ -233943,7 +233943,7 @@ CVE-2023-45289,0,0,55227dc74f3b7eff2b0242a09fa3e698d7b0d3f59cb4bf8a9cc5e9e130d6e
CVE-2023-45290,0,0,f22fc13bdae5e6edab97f7e0fddab9822bb3ae91388d56c6e1d234cdc0e49b4d,2024-05-01T17:15:26.040000
CVE-2023-45292,0,0,9325e9e3b78b777445115a8da3de2cb25249d0f8ef4a9d3921e74e58a0d0d777,2023-12-14T16:26:54.007000
CVE-2023-4530,0,0,eeb9daf8b96668373bbb47227634f4b43c799c25d28cf12757e3af97741f4f52,2023-10-11T17:19:19.627000
CVE-2023-45303,0,0,f21ed387a8abb41711edefd2fe89234918c4e7dbf7062a4c7b8e46ea1b5c5b75,2023-10-12T18:10:31.853000
CVE-2023-45303,0,1,688e5be499770cb09d83a318de82d649f890929552dc6a722b4fae6f03dffe83,2024-09-19T19:35:11.117000
CVE-2023-4531,0,0,06add8a6070b98064716f1fe58388261ce4316eee88c526ba1a6617b07e80b19,2023-09-08T16:51:00.220000
CVE-2023-45311,0,0,71d49c76ae9cfe1ccb4815d505b4234841f0d63a53ece89b238db654f857d950,2023-11-28T07:15:43.260000
CVE-2023-45312,0,0,461d9c4a1f47fcd79a0ef49d81d7b730848406a39d4ed8738d381c26b5b04ed4,2024-09-18T20:35:04.773000
@ -234002,11 +234002,11 @@ CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb
CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000
CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000
CVE-2023-4537,0,0,d55e9c2ec2d6a309b7146da78217b22dabb54a472777f14cd37d2689a428a754,2024-02-15T14:28:31.380000
CVE-2023-45370,0,0,9543640caf10dd3e07daee9db7f8e87f89d27c5a0e3530fda019c8f7730c9b18,2023-10-12T16:05:00.760000
CVE-2023-45370,0,1,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000
CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000
CVE-2023-45372,0,0,d9bfe48c017efefbc51e4858892313d03ed6df453f512f147a4b3e1b8435be66,2023-10-12T16:04:34.703000
CVE-2023-45372,0,1,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000
CVE-2023-45373,0,0,eae3bb62b6bed4d1a32b5243afb1d8915435578a2d4194a9f7539a9a665df972,2023-10-12T16:05:49.617000
CVE-2023-45374,0,0,952f3e8b059091d2fd9e2d60e5dd74685d971435a3e471f0bce6d096d2100546,2023-10-12T16:06:05.330000
CVE-2023-45374,0,1,e7f1257195844480b5ab4252c7ad2dfc96c3635b0d1bdb6f06b94f101e8f72a1,2024-09-19T18:35:06.723000
CVE-2023-45375,0,0,76059dcd6e9ba7e45e2b8af4dc253230088aab2bc0c3d542b3bea56d2109e241,2023-10-23T13:53:31.007000
CVE-2023-45376,0,0,1752dcacc13952823593868aaeb32cb69bcd8a15123706c8973983a514b83041,2023-10-31T18:06:10.480000
CVE-2023-45377,0,0,8a38d8223faf098b86051796f3101a98163b9ac34429e2c21be3610b867c9a30,2023-11-30T05:42:43.520000
@ -234322,7 +234322,7 @@ CVE-2023-45845,0,0,9522a3662f29e92e7ad7c10b0718fcfbd446326415f192be0026a1d413e6a
CVE-2023-45846,0,0,7e97bec05528c5d3c814716d330ec4cbbf0b8dfe300e92e8f8b68aeca1cee284,2024-07-03T01:41:56.303000
CVE-2023-45847,0,0,f7a26b5da655e9a29f01aa31d2e32a7796ef0da3d21aadd9906e8c1df71a55c7,2023-12-14T18:20:40.697000
CVE-2023-45849,0,0,4630a94faf635ed71b5e98033836bda86572afa3061550d59c00be4ed0b6e7b0,2023-12-08T00:15:07.350000
CVE-2023-4585,0,0,0c7d484dd3fd4858183e24c37b7c22e1d3749e885c104e9186641bba529400c7,2023-12-21T00:57:28.747000
CVE-2023-4585,0,1,e01dbed274463ee65ebfe5933af4ba4d70e0f55b294738ea323aa184822c558a,2024-09-19T19:35:12.583000
CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000
CVE-2023-45851,0,0,a3947611dcf22f6805d628e99aaae522253196bfe6bc115a5e6e07eee5573efb,2023-11-06T14:33:29.510000
CVE-2023-45852,0,0,9f9928a73d27493bd16960e42e3753b817edb53bf0a279e8c73f0394583e4b85,2023-10-18T21:02:05.847000
@ -237416,7 +237416,7 @@ CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac16118
CVE-2023-50172,0,0,0e77f8672f5cf0fb47b8becab367b19a56d5395eded77044b2dad65f5dff69cb,2024-01-18T14:28:59.977000
CVE-2023-50174,0,0,5231481744a295e82b51c5724a4a3afbdad4616950b393d426cf684f8bc4019b,2024-02-14T18:15:46.640000
CVE-2023-50175,0,0,1f4c148f2ad49dc23cadeda416bba9717617a9eed1ffebc27bb2042d761f8318,2024-01-02T19:53:20.863000
CVE-2023-50178,0,1,e70c7f9333304ad169a3d817a8261a36cae8eb5c6f191d06e5ee03e53b449db7,2024-09-19T16:06:36.073000
CVE-2023-50178,0,0,e70c7f9333304ad169a3d817a8261a36cae8eb5c6f191d06e5ee03e53b449db7,2024-09-19T16:06:36.073000
CVE-2023-50179,0,0,d7024dbdef420a4bf550a9373a8d6fb995c92f579a6b24fe5fa75e2141103990,2024-09-09T15:54:14.980000
CVE-2023-5018,0,0,cae5f64430f83fdd33bf69324906a6cb5316c44f52a942103dd4a7b86daf8ff3,2024-05-17T02:32:46.463000
CVE-2023-50180,0,0,0e74c4dab87377ea6e7224cae654f4c96addd7d2706381ea322da69706e6caba,2024-05-23T15:55:49.800000
@ -241188,7 +241188,7 @@ CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee3
CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000
CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000
CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000
CVE-2023-7256,0,1,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000
CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000
CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000
CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000
CVE-2023-7260,0,0,a283d80bfb35f6dd126dbb811c8254dc2cb2d619c2a0fdb098a89d48e2a7bedf,2024-08-23T16:18:28.547000
@ -241353,7 +241353,7 @@ CVE-2024-0216,0,0,5db0150a6defe94c534ea06b438d3680a2481b7203149642bcafa6eeb47bdd
CVE-2024-0217,0,0,dff0ee3a755b5789dbb3bda1883ae669fffbc3624903a03817fe2262041b1ae5,2024-02-02T15:20:25.843000
CVE-2024-0218,0,0,e0f7082bfe7bdb2b72e28d6537974d07e10b08637004dd51d50eee8295bc543b,2024-05-28T13:15:10.927000
CVE-2024-0219,0,0,b7044527e6312a645cfd11fb721216b84cfeb88504d813d0c3eb89e1835d8e0b,2024-02-09T17:15:31.870000
CVE-2024-0220,0,0,d7d2c26ce46e9e9d42929c005658acc0239b79eb08b04223165988fb993b20a8,2024-05-27T08:15:09.070000
CVE-2024-0220,0,1,4478b53c04077624854d5b69c9fe95d675429fc1d7fab33a90dc864a1050bb80,2024-09-19T18:15:05
CVE-2024-0221,0,0,50e4123bdd9330b9856aaead23e8d95b6f2e4b19cc54edeb2503c031d7426fb8,2024-02-13T18:48:37.837000
CVE-2024-0222,0,0,b3f6fc9b6decb29bb4c0f2b45d4d98de1d7ddc35add0e737e26b11cd8923ec19,2024-01-31T17:15:29.990000
CVE-2024-0223,0,0,38a64de470819b095ee0b7b4b77ec34c2ec8923a888de65b096c5951a52e2499,2024-01-31T17:15:30.487000
@ -241458,7 +241458,7 @@ CVE-2024-0325,0,0,b11f466ff4ff08fafe0e1564b77e877f7ef01996631763e0cca61be78af48c
CVE-2024-0326,0,0,46531da0f2066fdd9f046a34fce12789358ed55a6f22b205eff42d5de697942f,2024-03-13T18:16:18.563000
CVE-2024-0333,0,0,9eaf58c044c101ac9ee4da325dc0cbe7baa26316edb9c32b68718e9200d8ba0e,2024-01-18T19:39:16.620000
CVE-2024-0334,0,0,f64e24da86d08ef5624336a0a2ef7f631f77b98c0c17027395f19c584275ec3f,2024-05-01T19:50:25.633000
CVE-2024-0335,0,0,8c70dc4c2c1cd890e3b797d6942fd50c3abf750fef2989b9ac71c6205ee38bbc,2024-04-04T12:48:41.700000
CVE-2024-0335,0,1,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377db,2024-09-19T18:15:05.150000
CVE-2024-0336,0,0,9aee920f4a5a0c04ff35e8f707096c50efb4022bceb3480b4da076fedf257149,2024-06-03T14:46:24.250000
CVE-2024-0337,0,0,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000
CVE-2024-0338,0,0,70505a995548ae9a90a762e5c254ec8226f91c5690ecf3e95b0138eb38a5ec9e,2024-02-09T19:28:45.703000
@ -246192,7 +246192,7 @@ CVE-2024-24760,0,0,712e50ebe0dfd036080457db09cbfac631236bade7f3aab0fefe0bd1d6c76
CVE-2024-24761,0,0,b1f2bf902e5fec122e2292b6e3e60586d417fb53e3af18ffd9589198f195ec1f,2024-03-06T21:42:48.053000
CVE-2024-24762,0,0,35449d26fd46707c48224f8b5b5217335ce323aca77c6984e1cac20361aac3cc,2024-02-17T02:15:52.700000
CVE-2024-24763,0,0,8aa9488aba8310d408295beec746929572897f70a048552a2d0371466f18f492,2024-02-20T19:50:53.960000
CVE-2024-24764,0,1,51888f40f8d4272aad2d8cb14def9cb3125276a64923f00cc5389ceef9c8c258,2024-09-19T16:57:46.463000
CVE-2024-24764,0,0,51888f40f8d4272aad2d8cb14def9cb3125276a64923f00cc5389ceef9c8c258,2024-09-19T16:57:46.463000
CVE-2024-24765,0,0,2b41e2c8e0486bcdab8814f4f07d873fcc36842f0236f866fd2e1bdc249f0bf6,2024-03-06T21:42:48.053000
CVE-2024-24766,0,0,c955e8304ba83aae2f62f951890258afd73aa209a898d99ff634435549d8a4d1,2024-03-06T21:42:48.053000
CVE-2024-24767,0,0,96e52ab9e08a81077d985c7f3ec93901c3b769f1869cb5507b822b4ac772704c,2024-03-06T21:42:48.053000
@ -246835,6 +246835,7 @@ CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb3
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000
CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000
CVE-2024-25673,1,1,81e639b1f7fbf8754b4e267411fcc130c67ff83ee62eb8538403064c33f649ae,2024-09-19T19:15:24.093000
CVE-2024-25674,0,0,a93e87559f3310a2a7f0b0950089f8e58e9cb97b1d3ba4777163ca1197a89f40,2024-08-26T19:35:20.977000
CVE-2024-25675,0,0,557139e6badf2f7cbea8b1e635432a1b7bfe50ad3cd4ea09e589187f2a0848c5,2024-02-12T14:30:28.640000
CVE-2024-25676,0,0,a08186e93b8e72e7d0fccd86e2d99f3ceb03caa74e9fe0fb3ce31f97ab303d23,2024-05-02T13:27:25.103000
@ -248271,7 +248272,7 @@ CVE-2024-27344,0,0,f44089be578e3c3f48649a645c31f1e56b7af812f6729ae649c4c888c51a0
CVE-2024-27345,0,0,639d5d88d955f31b68d7ac65a92996a1944759655dec4dc8cdc403f6280e1a1d,2024-04-03T17:24:18.150000
CVE-2024-27346,0,0,8179d23e6ef0789d37a1db2f177021069373bc1f8d521305cdf369e9fa46745f,2024-04-03T17:24:18.150000
CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000
CVE-2024-27348,0,0,add8565b363ebc7d89e1b1994d7f3550469242b7a7f9dbd84c0a9f2f5bcf2bcf,2024-09-19T01:00:03.120000
CVE-2024-27348,0,1,e96554afb28cbad659be9176aa4ca79d5b61a879b075bffbc242daa401baea3d,2024-09-19T19:55:24.297000
CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000
CVE-2024-2735,0,0,f01bcec823b48d788d322e20cf82a4a7470344ba299463eb0cff5623d9be778d,2024-04-10T13:23:38.787000
CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e5e3,2024-02-26T16:32:25.577000
@ -251147,9 +251148,9 @@ CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea07
CVE-2024-31411,0,0,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000
CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000
CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000
CVE-2024-31414,0,0,e14364144fa3f237790ebf592477e0e40448a812dc429d2d1bc787aa72072c1a,2024-09-14T11:47:14.677000
CVE-2024-31415,0,0,d00ba0ed8019050c1160e178755b13bc22aaa5775f7d5c37e54fc4949be98447,2024-09-14T11:47:14.677000
CVE-2024-31416,0,0,c5045af1311803e878612c4da84972621f9a5f9de399d3ca1c47f45ef3f2c50e,2024-09-14T11:47:14.677000
CVE-2024-31414,0,1,e387f0c66bf477a9777c6073fbe8e1bf77c81fd3f2da5d969d5f9db7d198c8b7,2024-09-19T18:48:25.893000
CVE-2024-31415,0,1,4af626a01b2b209263b9f18365da822790629e58a8f2859d318f652182ce6cf7,2024-09-19T18:50:27.827000
CVE-2024-31416,0,1,0d8c2b6f5939f620709e7ed49bc9a2b299d23aa8d9465d6808a0e5cb060665e0,2024-09-19T19:06:59.787000
CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000
CVE-2024-3142,0,0,983e14121dea75c617117997ac50797df98bf192fa8cfa7597e476b17cc231ee,2024-05-17T02:39:44.690000
CVE-2024-31420,0,0,93cd6c74288acbee362fcfe80ff941e3294a823738c730373f8d597f177cf09c,2024-04-03T17:24:18.150000
@ -251249,7 +251250,7 @@ CVE-2024-31552,0,0,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db
CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000
CVE-2024-3156,0,0,51decfaeced6eef599bb2d824f817b3e8faaceb41748738897303b173f7baed8,2024-08-01T13:56:20.987000
CVE-2024-3157,0,0,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000
CVE-2024-31570,1,1,302362516937afe00aad1ae54e1b06de52069ec662fa4dedeb63a6ddae2290c9,2024-09-19T17:15:12.623000
CVE-2024-31570,0,0,302362516937afe00aad1ae54e1b06de52069ec662fa4dedeb63a6ddae2290c9,2024-09-19T17:15:12.623000
CVE-2024-31574,0,0,9d49c3d810249e7fdec3d7ec5acd27e5dbf702e0786215525f0f8c041faf71ea,2024-04-25T17:24:59.967000
CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000
CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000
@ -252164,7 +252165,7 @@ CVE-2024-32855,0,0,c49305c977dd2e708a0d316df4ef9be1d74cd331a1c2ffedbc125e28a1059
CVE-2024-32856,0,0,6d8137a0b9dec706e783082fa3a1037a7f0ce7ef4a6d1bed9d383583e1a8b038,2024-06-13T18:35:19.777000
CVE-2024-32857,0,0,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196183,2024-08-08T21:10:04.773000
CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000
CVE-2024-32859,0,1,6878eb303e3fed06b69428c85d734cc5e74e821709864440c8758419372d20f9,2024-09-19T16:24:39.147000
CVE-2024-32859,0,0,6878eb303e3fed06b69428c85d734cc5e74e821709864440c8758419372d20f9,2024-09-19T16:24:39.147000
CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000
CVE-2024-32860,0,0,140d176974a544a70b011e4a7385dddf6177887685faa32d97074b7714e98c8d,2024-08-16T16:46:36.203000
CVE-2024-32861,0,0,4690ae217a4b596d64e69c4e91eed7a814ce164eeb5aed983f8d559fa108dfae,2024-08-02T03:15:20.680000
@ -252358,6 +252359,7 @@ CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
CVE-2024-33109,1,1,623840b47a3d2080ddfa6fe372db92281baacbad134dc7e3c1b1fb9648b17803,2024-09-19T19:15:24.170000
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
@ -252668,8 +252670,8 @@ CVE-2024-3365,0,0,e3ada40b6344afa9237bbf3a9dbdf421d928eb8fa8993a69cd37398003bfb8
CVE-2024-33650,0,0,8f98f6950383ea7bb5fba364f4ca6f73e01e32591eac1d754836fc53112322d7,2024-04-26T12:58:17.720000
CVE-2024-33651,0,0,f2ee7352faa4d013ce2dbc2e7d6ca251932118d3e5b2422d264e03fcb1cbdc4e,2024-04-26T12:58:17.720000
CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c36e,2024-04-29T12:42:03.667000
CVE-2024-33653,0,1,f131ad381140a4aa9c30ffd8ecb2981958292f1cb9df7cad93511d6d48dc2039,2024-09-19T16:00:12.400000
CVE-2024-33654,0,1,59ce1dc0a959d8fd849b3bf72d6a089a8a29bff8045c4a710ae01079c92a98c5,2024-09-19T16:00:43.363000
CVE-2024-33653,0,0,f131ad381140a4aa9c30ffd8ecb2981958292f1cb9df7cad93511d6d48dc2039,2024-09-19T16:00:12.400000
CVE-2024-33654,0,0,59ce1dc0a959d8fd849b3bf72d6a089a8a29bff8045c4a710ae01079c92a98c5,2024-09-19T16:00:43.363000
CVE-2024-33655,0,0,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000
CVE-2024-33656,0,0,bcce08f394a095ebca60ada0fb4a4aafac76a15e930d7944ca1f9457799a1c56,2024-08-21T17:24:59.627000
CVE-2024-33657,0,0,4304e9ad6a833f4e772f3f337e66d35550f113c5280de638d62e655b681eb6cd,2024-08-21T17:24:59.627000
@ -253139,7 +253141,7 @@ CVE-2024-3434,0,0,665daf763cf280ad6e13fab45ba57a35fec69ba9e6cd1628917c4e7d75dedc
CVE-2024-34340,0,0,ce6bbf8ca46ec29426c800768c938c7ed5fd800a09085acbf821400587996e11,2024-06-10T17:16:28.827000
CVE-2024-34341,0,0,874d0ac87ba692c788b408f2928cb7b384b1146ea2fb2be7ea431c974b164434,2024-05-07T20:07:58.737000
CVE-2024-34342,0,0,3e142b43b7b4afad7d384023ad82da3d4505656b73350774ba0911c6409bd959,2024-05-07T20:07:58.737000
CVE-2024-34343,0,0,066fdbea031320951bbbb7067bbd91806cf74901441b806a1f8acbcf80dda5d7,2024-08-06T16:30:24.547000
CVE-2024-34343,0,1,a3b005bc8eba213738fde9a67dd414ba97bac0d8e4da53b457c6cda9ca8b4f39,2024-09-19T19:57:52.007000
CVE-2024-34344,0,0,f5a9ba01025bca91b189ed9bcd3017020d0db224ae447d4b59293ea787794849,2024-08-06T16:30:24.547000
CVE-2024-34345,0,0,af3be7ad8b1b1d44ae22efd1e5357ec15980df2dfb15c98b9c630c2989cf22cf,2024-05-14T16:12:23.490000
CVE-2024-34346,0,0,461f54cd153daac8a3bd1e483b3a64b76b9087848b91f7f6ce6604a27c331020,2024-05-08T13:15:00.690000
@ -254668,8 +254670,8 @@ CVE-2024-36414,0,0,3a5660a66d942114556bd0815630fa2959614be320647325e5bb5b0dd386e
CVE-2024-36415,0,0,3d862aa9f2826b7b61961813da971e9ec48ebb49fe79a256d77ce95e1decf2be,2024-06-12T17:58:53.497000
CVE-2024-36416,0,0,d6ce7543acefc397e88a4e607f8e8cd9d6d7c5889aa1948b360b7ced938d60dd,2024-07-22T17:15:03.773000
CVE-2024-36417,0,0,1ea038de4e5acdad4256a27455220cbea49cafc564bda7423cce84beb58771db,2024-06-12T17:58:04.477000
CVE-2024-36418,0,1,de9964a7d485c183b822b8eee7a7bbc85f459ebb87460abd5abb1e92f4c47751,2024-09-19T16:28:35.647000
CVE-2024-36419,0,1,4f7a601ca880551c5e81b870e61d1cdfdece76b4b4881ac77c77b77ddf8951df,2024-09-19T16:31:00.760000
CVE-2024-36418,0,0,de9964a7d485c183b822b8eee7a7bbc85f459ebb87460abd5abb1e92f4c47751,2024-09-19T16:28:35.647000
CVE-2024-36419,0,0,4f7a601ca880551c5e81b870e61d1cdfdece76b4b4881ac77c77b77ddf8951df,2024-09-19T16:31:00.760000
CVE-2024-3642,0,0,18761de76cd7cd0e44650c50bce43f4d6feb32d4cdbac8c295b7b13430f4f486,2024-05-16T13:03:05.353000
CVE-2024-36420,0,0,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc260,2024-07-03T15:29:45.557000
CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000
@ -255684,7 +255686,7 @@ CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d
CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000
CVE-2024-38014,0,0,667a2ca3aa42729c9c1f636c1bc19b21cfc3cbfc4eb15603accaad3e335421c5,2024-09-12T01:00:01.133000
CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000
CVE-2024-38016,1,1,b2d3139c2c71c4856b736470c4446e549feac25fb459136c9a56122bc3ca8899,2024-09-19T17:15:12.947000
CVE-2024-38016,0,0,b2d3139c2c71c4856b736470c4446e549feac25fb459136c9a56122bc3ca8899,2024-09-19T17:15:12.947000
CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000
CVE-2024-38018,0,0,60b7566e82c4496b0dca7d4fdef697c13c6221141b8468138e42395de75492a1,2024-09-18T15:04:58.240000
CVE-2024-38019,0,0,da6757aee92bad96249ea36fde1018805a15808ac2fa25fa1dd2f958ebdbe19f,2024-07-11T16:21:19.367000
@ -255991,7 +255993,7 @@ CVE-2024-38372,0,0,3d54cf49c69f5dcfca10b8ed801434d5b29c7aa6896635c0f913f2cd2b718
CVE-2024-38373,0,0,871cf732e8d89daf91760031051bd3f20f88f5dad720fab8628df5921c7be18f,2024-06-26T15:02:05.100000
CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000
CVE-2024-38375,0,0,626cc37017b5b99d342165d2bf910513bdb2fdf5a18a0e825a4ce243860e1792,2024-06-27T12:47:19.847000
CVE-2024-38379,0,1,24d3b7135776280dd8cbf565222ffc49917d8846e2a67b6430e1fef8b4588944,2024-09-19T16:46:38.287000
CVE-2024-38379,0,0,24d3b7135776280dd8cbf565222ffc49917d8846e2a67b6430e1fef8b4588944,2024-09-19T16:46:38.287000
CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d07b,2024-08-06T19:35:06.410000
CVE-2024-38380,0,0,627f70dd365a9409327379c2bf73f222a1302e203d88da4a7b50dd6bb1c7485f,2024-09-17T18:15:03.680000
CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000
@ -256565,7 +256567,7 @@ CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99c
CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000
CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000
CVE-2024-39316,0,0,0330ee1f4f66ad5c4fc8d75b41d6a1a5d4b46137b39514674c0311e081ce6ff7,2024-07-02T17:44:45.700000
CVE-2024-39317,0,1,bae2aa4f7badec0edc31db102a83207f0bd6d840ba46b9f715d3db216be3b8e0,2024-09-19T16:08:43.417000
CVE-2024-39317,0,0,bae2aa4f7badec0edc31db102a83207f0bd6d840ba46b9f715d3db216be3b8e0,2024-09-19T16:08:43.417000
CVE-2024-39318,0,0,d84809b5481c68217d59c341f89a33a753d6db4b36e662db9d71acc330a074f7,2024-08-01T12:42:36.933000
CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000
CVE-2024-39320,0,0,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000
@ -257086,6 +257088,7 @@ CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
CVE-2024-40125,1,1,cc8392b182c6e8c7ee622740e83412c4a0ff89e87d8cc4c186b22da6539e9ed9,2024-09-19T19:15:24.350000
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
@ -257204,7 +257207,7 @@ CVE-2024-40554,0,0,975eaaed007d6b505cb8ba22ce57b12be37e7b3d2ebcc8a575de58b8f5a20
CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f460,2024-07-16T13:43:58.773000
CVE-2024-4056,0,0,7c25f0a1764fd01965b39ebc13bb94a8ae53607d9ce0dfc30a27083c9e919722,2024-08-27T11:15:04.430000
CVE-2024-40560,0,0,08dc0b5066047c5e119a09d69ea20c085f8549859adcaecbbf38995d7d2e2e54,2024-08-01T13:57:50.440000
CVE-2024-40568,0,0,fa33a3ce565335eff8c471d4854e347140063afa111c56d97dc2dc6d636b2948,2024-09-18T21:15:13.390000
CVE-2024-40568,0,1,293cc67ac7cb929d50728436658796c25ce534bf9199331065d8c719678bb7f3,2024-09-19T19:35:13.880000
CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000
CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000
CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000
@ -257406,7 +257409,7 @@ CVE-2024-40860,0,0,e36dab9e833d088b935ab68c9a151e9f1fa4c0b43f03d6bb0621ce4e4428b
CVE-2024-40861,0,0,d87cf92bd694c19d1e4d3aca5f00c6e43dee289f9de1a39f0fc2b781db69db0f,2024-09-17T15:35:08.583000
CVE-2024-40862,0,0,41adab65858c72ffe5166360c0c7d08451acfb072731fac3b645799d62b8fb88,2024-09-18T08:35:48.760000
CVE-2024-40863,0,0,8102a55f22f39834a5de79e8de0f022b089678ae9882643f5ee65b65c051fabf,2024-09-17T00:15:49.793000
CVE-2024-40865,0,1,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000
CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000
CVE-2024-40866,0,0,ffb4d4555ccfaa65df4084c4704bde934d69f675e3f09339fb6d0f4bf47c0770,2024-09-17T00:15:49.840000
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
@ -257826,7 +257829,7 @@ CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b5189
CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
CVE-2024-41564,0,0,3f9573f6925d935097a5479628729abea72980995a08b63ebbf863a6de0d308b,2024-09-19T14:40:32.270000
CVE-2024-41565,0,1,09b9917fbb2f411622e9ea1f75fe318038921a2fcca27e9c7f8474c7ccbe8a12,2024-09-19T16:19:59.317000
CVE-2024-41565,0,0,09b9917fbb2f411622e9ea1f75fe318038921a2fcca27e9c7f8474c7ccbe8a12,2024-09-19T16:19:59.317000
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
CVE-2024-41570,0,0,548cd2006d0021700d97d9ac462942b0586c18cb85e20f0c023fdc6e3f8676c8,2024-08-29T13:32:21.020000
CVE-2024-41572,0,0,e3312852513c75151c7b09071c0730654908f266b196f942a02a8abd098a0bd7,2024-09-11T14:15:13.380000
@ -258608,7 +258611,7 @@ CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca7
CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
CVE-2024-42698,0,1,de1720a9d956d361c16c9949dd2868e63ee7adfae9f7ccbc87c98136280e24e5,2024-09-19T16:29:51.217000
CVE-2024-42698,0,0,de1720a9d956d361c16c9949dd2868e63ee7adfae9f7ccbc87c98136280e24e5,2024-09-19T16:29:51.217000
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000
@ -259488,7 +259491,7 @@ CVE-2024-44575,0,0,201a6ca7c7ab73c1cf72eb94fa46c058ee5fb2f214506723411e1243ae73d
CVE-2024-44577,0,0,f23b5398825615b1e4c9cdd4a9ee17debd24c87e40c16b163c6e9227921995f9,2024-09-12T12:35:54.013000
CVE-2024-4458,0,0,0a429f9bf96fae3ee6bbb1cf09933ff34e8fcd6340740204bd4095a557c4fb2e,2024-07-24T20:23:12.307000
CVE-2024-44587,0,0,df65b03ef618d179da9d66b0f4fc4c4e495ab75863a2207f1a4d99901686f98d,2024-09-05T17:44:56.007000
CVE-2024-44589,0,1,8cb7fe0028eed391be14922113778103f1f7a9710ff1959caf828ca38391a02b,2024-09-19T17:35:04.797000
CVE-2024-44589,0,0,8cb7fe0028eed391be14922113778103f1f7a9710ff1959caf828ca38391a02b,2024-09-19T17:35:04.797000
CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000
CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000
CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000
@ -259745,7 +259748,7 @@ CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000
CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000
CVE-2024-45159,0,0,536b41a2ee45b72a77485ff00b0df03c600eee1ed452fbccbec7bdbd95c0104a,2024-09-06T12:08:04.550000
CVE-2024-45159,0,1,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
@ -259760,7 +259763,7 @@ CVE-2024-45172,0,0,68b3dace475f9bcf51f79da5da4aa2b3c04841de6dc44424481c247078201
CVE-2024-45173,0,0,9a54bf008dec04451b7071ad4cee60b11c2ddc76ef8f26e46ea5715d67b0ea43,2024-09-05T18:35:11.413000
CVE-2024-45174,0,0,2ba63c333cfe37e6c7dca9f72909d21c7893acb52b292b0e6cf7a4a15b777141,2024-09-05T12:53:21.110000
CVE-2024-45175,0,0,4ada181a2aa083d471c5722f19453f1bfb3dcb4512c65292efacb2e8f687f29f,2024-09-05T18:35:12.220000
CVE-2024-45176,0,1,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000
CVE-2024-45176,0,0,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000
CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000
CVE-2024-45178,0,0,2894143084503cc7bb4d728541a98225973d7da963e85745983ffa8b8255b936,2024-09-05T17:44:56.007000
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
@ -259823,7 +259826,7 @@ CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e
CVE-2024-45300,0,0,371ea055cbd370f2315f57d501b2d8bde7fe9993dc271953659e5b000db99936,2024-09-06T16:46:26.830000
CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000
CVE-2024-45303,0,0,0f2993ec35c2f5c69a86f92f14083da5a1f9682262497cdf98941162719918c3,2024-09-18T20:25:05.807000
CVE-2024-45304,0,1,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000
CVE-2024-45304,0,0,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000
CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000
CVE-2024-45306,0,0,2089f2b015e15041c3f3807cc6f2c8eb1cf893208c28e4b1ca171ff53a3a8feb,2024-09-03T12:59:02.453000
CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000
@ -259861,8 +259864,8 @@ CVE-2024-45395,0,0,40bba716ba89648b0a5b0a469128bfb2472f289be140a10878a9431641f22
CVE-2024-45398,0,0,7758f6d65fcbad19eab77bcca68b8445fb5c0f0afca8b3214cdef86ff36248a6,2024-09-17T20:15:04.670000
CVE-2024-45399,0,0,037a7bffbd0f8d9091903d0d9148831df46e7343b0a57250b24ff56b22720edf,2024-09-05T12:53:21.110000
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
CVE-2024-45400,0,0,af1e2f79a14b2efa09c2579698273d7be8e8e6f2c9b71f5e572cda7963b006a6,2024-09-06T12:08:04.550000
CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd48835a,2024-09-06T12:08:21.290000
CVE-2024-45400,0,1,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000
CVE-2024-45401,0,1,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000
CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000
CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000
CVE-2024-45407,0,0,363c12723797ac0c72d1d271ead356acc799cc8a41f14636bd37d7f20defb6ac,2024-09-10T17:43:14.410000
@ -259880,7 +259883,7 @@ CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd
CVE-2024-45435,0,0,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797c28,2024-09-03T17:23:36.073000
CVE-2024-45436,0,0,285ce8c7d8a1a73359dbcdd8ed12fdef35f675e020b230adf62e4aee88352a8c,2024-08-30T16:08:54.840000
CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c1564,2024-05-24T13:03:11.993000
CVE-2024-45440,0,1,5c40cf851b4b7b9412ff4be7ed9eec976a4116ec7f3a4af3e7cd032e9d9d181b,2024-09-19T17:38:40.100000
CVE-2024-45440,0,0,5c40cf851b4b7b9412ff4be7ed9eec976a4116ec7f3a4af3e7cd032e9d9d181b,2024-09-19T17:38:40.100000
CVE-2024-45441,0,0,5d4634290df0954dd0f61dff1649f0dd3d3d4ad0fc1e8ec875e3be2f2406d8e3,2024-09-12T19:35:47.880000
CVE-2024-45442,0,0,88ceab2d364754645573afab825dc9db7db1156b26adadd90889beed39cf5305,2024-09-13T20:00:30.680000
CVE-2024-45443,0,0,162552df88a79f08b277538012a14f30ef91af105cdfa5945ebbfc7ec02b8e03,2024-09-06T13:33:10.347000
@ -259894,10 +259897,10 @@ CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97a
CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000
CVE-2024-45451,0,0,5229461646061f5229c33d4bf801b0a9f7047a3683ddb2578fb28570321f2734,2024-09-17T23:15:20.970000
CVE-2024-45452,0,0,fdfee902792e194b32d188f2f974cff27f1fb2a2547b725b9bb68c5c8e0a2fab,2024-09-17T23:15:21.183000
CVE-2024-45455,0,0,2252ed0190aceaaf231db9e13c20002f9f0347dbc9cd3d6637ac9295250f3d43,2024-09-16T15:30:28.733000
CVE-2024-45456,0,0,f24597a7e3d48154883583103775982966f08c6eeafb8e5ace41268c1fcf3230,2024-09-16T15:30:28.733000
CVE-2024-45455,0,1,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000
CVE-2024-45456,0,1,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000
CVE-2024-45457,0,0,56f051ff4ecd4b6bed95d9151f6e0b39eb3d323739c8a3289fa8218221d2fc6c,2024-09-16T15:30:28.733000
CVE-2024-45458,0,0,40cddece72fc94745b6e482a4da9ccb4b2ab5ddfcc0bf5466a7b36c8f5eb9014,2024-09-16T15:30:28.733000
CVE-2024-45458,0,1,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000
CVE-2024-45459,0,0,4154d879d23930c356c924ee9751025192ea472198f82d912c4042ce38a9f5ab,2024-09-16T15:30:28.733000
CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000
CVE-2024-45460,0,0,7056065a678a74d2d3d00e0fb051b2bcdebb702f17f31078c0bb6fea26b93765,2024-09-16T15:30:28.733000
@ -259924,7 +259927,7 @@ CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
CVE-2024-45537,0,0,522e8ad70c4a2b88082c6938714c807f5fbe9d880fbc938f7c7e90871d6ceaae,2024-09-17T19:15:28.157000
CVE-2024-4554,0,0,92f30e92e4fc7deaf96b5e461132de3163a1189a641d3cd890f26d9e64523486,2024-09-12T15:01:12.217000
CVE-2024-4554,0,1,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000
CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000
@ -259955,7 +259958,7 @@ CVE-2024-45617,0,0,6cb16d6fbb6421ff7c08177427efbe84e4a03cb3cf72e212ba5673d3ad33a
CVE-2024-45618,0,0,dc2dc7fd3bf0d86469d9d1e7cf8afe886c6a0db83c5b7c56e1d5c7bc488c4153,2024-09-13T16:30:27.693000
CVE-2024-45619,0,0,19913ec071f09571eb2fafb85b3bcf05650473cef15788106e54de572df55757,2024-09-18T09:15:05.227000
CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000
CVE-2024-45620,0,0,4b93eb131fcc5aa370c611a1d350fa96cf799a590a6dd2ccf111caa79d7e72d1,2024-09-12T19:38:16.130000
CVE-2024-45620,0,1,62d7efd1f4f3b2c671c5ae6f75d170d2e8f1f728e1204e1922e6a8c5eec065f3,2024-09-19T19:21:38.653000
CVE-2024-45621,0,0,0e87271e3b523f5d125d92dc504ca3a7772b99de219d6f52d1ecafc891e937da,2024-09-16T17:28:53.437000
CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000
CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000
@ -259983,7 +259986,7 @@ CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df6109
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
CVE-2024-45752,1,1,011305e5643eeb4a93bf894c37aad5e6746c1482bd06f4dd86def3fd52eea26e,2024-09-19T16:35:06.277000
CVE-2024-45752,0,0,011305e5643eeb4a93bf894c37aad5e6746c1482bd06f4dd86def3fd52eea26e,2024-09-19T16:35:06.277000
CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
CVE-2024-45769,0,0,92aeaef10977321b3b8f880452f808da2ba9009b0d38d64b0d275ffae85a5d17,2024-09-19T14:15:17.120000
@ -260035,8 +260038,8 @@ CVE-2024-45856,0,0,0d2d555a4be2f7d0582132e7868cb1ae44e7be28b33194ae92062d7b37f54
CVE-2024-45857,0,0,baf58007ae785d8a411fcf58ab797e8aa621cae99978a873f3918c60d00cf497,2024-09-12T18:14:03.913000
CVE-2024-45858,0,0,26e716964960a7625743254ab836d7c358ad6927670be1bca3f8d6e0ddda0dbf,2024-09-18T15:15:16.333000
CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000
CVE-2024-45861,1,1,f2700b8537298b1d77c39a6181a74a65e0b5407cbb7c0f50791135712d1ab8bf,2024-09-19T16:15:05.103000
CVE-2024-45862,1,1,8bee6ce34dafde56e12a20a08c53abf8f2aee4852ffb0aff5a366ec400a7c326,2024-09-19T16:15:05.227000
CVE-2024-45861,0,0,f2700b8537298b1d77c39a6181a74a65e0b5407cbb7c0f50791135712d1ab8bf,2024-09-19T16:15:05.103000
CVE-2024-45862,0,0,8bee6ce34dafde56e12a20a08c53abf8f2aee4852ffb0aff5a366ec400a7c326,2024-09-19T16:15:05.227000
CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000
@ -260093,8 +260096,8 @@ CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef
CVE-2024-46362,0,0,19797b772fedfa56b8ab1944bfa10d47aee5c75ee333d19ae89a45da58afb3c6,2024-09-17T18:35:02.140000
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
CVE-2024-46372,0,0,fd6f56a0663f220726a1bac55ab58f9ad10bc05a60b983463690dc99ae056ea6,2024-09-18T21:15:13.443000
CVE-2024-46373,0,0,7e35dc6500a4231fa63976e944e360586157ff1c000ec1338e970f1d2cf36139,2024-09-18T21:15:13.497000
CVE-2024-46374,0,0,2d124efc7e040a46a76f3f4ea0cc4f1ea6dc1b6fe7a5ac9c6be3c92ddba5c018,2024-09-18T21:15:13.543000
CVE-2024-46373,0,1,26308fac89234bd0c4e6545029c0375bca524ac42183e23bc115426b28dd097d,2024-09-19T19:35:14.767000
CVE-2024-46374,0,1,d8f5ae0d53687ee2132192046d5833100ce6e39c88021fb4246bbf0f13d8b372,2024-09-19T19:35:15.573000
CVE-2024-46375,0,0,a3753b0b860f3107bde948855a197ee1efaa17527c91f22e315c5003ce34e48c,2024-09-19T14:35:06.727000
CVE-2024-46376,0,0,a3c7dd3b4bc749abac101cd27fd7d78b57ef129d32ef5359aae71578abaf0c50,2024-09-19T14:35:07.493000
CVE-2024-46377,0,0,95e91e17e2ab812f3da9298bb3d6639e1f6afea01389da755fb47626e16ccaef,2024-09-19T15:35:09.843000
@ -260175,24 +260178,24 @@ CVE-2024-46678,0,0,0e842f6f0546edbddbc3c711ac91deff93c4a1dd44f16ff31c31239d48d66
CVE-2024-46679,0,0,5bde69d05e3c296a2601ee086688ce4b06bc49b8b5611729b2be82e470bb0f3d,2024-09-13T14:06:04.777000
CVE-2024-4668,0,0,ecbe5c3985983203e802de76c9f88e6fca1078853835be834d70b53a54cc9e61,2024-05-30T13:15:41.297000
CVE-2024-46680,0,0,53c6bf89a5bc3949c31b94cf312216e18ee2de106f93d5214fdad7ca6fdc356e,2024-09-13T14:06:04.777000
CVE-2024-46681,0,0,1e50ea04845187a91f4f21406f7e93a07cc0e4dfd59a8462802044e628fe7824,2024-09-13T14:06:04.777000
CVE-2024-46681,0,1,66e176f13756dcc0d8ab331fd0f39d2f2c349ffd10d9d4cbb6d64818840f1c2b,2024-09-19T18:10:49.623000
CVE-2024-46682,0,0,ac171974a7e950a314e59d0243b9e9f062b63a309ff607f2a164bec5594c8099,2024-09-13T16:52:02.067000
CVE-2024-46683,0,0,5299c97d1fc80f78dbfc5ccddf1bf7e66a8882d99e8d0b9ff70c92161eec2568,2024-09-13T16:52:14.373000
CVE-2024-46684,0,0,5a44bb026dfdb6b73fcc4c9fa21162b9fc4154517e61f7ace6c17f322254cebc,2024-09-13T14:06:04.777000
CVE-2024-46684,0,1,3dd8d6161a75a02a3be01356f95b0f512dd073e666142fad3ca14e59b093e391,2024-09-19T18:04:22.623000
CVE-2024-46685,0,0,1b48d894cf37f05d909d964324e0bdd0c004048501a99e5c3c6ac200b20fa0d2,2024-09-14T16:00:55.547000
CVE-2024-46686,0,0,4afc0303c037a90aa176527c5c1d12aa028b7efb97890dbc9b5bee7f3de95eed,2024-09-14T16:16:33.087000
CVE-2024-46687,0,0,6df93b329e4c9b4912f75ba797c3862dd3825d176bc4b8d52421481a95ca02a9,2024-09-14T16:17:33.073000
CVE-2024-46688,0,0,d2d8d862ff8f73fb0df2a233ca2e46f800252dbe84e09f5f72fee3526fe8b520,2024-09-13T14:06:04.777000
CVE-2024-46688,0,1,742ceea25117b25b2bd80750a6e9911adc074107f75e2746760ff11b497a9894,2024-09-19T18:01:43.037000
CVE-2024-46689,0,0,d4a917f4af8389cbed7fe97091a2204305beeb74bbc4442a420d1eb90798629a,2024-09-13T14:06:04.777000
CVE-2024-4669,0,0,a0976f7ea3148ea450eb6167436e6be2dce8d6ef83862711f573c56cae3ce5e3,2024-06-13T18:36:09.013000
CVE-2024-46690,0,0,5af0b3656d8665491f28716ea7603bb0aea5a272e8c1bf40ddd30a1255705d3f,2024-09-13T14:06:04.777000
CVE-2024-46691,0,0,8d55b848b81c7cb2c778de047700fe79e5a572a7f93e6b725cb6041c3a622df9,2024-09-13T16:52:21.057000
CVE-2024-46692,0,0,9bca0a6bdb61a96f9bc64b59f8db4ea9997f8804d892b4802b2be44c689f8375,2024-09-13T16:52:31.627000
CVE-2024-46693,0,0,f40beda26d58dd63f40fce79476da79807c21e41b509da1c16e262d523bfeffd,2024-09-13T16:52:41.270000
CVE-2024-46694,0,0,f3c662a07d20538ea5dd6d89e6508a4bf0609b9b63e75079997ab6c6b086a693,2024-09-13T14:06:04.777000
CVE-2024-46695,0,1,2c8af9d60124692d9b6ffbee8d85890498f0625ad48f0bbdd570b3ffb4d38d01,2024-09-19T17:59:23.113000
CVE-2024-46694,0,1,06269357f08eee761908cfd9b04c5fe20fc860e28bbdb44b42b210145df9925d,2024-09-19T18:16:22.247000
CVE-2024-46695,0,0,2c8af9d60124692d9b6ffbee8d85890498f0625ad48f0bbdd570b3ffb4d38d01,2024-09-19T17:59:23.113000
CVE-2024-46696,0,0,4daffe95396a7dfd0d7acd939b4305def2a9b7710efef4f9245a07291857d3de,2024-09-13T16:52:54.363000
CVE-2024-46697,0,1,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000
CVE-2024-46697,0,0,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000
CVE-2024-46698,0,0,dd18a350b42292bfa692742bfea20969ac387a40a6df6f50c4209832f6c49c3c,2024-09-13T16:53:03
CVE-2024-46699,0,0,06698b262190134bec89f3644bb256a03fde8105e3a035b81d99b56d18cdb050,2024-09-13T16:53:10.620000
CVE-2024-4670,0,0,08919fb788216a4ef8fb408ade2563afef66ea572b0f16375f44123bc9f15eb1,2024-05-15T16:40:19.330000
@ -260202,7 +260205,7 @@ CVE-2024-46702,0,0,5aad35e2d7d1ccbb97d6a3251704aac50eabfd028ebefa2b04bd88e7e42de
CVE-2024-46703,0,0,e11c195a259f3df31398758ffb3ccf027e5548f4969c954514a9f4cce3608756,2024-09-19T13:33:57.563000
CVE-2024-46704,0,0,f78588eb2f2a44341e8643254e6b27a014ea20b715f19c482965344be2a2c1ed,2024-09-19T13:32:39.257000
CVE-2024-46705,0,0,90099fce686500ca9a4af7d5dad56b9132c185dd3789d400df5fe529ab883451,2024-09-19T13:30:44.133000
CVE-2024-46706,0,1,42db06665631a62d321d7edbfb78183067249013c54e16b47c4a6e6ba7502d1b,2024-09-19T17:51:07.670000
CVE-2024-46706,0,0,42db06665631a62d321d7edbfb78183067249013c54e16b47c4a6e6ba7502d1b,2024-09-19T17:51:07.670000
CVE-2024-46707,0,0,74dcaf9ed923021710159c21f486f26a1f03ecaa0f7a649f40a6ffec6ab91290,2024-09-19T13:29:46.757000
CVE-2024-46708,0,0,87dc269451b066b6993dbb5930897253927943ffe2fed7d96f86c37f09c45816,2024-09-19T13:28:49.483000
CVE-2024-46709,0,0,4fbf8864408f806038214e80c57c5097ea72706b241ae096cb98bc0895ec0e4c,2024-09-19T13:26:24.140000
@ -260367,7 +260370,10 @@ CVE-2024-4712,0,0,8c9912a72fdb973e445c03f0c431e473f67586d80716ea23b3c04f9af648d8
CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000
CVE-2024-47159,1,1,37cd59fd117f5cf50861cd88b8abebb1e1884db1ba94dfcf9ceb69cfa69bb528,2024-09-19T18:15:09.803000
CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000
CVE-2024-47160,1,1,3f6af29a5418c0ea31328b241c0a67d429ed0f2ea9a2a4795d9856d4f3850696,2024-09-19T18:15:10.013000
CVE-2024-47162,1,1,7a918a68f616964c3a64fa06f015fde786d9abd7d452c1eb72d0cb1650c8a0a1,2024-09-19T18:15:10.227000
CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
@ -261533,7 +261539,7 @@ CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
CVE-2024-6052,0,0,32d564c18d4d17b199f574c28ffe31c1fb3d7a1b6f6859f56e252f37a5a22c28,2024-09-16T14:15:13.410000
CVE-2024-6053,0,1,bad8fea9e1557f6e3942b82b20978ade64544c8438a72e97ebb03355ea705f3f,2024-09-19T17:22:36.697000
CVE-2024-6053,0,0,bad8fea9e1557f6e3942b82b20978ade64544c8438a72e97ebb03355ea705f3f,2024-09-19T17:22:36.697000
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000
CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000
@ -261565,7 +261571,7 @@ CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5
CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
CVE-2024-6086,0,0,28c3e2540b87e65e53355efd52e7428f1a054dcf2c80ab6446e2a8ede4d737ac,2024-09-19T15:57:50.267000
CVE-2024-6087,0,0,bd8b7ffb5790bff23459a1175abf6870ac2ed6fcd6a6fe860d24726af8d03b75,2024-09-14T11:47:14.677000
CVE-2024-6087,0,1,2f3eb6d59e26864799858a36adcfa783331a6d1634807496019392d9a2953a02,2024-09-19T19:32:14.710000
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
CVE-2024-6089,0,0,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
@ -261612,11 +261618,11 @@ CVE-2024-6137,0,0,e58f6c0787a0fe87e16b6d9ce7e652fbe72d3a55d70774470af6282c4fe57c
CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000
CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000
CVE-2024-6141,0,0,1d5a717ee6e758ce9e5016396a1ddc2e4691c96cb20e6973eb41cca889dc4be3,2024-08-23T16:53:48.270000
CVE-2024-6142,0,1,b5701e63ddcbaf9774de387fff373143cf14e6ab10afa024be2e2ac7f6aaa481,2024-09-19T17:47:00.270000
CVE-2024-6143,0,1,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1b7,2024-09-19T17:47:33.370000
CVE-2024-6144,0,1,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000
CVE-2024-6145,0,1,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000
CVE-2024-6146,0,1,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000
CVE-2024-6142,0,0,b5701e63ddcbaf9774de387fff373143cf14e6ab10afa024be2e2ac7f6aaa481,2024-09-19T17:47:00.270000
CVE-2024-6143,0,0,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1b7,2024-09-19T17:47:33.370000
CVE-2024-6144,0,0,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000
CVE-2024-6145,0,0,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000
CVE-2024-6146,0,0,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000
CVE-2024-6147,0,0,2d9a1014611d118f27efff7052050ed6f6b11c1b39720db4ab48899a60221b47,2024-06-21T11:22:01.687000
CVE-2024-6148,0,0,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000
CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000
@ -261703,8 +261709,8 @@ CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb479326954
CVE-2024-6243,0,0,af3e968f15710e52d1218645566e4f111ef2efb93699a091cf90e62d1a93b4e5,2024-08-01T14:00:17.580000
CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000
CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000
CVE-2024-6251,0,1,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000
CVE-2024-6252,0,1,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000
CVE-2024-6251,0,0,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000
CVE-2024-6252,0,0,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000
CVE-2024-6253,0,0,01b6d1d17531ea68c5548dabbc96f038e6efc11a085c095b9b4d1329d8cd997b,2024-09-06T16:57:26.650000
CVE-2024-6254,0,0,fde0fafe626682898f8bbfd16af33ff0c947c80d91ffee5375f17b755d365a35,2024-08-08T13:04:18.753000
CVE-2024-6255,0,0,4b23bc0ba79484acd9ec84f5e33767095b874b70e803764459f9fd056777671c,2024-08-30T16:15:10.467000
@ -261716,9 +261722,9 @@ CVE-2024-6262,0,0,295b38dc67b71cbe5bd8be303a870636c7b9e2de2092da87a091242e8bc362
CVE-2024-6263,0,0,ea6dc54bae9a6133bb18ce010b56ac510f28080d60dc0881662f41b01cd3c1ce,2024-07-03T18:24:27.877000
CVE-2024-6264,0,0,ad70cfe4611bfb10e28e7f1e9ab3f1d3972f21098785857aa1fab5f0efe27af2,2024-07-02T17:57:31.737000
CVE-2024-6265,0,0,31e31d78b3c7a6511102ac434eb579b5f62a9a1e1457304e8802b01e8e49e130,2024-08-01T16:53:56.223000
CVE-2024-6266,0,1,97cf72285d45ed69b5824e8f81cb5259b6243a784781e18f8a3198493b251b90,2024-09-19T16:53:36.647000
CVE-2024-6266,0,0,97cf72285d45ed69b5824e8f81cb5259b6243a784781e18f8a3198493b251b90,2024-09-19T16:53:36.647000
CVE-2024-6267,0,0,33ac6ef4afec730cb116f41e289137ef2658a3490dc4f1e070ef9295b99330a6,2024-09-06T16:56:11.543000
CVE-2024-6268,0,1,420aef07aef5af0532c73abc04760f1ddb146531b4514a62ba8c9eb47bd8747b,2024-09-19T17:06:24.663000
CVE-2024-6268,0,0,420aef07aef5af0532c73abc04760f1ddb146531b4514a62ba8c9eb47bd8747b,2024-09-19T17:06:24.663000
CVE-2024-6269,0,0,5faaf462a19676e34593dd0a0afbe0cb206ebbb8a7e70c532ba34e4117e361f3,2024-06-26T19:15:14.483000
CVE-2024-6270,0,0,afb158e2a27846102675d7c9b52684128d3f9cc58ddd69c86dbb7ca5aa644315,2024-08-05T14:35:08.040000
CVE-2024-6271,0,0,427d631db618dffd77aaff0c6f93b041e9536bc7bd39022d5cb6f3d2036ef186,2024-08-01T14:00:18.090000
@ -261980,7 +261986,7 @@ CVE-2024-6576,0,0,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070
CVE-2024-6578,0,0,8257f7484236e424ea5fc80479c626bf5a4575b6af53231a1ef13b8f880d14c5,2024-08-20T14:51:08.483000
CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
CVE-2024-6582,0,0,5ee990245e7579fed88b2c8c107090ca6558ea2076f0042f82b0e3b6f6141aab,2024-09-14T11:47:14.677000
CVE-2024-6582,0,1,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000
CVE-2024-6585,0,0,21557c5e847867bddd52df3ea3c8bef1c24ed1d84f80217fb776a5f25fb72332,2024-09-03T15:35:16.350000
CVE-2024-6586,0,0,fae1812021b838f78d9872593f00167428e312ab2f13f81f35231f528789de0a,2024-09-03T15:35:16.577000
CVE-2024-6587,0,0,a3f7b0fbe3d852ff05f7aac13ae8f9e1a110910501abae4c571a6fba27015678,2024-09-13T16:37:22.997000
@ -262181,10 +262187,10 @@ CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c1
CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000
CVE-2024-6856,0,0,19b5d479e1e69973e8f497d2ae00f38aea8ffd7644169a9718f707450440aae4,2024-09-11T16:20:45.503000
CVE-2024-6859,0,0,5a84bd798224932fef849d8b4793f644b651b362a6172317aad467bf1bad3991,2024-09-11T16:19:18.517000
CVE-2024-6862,0,0,fd393379df312bec9e99e771b6e9ca6b56acd2b8ba0014c4d95a4e539000e755,2024-09-14T11:47:14.677000
CVE-2024-6862,0,1,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7e6,2024-09-19T18:37:20.910000
CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000
CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000
CVE-2024-6867,0,0,4c5421a734def1499f39e8ebdf18304362d294435484aabee9a2355391e09ba7,2024-09-14T11:47:14.677000
CVE-2024-6867,0,1,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000
CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000
CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d5379e,2024-08-22T12:48:02.790000
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
@ -262717,7 +262723,7 @@ CVE-2024-7585,0,0,c8cbc83b6349dead88df56624342a371a1668d621fa6cda31e8fc0e9835fc3
CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000
CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000
CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000
CVE-2024-7591,0,0,5ffbb24db28774add77bc3656c2e21a5720e9e9b63d1c53541af99087acd2dba,2024-09-06T12:08:21.290000
CVE-2024-7591,0,1,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000
CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000
CVE-2024-7593,0,0,4da85e7ccbdae09b92bad5968b875ba9d0537591e39a68c4cb01282a2ce99145,2024-09-06T22:13:21.197000
CVE-2024-7599,0,0,425c886d21e000ef875307fcd7ee082e5b24e31594a14a2fc6a0c956123982af,2024-09-06T16:46:26.830000
@ -262737,7 +262743,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
CVE-2024-7618,0,0,a6149ec34b2a8c7be413bc36f1943fe9aebcb6fe380868fee0becf4e0c41b606,2024-09-10T12:09:50.377000
CVE-2024-7618,0,1,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00
CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000
CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
@ -262769,7 +262775,7 @@ CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed
CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000
CVE-2024-7652,0,0,c7f694e385002b920efe17a183ba7538023c7cf88dd53a372f2912343dfa2405,2024-09-09T13:03:38.303000
CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000
CVE-2024-7655,0,0,f298cc9a9afea680a6796cf910ff4a570db8418f9a3558eeaf2eff77bb4e3b44,2024-09-10T12:09:50.377000
CVE-2024-7655,0,1,0e49c78835c3c35a884c75ee847ab7ab55175fc03260920848d00a05b510db96,2024-09-19T18:20:53.617000
CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000
CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000
CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000
@ -262831,8 +262837,8 @@ CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434
CVE-2024-7732,0,0,8a3c8a90acf6f5b098dbde4b61fbc477d38ff395fb346234319b59a8d03915b0,2024-09-16T16:49:31.427000
CVE-2024-7733,0,0,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000
CVE-2024-7734,0,0,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000
CVE-2024-7736,1,1,793266d0f87a5b7f5db686013fb7ca43b6829c1d4a302cdbd16f9330a7e437c3,2024-09-19T16:15:05.520000
CVE-2024-7737,1,1,b86114bd3b9828440bffc5c6b86d2465141e10c2d700271feb71bbfa3f5d7169,2024-09-19T16:15:05.727000
CVE-2024-7736,0,0,793266d0f87a5b7f5db686013fb7ca43b6829c1d4a302cdbd16f9330a7e437c3,2024-09-19T16:15:05.520000
CVE-2024-7737,0,0,b86114bd3b9828440bffc5c6b86d2465141e10c2d700271feb71bbfa3f5d7169,2024-09-19T16:15:05.727000
CVE-2024-7738,0,0,77baa8ad9219363c0b9f8c974088b914a426a11beaf2249218dd53ceafa511c2,2024-09-13T16:03:45.013000
CVE-2024-7739,0,0,93ba2cd98f674046a013ca0d04355005a6712730837693604a9e1ff7550070b5,2024-09-13T16:03:11.377000
CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000
@ -263019,7 +263025,7 @@ CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a21
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
CVE-2024-8006,0,1,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db6b,2024-09-19T17:46:03.447000
CVE-2024-8006,0,0,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db6b,2024-09-19T17:46:03.447000
CVE-2024-8007,0,0,d4843ecbff9c18b0a3733961009c3b0a5fd18a5329783b13479a12d64d8f35f3,2024-09-18T08:15:06.990000
CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000
CVE-2024-8012,0,0,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000
@ -263169,7 +263175,7 @@ CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c2
CVE-2024-8253,0,0,91918f2cda2657bd2182507d0429f1a8d4a218563516f304bdbf9084cadbf1b5,2024-09-11T16:26:11.920000
CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000
CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000
CVE-2024-8260,0,1,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000
CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000
CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000
CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000
CVE-2024-8271,0,0,3562c0d9d060a8b2f43387dce3941b2ee080bc34564191358e2afbabb30a0397,2024-09-14T11:47:14.677000
@ -263192,7 +263198,7 @@ CVE-2024-8298,0,0,b6e0265f7e06064f96a4b1454f4843c935b76c78438dc3aea3b160aebd5f45
CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000
CVE-2024-8302,0,0,73573fb95f4db9829ae46e4068d229d908324e137e6241c89a1030ab338e0051,2024-08-30T13:00:05.390000
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
CVE-2024-8304,0,1,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000
CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000
CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000
@ -263238,7 +263244,7 @@ CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e39076
CVE-2024-8372,0,0,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722aa5,2024-09-17T17:24:21.793000
CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
CVE-2024-8375,1,1,aaa7aacdae353ea1e1868b53188416f82d46294c587bbf7a4322d9966d07dd9b,2024-09-19T16:15:06.023000
CVE-2024-8375,0,0,aaa7aacdae353ea1e1868b53188416f82d46294c587bbf7a4322d9966d07dd9b,2024-09-19T16:15:06.023000
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
CVE-2024-8382,0,0,6313fe051491464f5060a11c4fbfc0623b9d0d82cc5fbeccd812557ff3cd8b8d,2024-09-06T17:15:17.677000
@ -263251,7 +263257,7 @@ CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f9
CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000
CVE-2024-8391,0,0,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e0076,2024-09-12T16:44:01.247000
CVE-2024-8394,0,0,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000
CVE-2024-8395,0,1,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000
CVE-2024-8395,0,0,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000
CVE-2024-8399,0,0,ff5a0b61b9891ed649233268ce0fa37bd0b7c79ba8aa2863ea2ecc61c35c709c,2024-09-12T19:45:07.347000
CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000
CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000
@ -263263,7 +263269,7 @@ CVE-2024-8413,0,0,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a7854
CVE-2024-8414,0,0,40169a23a4033486754844c64fbfe06d703efd0c5e76953cc0d7fdb87952af16,2024-09-06T16:44:04.583000
CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30fc,2024-09-06T16:40:06.120000
CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb8417,2024-09-06T16:38:44.053000
CVE-2024-8417,0,0,06f2fb3a9c5f24d70d3e64f2adf01488c8a1074d97d657d22a3388a406d1616e,2024-09-05T12:53:21.110000
CVE-2024-8417,0,1,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000
CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000
CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000
CVE-2024-8428,0,0,d38eeb7d0c97ad7b1cddb799376a1380930df039d2cf833bc9165ae4323bcbef,2024-09-06T16:46:26.830000
@ -263349,9 +263355,9 @@ CVE-2024-8641,0,0,6714847a0a2d7b4da8f2ecb0f7b3c9e94c4657d9429961f088a44e0537d838
CVE-2024-8642,0,0,2aae0632e6322f09814ded77019a17c6bdd3adefc0841a6f6e92e4043db21740,2024-09-19T15:18:47.917000
CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000
CVE-2024-8646,0,0,80914337a2bd562d2db1f36aec06ad883cb607d6cc039af494590eb0a0b50d8e,2024-09-18T20:20:51.643000
CVE-2024-8651,1,1,24c43d83d88e55ccb42455ca7f2a06a85f1137676fd4c59e592afc727b0a6f4f,2024-09-19T17:15:15.173000
CVE-2024-8652,1,1,01de35da454bcf77db821c9e18f381f6885088365f6408939562cc6f4bdec039,2024-09-19T17:15:15.360000
CVE-2024-8653,1,1,30c691d97001a678d25f8d3bf4fef38ffd5cd2e38e7a3f0a9c9d02b4c7c9017c,2024-09-19T17:15:15.503000
CVE-2024-8651,0,0,24c43d83d88e55ccb42455ca7f2a06a85f1137676fd4c59e592afc727b0a6f4f,2024-09-19T17:15:15.173000
CVE-2024-8652,0,0,01de35da454bcf77db821c9e18f381f6885088365f6408939562cc6f4bdec039,2024-09-19T17:15:15.360000
CVE-2024-8653,0,0,30c691d97001a678d25f8d3bf4fef38ffd5cd2e38e7a3f0a9c9d02b4c7c9017c,2024-09-19T17:15:15.503000
CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000
CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000
CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a82a,2024-09-13T14:06:04.777000
@ -263372,7 +263378,7 @@ CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490dae
CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000
CVE-2024-8695,0,0,52bc6b8b60aae6c315837e4eb131cf540e2b445dfd9cef8ca664c148d103d584,2024-09-13T16:01:31.340000
CVE-2024-8696,0,0,3ba62a921109450e540b318e77e86831bda9c658513319d0aed77dfa516028ff,2024-09-13T16:01:22.410000
CVE-2024-8698,1,1,c0d35a3336e4f52767b135ff04ba45500c7dcae9cd5d2fa662eee7f90410608f,2024-09-19T16:15:06.177000
CVE-2024-8698,0,0,c0d35a3336e4f52767b135ff04ba45500c7dcae9cd5d2fa662eee7f90410608f,2024-09-19T16:15:06.177000
CVE-2024-8705,0,0,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000
CVE-2024-8706,0,0,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000
CVE-2024-8707,0,0,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000
@ -263422,7 +263428,7 @@ CVE-2024-8869,0,0,b189f35b5a28c07852ca6d00280a8a46d906bab51b4d56357a90dd535f0651
CVE-2024-8875,0,0,0e9f0f93ae52ceba12c10384b7bbc3067de71e5c05493a69fd2a253e00e4d595,2024-09-16T15:30:28.733000
CVE-2024-8876,0,0,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee31,2024-09-16T15:30:28.733000
CVE-2024-8880,0,0,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000
CVE-2024-8883,1,1,0f1b63aa77f8575956d79a906cb024f514d666d4a8c9ffedf8d766e5d9bb5bf7,2024-09-19T16:15:06.403000
CVE-2024-8883,0,0,0f1b63aa77f8575956d79a906cb024f514d666d4a8c9ffedf8d766e5d9bb5bf7,2024-09-19T16:15:06.403000
CVE-2024-8887,0,0,3a4ee8c7c72402467690a1d5baf4ee46122c1a9bd1979c36a47f557846bba5ff,2024-09-18T11:15:10.530000
CVE-2024-8888,0,0,1e74f6eae96ea2bc3e4d1e807f25808d32b7d4278014e4cabc70fec925ff3214,2024-09-18T12:15:03.520000
CVE-2024-8889,0,0,d14885671be48487e73dc26a56497c68dd08124696a268e049900425bd24a291,2024-09-18T12:15:03.710000
@ -263447,5 +263453,6 @@ CVE-2024-8949,0,0,558b0f2a15aa10d0215f6e776b245d8a42240ea8527c9ffd4d56905704832d
CVE-2024-8951,0,0,fdcc8f1ef8d6875cdf064fe8ca72ee0e4237f3f89d53a358120e1931bee39aef,2024-09-17T20:15:07.020000
CVE-2024-8956,0,0,8fb796f1e52be7bf3f012ac38934615fcbd07a654b11f2c40ea225bc31651e57,2024-09-17T20:15:07.287000
CVE-2024-8957,0,0,745e7f02f1c26d5de4df67e0c2795340d562588c5301af2d060cb965e1ba5dae,2024-09-17T21:15:13.423000
CVE-2024-8963,1,1,bad5e8de51e4d1a286774f7d07084658a354cb4de050dbe04254efc089204dfb,2024-09-19T18:15:10.600000
CVE-2024-8969,0,0,b91ca645bf2071dccf15db49fd3efa26a97008959fe8a964028e51af15b02de3,2024-09-18T07:15:04.657000
CVE-2024-8986,0,0,26509263613f6b019d61b82311e5933cc6dfa31601ff6ae6235d1951248ed56c,2024-09-19T11:15:10.913000

Can't render this file because it is too large.