From 1aa41e63c75638161eb2dc6553f2f14f0b508554 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 19 Sep 2024 20:03:16 +0000 Subject: [PATCH] Auto-Update: 2024-09-19T20:00:17.597789+00:00 --- CVE-2013/CVE-2013-06xx/CVE-2013-0643.json | 131 +++++++++--- CVE-2013/CVE-2013-06xx/CVE-2013-0648.json | 127 ++++++++++-- CVE-2014/CVE-2014-04xx/CVE-2014-0497.json | 183 +++++++++++++++-- CVE-2014/CVE-2014-05xx/CVE-2014-0502.json | 161 ++++++++++++--- CVE-2019/CVE-2019-10xx/CVE-2019-1069.json | 68 +++---- CVE-2021/CVE-2021-31xx/CVE-2021-3156.json | 10 +- CVE-2023/CVE-2023-304xx/CVE-2023-30464.json | 43 +++- CVE-2023/CVE-2023-406xx/CVE-2023-40654.json | 34 +++- CVE-2023/CVE-2023-439xx/CVE-2023-43983.json | 34 +++- CVE-2023/CVE-2023-448xx/CVE-2023-44833.json | 34 +++- CVE-2023/CVE-2023-448xx/CVE-2023-44834.json | 34 +++- CVE-2023/CVE-2023-448xx/CVE-2023-44835.json | 34 +++- CVE-2023/CVE-2023-448xx/CVE-2023-44836.json | 34 +++- CVE-2023/CVE-2023-448xx/CVE-2023-44837.json | 34 +++- CVE-2023/CVE-2023-452xx/CVE-2023-45282.json | 34 +++- CVE-2023/CVE-2023-453xx/CVE-2023-45303.json | 14 +- CVE-2023/CVE-2023-453xx/CVE-2023-45370.json | 14 +- CVE-2023/CVE-2023-453xx/CVE-2023-45372.json | 14 +- CVE-2023/CVE-2023-453xx/CVE-2023-45374.json | 14 +- CVE-2023/CVE-2023-45xx/CVE-2023-4585.json | 34 +++- CVE-2024/CVE-2024-02xx/CVE-2024-0220.json | 8 +- CVE-2024/CVE-2024-03xx/CVE-2024-0335.json | 6 +- CVE-2024/CVE-2024-256xx/CVE-2024-25673.json | 29 +++ CVE-2024/CVE-2024-273xx/CVE-2024-27348.json | 97 ++++++++- CVE-2024/CVE-2024-314xx/CVE-2024-31414.json | 61 +++++- CVE-2024/CVE-2024-314xx/CVE-2024-31415.json | 62 +++++- CVE-2024/CVE-2024-314xx/CVE-2024-31416.json | 61 +++++- CVE-2024/CVE-2024-331xx/CVE-2024-33109.json | 48 +++++ CVE-2024/CVE-2024-343xx/CVE-2024-34343.json | 58 +++++- CVE-2024/CVE-2024-401xx/CVE-2024-40125.json | 25 +++ CVE-2024/CVE-2024-405xx/CVE-2024-40568.json | 43 +++- CVE-2024/CVE-2024-451xx/CVE-2024-45159.json | 75 ++++++- CVE-2024/CVE-2024-454xx/CVE-2024-45400.json | 62 +++++- CVE-2024/CVE-2024-454xx/CVE-2024-45401.json | 63 +++++- CVE-2024/CVE-2024-454xx/CVE-2024-45455.json | 47 ++++- CVE-2024/CVE-2024-454xx/CVE-2024-45456.json | 47 ++++- CVE-2024/CVE-2024-454xx/CVE-2024-45458.json | 47 ++++- CVE-2024/CVE-2024-456xx/CVE-2024-45620.json | 36 +++- CVE-2024/CVE-2024-45xx/CVE-2024-4554.json | 6 +- CVE-2024/CVE-2024-463xx/CVE-2024-46373.json | 43 +++- CVE-2024/CVE-2024-463xx/CVE-2024-46374.json | 43 +++- CVE-2024/CVE-2024-466xx/CVE-2024-46681.json | 95 ++++++++- CVE-2024/CVE-2024-466xx/CVE-2024-46684.json | 95 ++++++++- CVE-2024/CVE-2024-466xx/CVE-2024-46688.json | 90 ++++++++- CVE-2024/CVE-2024-466xx/CVE-2024-46694.json | 119 ++++++++++- CVE-2024/CVE-2024-471xx/CVE-2024-47159.json | 56 ++++++ CVE-2024/CVE-2024-471xx/CVE-2024-47160.json | 56 ++++++ CVE-2024/CVE-2024-471xx/CVE-2024-47162.json | 56 ++++++ CVE-2024/CVE-2024-60xx/CVE-2024-6087.json | 71 ++++++- CVE-2024/CVE-2024-65xx/CVE-2024-6582.json | 69 ++++++- CVE-2024/CVE-2024-68xx/CVE-2024-6862.json | 58 +++++- CVE-2024/CVE-2024-68xx/CVE-2024-6867.json | 58 +++++- CVE-2024/CVE-2024-75xx/CVE-2024-7591.json | 66 +++++- CVE-2024/CVE-2024-76xx/CVE-2024-7618.json | 82 +++++++- CVE-2024/CVE-2024-76xx/CVE-2024-7655.json | 74 ++++++- CVE-2024/CVE-2024-84xx/CVE-2024-8417.json | 75 ++++++- CVE-2024/CVE-2024-89xx/CVE-2024-8963.json | 56 ++++++ README.md | 80 ++++---- _state.csv | 211 ++++++++++---------- 59 files changed, 3085 insertions(+), 434 deletions(-) create mode 100644 CVE-2024/CVE-2024-256xx/CVE-2024-25673.json create mode 100644 CVE-2024/CVE-2024-331xx/CVE-2024-33109.json create mode 100644 CVE-2024/CVE-2024-401xx/CVE-2024-40125.json create mode 100644 CVE-2024/CVE-2024-471xx/CVE-2024-47159.json create mode 100644 CVE-2024/CVE-2024-471xx/CVE-2024-47160.json create mode 100644 CVE-2024/CVE-2024-471xx/CVE-2024-47162.json create mode 100644 CVE-2024/CVE-2024-89xx/CVE-2024-8963.json diff --git a/CVE-2013/CVE-2013-06xx/CVE-2013-0643.json b/CVE-2013/CVE-2013-06xx/CVE-2013-0643.json index 3aa59a605eb..4d423701e7b 100644 --- a/CVE-2013/CVE-2013-06xx/CVE-2013-0643.json +++ b/CVE-2013/CVE-2013-06xx/CVE-2013-0643.json @@ -2,10 +2,10 @@ "id": "CVE-2013-0643", "sourceIdentifier": "psirt@adobe.com", "published": "2013-02-27T00:55:01.017", - "lastModified": "2024-09-18T19:35:01.410", - "vulnStatus": "Modified", + "lastModified": "2024-09-19T19:48:10.033", + "vulnStatus": "Analyzed", "cveTags": [], - "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\r\n\r\n'Flash Player 11.6.602.168 and earlier versions for Windows \r\nFlash Player 11.6.602.167 and earlier versions for Macintosh\r\nFlash Player 11.2.202.270 and earlier for Linux'", + "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\n\n'Flash Player 11.6.602.168 and earlier versions for Windows \nFlash Player 11.6.602.167 and earlier versions for Macintosh\nFlash Player 11.2.202.270 and earlier for Linux'", "cisaExploitAdd": "2024-09-17", "cisaActionDue": "2024-10-08", "cisaRequiredAction": "The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.", @@ -22,6 +22,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -76,7 +96,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "NVD-CWE-noinfo" } ] }, @@ -102,16 +122,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "10.3", "versionEndExcluding": "10.3.183.67", - "matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57" + "matchCriteriaId": "1CCB5060-546D-4023-8E02-E330E9DF33A1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.6", + "versionStartIncluding": "11.0", "versionEndExcluding": "11.6.602.171", - "matchCriteriaId": "429D84D8-F0CF-4532-B0C8-EF3B4700F191" + "matchCriteriaId": "73216ADC-DAB5-4679-835E-0601EBC9E828" } ] }, @@ -143,16 +162,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "10.3", - "versionEndExcluding": "10.3.183.67", - "matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.2", + "versionStartIncluding": "11.0", "versionEndExcluding": "11.2.202.273", - "matchCriteriaId": "BB9395A3-F409-45B2-B877-5D4F5DD20F72" + "matchCriteriaId": "0FE3C70F-1D0D-4FB8-A747-4F3594A888DF" } ] }, @@ -168,6 +180,81 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", + "matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", + "matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", + "matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399" + } + ] + } + ] } ], "references": [ @@ -175,24 +262,21 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -206,6 +290,7 @@ "url": "http://www.adobe.com/support/security/bulletins/apsb13-08.html", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] diff --git a/CVE-2013/CVE-2013-06xx/CVE-2013-0648.json b/CVE-2013/CVE-2013-06xx/CVE-2013-0648.json index 56d55c45248..9025d8e754b 100644 --- a/CVE-2013/CVE-2013-06xx/CVE-2013-0648.json +++ b/CVE-2013/CVE-2013-06xx/CVE-2013-0648.json @@ -2,8 +2,8 @@ "id": "CVE-2013-0648", "sourceIdentifier": "psirt@adobe.com", "published": "2013-02-27T00:55:01.160", - "lastModified": "2024-09-18T19:35:02.327", - "vulnStatus": "Modified", + "lastModified": "2024-09-19T19:51:57.317", + "vulnStatus": "Analyzed", "cveTags": [], "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\r\n\r\n'Flash Player 11.6.602.168 and earlier versions for Windows \r\nFlash Player 11.6.602.167 and earlier versions for Macintosh\r\nFlash Player 11.2.202.270 and earlier for Linux'", "cisaExploitAdd": "2024-09-17", @@ -22,6 +22,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -92,16 +112,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "10.3", "versionEndExcluding": "10.3.183.67", - "matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57" + "matchCriteriaId": "1CCB5060-546D-4023-8E02-E330E9DF33A1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.6", + "versionStartIncluding": "11.0", "versionEndExcluding": "11.6.602.171", - "matchCriteriaId": "429D84D8-F0CF-4532-B0C8-EF3B4700F191" + "matchCriteriaId": "73216ADC-DAB5-4679-835E-0601EBC9E828" } ] }, @@ -133,16 +152,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "10.3", - "versionEndExcluding": "10.3.183.67", - "matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.2", + "versionStartIncluding": "11.0", "versionEndExcluding": "11.2.202.273", - "matchCriteriaId": "BB9395A3-F409-45B2-B877-5D4F5DD20F72" + "matchCriteriaId": "0FE3C70F-1D0D-4FB8-A747-4F3594A888DF" } ] }, @@ -158,6 +170,81 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", + "matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", + "matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", + "matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" + } + ] + } + ] } ], "references": [ @@ -165,24 +252,21 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -196,6 +280,7 @@ "url": "http://www.adobe.com/support/security/bulletins/apsb13-08.html", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] diff --git a/CVE-2014/CVE-2014-04xx/CVE-2014-0497.json b/CVE-2014/CVE-2014-04xx/CVE-2014-0497.json index 02b0ef8379e..9aa2209d19e 100644 --- a/CVE-2014/CVE-2014-04xx/CVE-2014-0497.json +++ b/CVE-2014/CVE-2014-04xx/CVE-2014-0497.json @@ -2,8 +2,8 @@ "id": "CVE-2014-0497", "sourceIdentifier": "psirt@adobe.com", "published": "2014-02-05T05:15:29.897", - "lastModified": "2024-09-18T19:35:02.543", - "vulnStatus": "Modified", + "lastModified": "2024-09-19T19:56:17.247", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-09-17", "cisaActionDue": "2024-10-08", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -75,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-191" } ] }, @@ -101,9 +121,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.0", "versionEndExcluding": "11.2.202.336", - "matchCriteriaId": "E069816A-A585-4546-B344-6E7831B8749C" + "matchCriteriaId": "0FFB96CE-2C20-471A-BA61-36909F36400F" } ] }, @@ -130,16 +149,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.0", "versionEndExcluding": "11.7.700.261", - "matchCriteriaId": "73692E91-A04B-4F58-8AC4-B635E3848540" + "matchCriteriaId": "D00F33E5-B1D9-4D70-9BA7-994BB84A423D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.8", + "versionStartIncluding": "11.8.800.94", "versionEndExcluding": "12.0.0.44", - "matchCriteriaId": "0CD2FFF0-5A3C-4593-A6F5-9C6941747468" + "matchCriteriaId": "53CBCC27-0B1B-4DAA-990E-A724720C3C58" } ] }, @@ -160,6 +178,134 @@ ] } ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "32.0.1700.107", + "matchCriteriaId": "D956DCBD-B205-4A80-A8C5-82C186F50DEF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", + "matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", + "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311" + } + ] + } + ] } ], "references": [ @@ -167,13 +313,14 @@ "url": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html", "source": "psirt@adobe.com", "tags": [ - "Third Party Advisory" + "Release Notes" ] }, { "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-04.html", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -182,24 +329,21 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -213,6 +357,7 @@ "url": "http://secunia.com/advisories/56437", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -220,6 +365,7 @@ "url": "http://secunia.com/advisories/56737", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -227,6 +373,7 @@ "url": "http://secunia.com/advisories/56780", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -234,6 +381,7 @@ "url": "http://secunia.com/advisories/56799", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -241,6 +389,7 @@ "url": "http://secunia.com/advisories/56839", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -263,6 +412,7 @@ "url": "http://www.securityfocus.com/bid/65327", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -271,6 +421,7 @@ "url": "http://www.securitytracker.com/id/1029715", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2014/CVE-2014-05xx/CVE-2014-0502.json b/CVE-2014/CVE-2014-05xx/CVE-2014-0502.json index a9dc057f0b3..e5d176d0565 100644 --- a/CVE-2014/CVE-2014-05xx/CVE-2014-0502.json +++ b/CVE-2014/CVE-2014-05xx/CVE-2014-0502.json @@ -2,8 +2,8 @@ "id": "CVE-2014-0502", "sourceIdentifier": "psirt@adobe.com", "published": "2014-02-21T05:07:00.017", - "lastModified": "2024-09-18T19:35:03.393", - "vulnStatus": "Modified", + "lastModified": "2024-09-19T19:53:44.480", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-09-17", "cisaActionDue": "2024-10-08", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -75,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-415" } ] }, @@ -101,23 +121,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.0", "versionEndExcluding": "11.7.700.269", - "matchCriteriaId": "6C9AF7F7-0F10-49B7-B488-F0E12692FCD0" + "matchCriteriaId": "CE22099C-BC63-499E-A515-EFFEA7F5EEFF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.8", - "versionEndExcluding": "11.8.800.175", - "matchCriteriaId": "EF750BDF-A76B-4967-8BD4-9B6F3336156D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.9", + "versionStartIncluding": "11.8.800.94", "versionEndExcluding": "12.0.0.70", - "matchCriteriaId": "2ECFF685-8C36-4804-9815-E5A9484D4253" + "matchCriteriaId": "5695E310-F309-4E89-B0B2-A43E922BEF26" } ] }, @@ -127,8 +139,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, @@ -165,9 +177,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionStartIncluding": "11.0", "versionEndExcluding": "11.2.202.341", - "matchCriteriaId": "EBCC4F71-82B0-41D9-B184-96652760AAE5" + "matchCriteriaId": "1AF78710-B045-41A8-A080-FA287D72BB8F" } ] }, @@ -177,8 +188,36 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37" + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.0.1628", + "matchCriteriaId": "6ED74F32-A4F4-424C-B9E7-C54F3DAFFDE6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" } ] } @@ -192,9 +231,73 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", - "versionEndExcluding": "4.0.0.1628", - "matchCriteriaId": "6ED74F32-A4F4-424C-B9E7-C54F3DAFFDE6" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", + "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" } ] } @@ -206,6 +309,7 @@ "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -214,24 +318,21 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html", "source": "psirt@adobe.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -252,6 +353,7 @@ "url": "http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/", "source": "psirt@adobe.com", "tags": [ + "Exploit", "Third Party Advisory" ] }, @@ -259,6 +361,7 @@ "url": "https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html", "source": "psirt@adobe.com", "tags": [ + "Exploit", "Third Party Advisory" ] } diff --git a/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json b/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json index 80c5b48e469..6d71b26f891 100644 --- a/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json +++ b/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1069", "sourceIdentifier": "secure@microsoft.com", "published": "2019-06-12T14:29:04.337", - "lastModified": "2024-09-19T01:00:03.107", - "vulnStatus": "Modified", + "lastModified": "2024-09-19T19:58:01.950", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-09-18", "cisaActionDue": "2024-10-09", @@ -22,8 +22,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -40,15 +40,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -121,54 +119,54 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37097C39-D588-4018-B94D-5EB87B1E3D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*", + "matchCriteriaId": "530DF8C9-467C-4F4F-9FCA-CDD934BADF3C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json b/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json index 77067a32b62..01c7fb37755 100644 --- a/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json +++ b/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json @@ -2,8 +2,8 @@ "id": "CVE-2021-3156", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-26T21:15:12.987", - "lastModified": "2024-09-18T17:15:13.843", - "vulnStatus": "Modified", + "lastModified": "2024-09-19T19:58:23.870", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-04-06", "cisaActionDue": "2022-04-27", @@ -760,7 +760,11 @@ }, { "url": "https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30464.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30464.json index 63aab8eaf47..cdeaceec317 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30464.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30464.json @@ -2,16 +2,55 @@ "id": "CVE-2023-30464", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T21:15:13.080", - "lastModified": "2024-09-18T21:15:13.080", + "lastModified": "2024-09-19T19:35:01.113", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack." + }, + { + "lang": "es", + "value": "CoreDNS hasta la versi\u00f3n 1.10.1 permite a los atacantes lograr envenenamiento de cach\u00e9 DNS e inyectar respuestas falsas a trav\u00e9s de un ataque de cumplea\u00f1os." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40654.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40654.json index d3a2bf9ed60..d44e4331910 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40654.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40654", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.893", - "lastModified": "2023-10-11T19:08:04.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T18:35:02.187", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43983.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43983.json index de4e54fdfa4..b7310cda968 100644 --- a/CVE-2023/CVE-2023-439xx/CVE-2023-43983.json +++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43983.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43983", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T20:15:13.250", - "lastModified": "2023-10-07T02:52:28.870", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:04.850", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44833.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44833.json index 62b3e932cb2..f02d03f4813 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44833.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44833.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44833", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.807", - "lastModified": "2023-10-07T03:17:11.587", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:05.797", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44834.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44834.json index c055be06d4e..44b2022c205 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44834.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44834.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44834", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.863", - "lastModified": "2023-10-07T03:17:41.593", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:06.803", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44835.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44835.json index b54ac45b5ca..8dc86c1401e 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44835.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44835.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44835", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.917", - "lastModified": "2023-10-07T03:17:27.913", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:07.573", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44836.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44836.json index 6ba6a531f8c..65cb5688521 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44836.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44836.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44836", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.973", - "lastModified": "2023-10-06T15:20:09.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:08.333", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44837.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44837.json index ef03e390921..b5eb93d721f 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44837.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44837.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44837", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:12.020", - "lastModified": "2023-10-06T15:19:36.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:09.180", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45282.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45282.json index 124930db91f..357cff88588 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45282.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45282.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45282", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-06T19:15:12.950", - "lastModified": "2023-11-02T01:23:35.490", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:10.307", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45303.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45303.json index dbe0249dc2e..02f860aea33 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45303.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45303.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45303", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-06T19:15:13.040", - "lastModified": "2023-10-12T18:10:31.853", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:11.117", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45370.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45370.json index fdbe7f2174e..4eb4863c46c 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45370.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45370.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45370", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-09T06:15:10.470", - "lastModified": "2023-10-12T16:05:00.760", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T18:35:05.060", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45372.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45372.json index 4656cecba3e..51a33a39e96 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45372.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45372.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45372", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-09T06:15:10.607", - "lastModified": "2023-10-12T16:04:34.703", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T18:35:05.910", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45374.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45374.json index 2c385ce6e9d..1a25347e5d0 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45374.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45374.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45374", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-09T06:15:10.723", - "lastModified": "2023-10-12T16:06:05.330", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T18:35:06.723", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4585.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4585.json index 06f2a038bc1..32062be73e5 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4585.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4585.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4585", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:09.797", - "lastModified": "2023-12-21T00:57:28.747", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T19:35:12.583", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0220.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0220.json index 885adc96790..167daae2fd1 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0220.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0220.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0220", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-02-22T11:15:08.840", - "lastModified": "2024-05-27T08:15:09.070", + "lastModified": "2024-09-19T18:15:05.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,16 +46,12 @@ "description": [ { "lang": "en", - "value": "CWE-311" + "value": "CWE-1240" }, { "lang": "en", "value": "CWE-319" }, - { - "lang": "en", - "value": "CWE-326" - }, { "lang": "en", "value": "CWE-94" diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0335.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0335.json index 7313c53f62b..84b43846eb6 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0335.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0335.json @@ -2,13 +2,13 @@ "id": "CVE-2024-0335", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-04-03T19:15:43.743", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-09-19T18:15:05.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may \nbe used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)\n\nThis issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2.\n\n" + "value": "ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may \nbe used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)\n\n\nThis issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-23" } ] } diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25673.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25673.json new file mode 100644 index 00000000000..50273364d5e --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25673.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-25673", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-19T19:15:24.093", + "lastModified": "2024-09-19T19:15:24.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Couchbase Server 7.6.x before 7.6.2, 7.2.x before 7.2.6, and all earlier versions allows HTTP Host header injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", + "source": "cve@mitre.org" + }, + { + "url": "https://forums.couchbase.com/tags/security", + "source": "cve@mitre.org" + }, + { + "url": "https://www.couchbase.com/alerts/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json index 569f370f74a..0f363509c0e 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27348", "sourceIdentifier": "security@apache.org", "published": "2024-04-22T14:15:07.420", - "lastModified": "2024-09-19T01:00:03.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T19:55:24.297", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-09-18", "cisaActionDue": "2024-10-09", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -44,6 +64,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,18 +85,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:hugegraph:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "1.3.0", + "matchCriteriaId": "5DDD7AA3-3439-48D7-B24B-1D9D31B284BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:a:oracle:jdk:8:*:*:*:*:*:*:*", + "matchCriteriaId": "BDA29D0B-F022-4711-ABE9-4221E57FAF17" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:oracle:jdk:11:*:*:*:*:*:*:*", + "matchCriteriaId": "3CD5164A-75F9-46AC-A7D4-0323A4A2D915" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:oracle:jre:8:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A9D4C2-98A6-43F0-A925-8A84AB3040AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:oracle:jre:11:*:*:*:*:*:*:*", + "matchCriteriaId": "1A5E4F97-F7D9-42CE-8A7A-902B4768C60F" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/22/3", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://hugegraph.apache.org/docs/config/config-authentication/#configure-user-authentication", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Product" + ] }, { "url": "https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31414.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31414.json index c5d53993d54..3b54ad195e9 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31414.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31414.json @@ -2,17 +2,41 @@ "id": "CVE-2024-31414", "sourceIdentifier": "CybersecurityCOE@eaton.com", "published": "2024-09-13T17:15:11.707", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:48:25.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Eaton Foreseer software provides users the capability to customize the dashboard in WebView pages. However, the input fields for this feature in the Eaton Foreseer software lacked proper input sanitization on the server-side, which could lead to injection and execution of malicious scripts when abused by bad actors." + }, + { + "lang": "es", + "value": "El software Eaton Foreseer ofrece a los usuarios la posibilidad de personalizar el panel de control en las p\u00e1ginas WebView. Sin embargo, los campos de entrada para esta funci\u00f3n en el software Eaton Foreseer carec\u00edan de una desinfecci\u00f3n de entrada adecuada en el lado del servidor, lo que pod\u00eda provocar la inyecci\u00f3n y ejecuci\u00f3n de scripts maliciosos cuando los actores maliciosos los utilizaban de forma abusiva." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "CybersecurityCOE@eaton.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "CybersecurityCOE@eaton.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.8.600", + "matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf", - "source": "CybersecurityCOE@eaton.com" + "source": "CybersecurityCOE@eaton.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31415.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31415.json index 4b3e102ddab..35bb6620b81 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31415.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31415.json @@ -2,17 +2,41 @@ "id": "CVE-2024-31415", "sourceIdentifier": "CybersecurityCOE@eaton.com", "published": "2024-09-13T17:15:11.907", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:50:27.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Eaton Foreseer software provides the feasibility for the user to configure external servers for multiple purposes such as network management, user management, etc. The software uses encryption to store these configurations securely on the host machine. However, the keys used for this encryption were insecurely stored, which could be abused to possibly change or remove the server configuration." + }, + { + "lang": "es", + "value": "El software Eaton Foreseer ofrece al usuario la posibilidad de configurar servidores externos para m\u00faltiples prop\u00f3sitos, como administraci\u00f3n de red, administraci\u00f3n de usuarios, etc. El software utiliza cifrado para almacenar estas configuraciones de forma segura en la m\u00e1quina host. Sin embargo, las claves utilizadas para este cifrado se almacenaron de forma insegura, lo que podr\u00eda utilizarse de forma indebida para cambiar o eliminar la configuraci\u00f3n del servidor." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "CybersecurityCOE@eaton.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + }, { "source": "CybersecurityCOE@eaton.com", "type": "Secondary", @@ -47,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.8.600", + "matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf", - "source": "CybersecurityCOE@eaton.com" + "source": "CybersecurityCOE@eaton.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31416.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31416.json index 5e8f485451b..78ef2186ba1 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31416.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31416.json @@ -2,17 +2,41 @@ "id": "CVE-2024-31416", "sourceIdentifier": "CybersecurityCOE@eaton.com", "published": "2024-09-13T17:15:12.090", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T19:06:59.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow." + }, + { + "lang": "es", + "value": "El software Eaton Foreseer ofrece m\u00faltiples campos de entrada personalizables para que los usuarios configuren par\u00e1metros en la herramienta, como alarmas, informes, etc. Algunos de estos campos de entrada no verificaban la longitud y los l\u00edmites del valor ingresado. Si un actor malintencionado aprovecha esta falla de seguridad, puede resultar en un consumo excesivo de memoria o un desbordamiento de n\u00fameros enteros." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "CybersecurityCOE@eaton.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + }, { "source": "CybersecurityCOE@eaton.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.8.600", + "matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf", - "source": "CybersecurityCOE@eaton.com" + "source": "CybersecurityCOE@eaton.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33109.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33109.json new file mode 100644 index 00000000000..f527b776d09 --- /dev/null +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33109.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-33109", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-19T19:15:24.170", + "lastModified": "2024-09-19T19:15:24.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal in the web interface of the Tiptel IP 286 with firmware version 2.61.13.10 allows attackers to overwrite arbitrary files on the phone via the Ringtone upload function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "http://tiptel.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.bdosecurity.de/en-gb/advisories/cve-2024-33109", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34343.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34343.json index 7a629df3425..31162544db6 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34343.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34343.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34343", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-05T21:15:38.257", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T19:57:52.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nuxt:nuxt:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.12.4", + "matchCriteriaId": "BB92C785-9011-406E-A048-9FEC653045EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nuxt/nuxt/security/advisories/GHSA-vf6r-87q4-2vjf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40125.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40125.json new file mode 100644 index 00000000000..f42b0c38db1 --- /dev/null +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40125.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40125", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-19T19:15:24.350", + "lastModified": "2024-09-19T19:15:24.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the Media Manager function of Closed-Loop Technology CLESS Server v4.5.2 allows attackers to execute arbitrary code via uploading a crafted PHP file to the upload endpoint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/brendontkl/My-CVEs/tree/main/CVE-2024-40125", + "source": "cve@mitre.org" + }, + { + "url": "https://www.closed-loop.biz/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40568.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40568.json index 7ac0560c3e7..c0ab682c67b 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40568.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40568.json @@ -2,16 +2,55 @@ "id": "CVE-2024-40568", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T21:15:13.390", - "lastModified": "2024-09-18T21:15:13.390", + "lastModified": "2024-09-19T19:35:13.880", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in btstack mesh commit before v.864e2f2b6b7878c8fab3cf5ee84ae566e3380c58 allows a remote attacker to execute arbitrary code via the pb_adv_handle_tranaction_cont function in the src/mesh/pb_adv.c component" + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en el commit de btstack mesh anterior a v.864e2f2b6b7878c8fab3cf5ee84ae566e3380c58 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n pb_adv_handle_tranaction_cont en el componente src/mesh/pb_adv.c" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/xiaobye-ctf/My-CVE/tree/main/BTstack/CVE-2024-40568", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45159.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45159.json index aa323abbe42..efd6ac5531d 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45159.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45159", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T19:15:13.150", - "lastModified": "2024-09-06T12:08:04.550", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T18:26:24.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,82 @@ "value": "Se descubri\u00f3 un problema en Mbed TLS 3.x antes de la versi\u00f3n 3.6.1. Con TLS 1.3, cuando un servidor habilita la autenticaci\u00f3n opcional del cliente, si el certificado proporcionado por el cliente no tiene los valores adecuados en las extensiones if keyUsage o extKeyUsage, el valor de retorno de mbedtls_ssl_get_verify_result() tendr\u00eda incorrectamente los bits MBEDTLS_X509_BADCERT_KEY_USAGE y MBEDTLS_X509_BADCERT_KEY_USAGE limpios. Como resultado, un atacante que tuviera un certificado v\u00e1lido para usos distintos a la autenticaci\u00f3n de cliente TLS podr\u00eda usarlo de todos modos para la autenticaci\u00f3n de cliente TLS. Solo los servidores TLS 1.3 se vieron afectados, y solo con autenticaci\u00f3n opcional (con la autenticaci\u00f3n requerida, el protocolo de enlace se cancelar\u00eda con una alerta fatal)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2.0", + "versionEndExcluding": "3.6.1", + "matchCriteriaId": "21841FE2-FFD3-4EF1-9257-7A31C00B14C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Mbed-TLS/mbedtls/releases/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45400.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45400.json index 699027d0caa..9f3b9fc471c 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45400.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45400.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45400", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-06T00:15:02.507", - "lastModified": "2024-09-06T12:08:04.550", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T18:04:36.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mlewand:open_link:*:*:*:*:*:ckeditor:*:*", + "versionEndExcluding": "1.0.7", + "matchCriteriaId": "B3A98245-1561-49F7-9C6B-2527AEFCABE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mlewand/ckeditor-plugin-openlink/commit/402391fdd4d9cfd079031372f9caebbf54993ffb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mlewand/ckeditor-plugin-openlink/security/advisories/GHSA-qj47-6x6q-m3c9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json index 7a527ff26e0..6ffe4a89dc9 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45401", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-05T18:15:06.227", - "lastModified": "2024-09-06T12:08:21.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T18:12:52.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stripe:stripe-cli:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.11.1", + "versionEndExcluding": "1.21.3", + "matchCriteriaId": "F43365D4-FD7D-470A-9948-88FC4B3DE261" + } + ] + } + ] + } + ], "references": [ { "url": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/stripe/stripe-cli/security/advisories/GHSA-fv4g-gwpj-74gr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45455.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45455.json index a62298aaab5..685c572c3ae 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45455.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45455.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45455", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.150", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:51:15.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.14", + "matchCriteriaId": "71245A69-8CD3-456C-98B2-99EC31276371" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-5-13-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45456.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45456.json index 973bb0c3428..f8436203a9a 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45456.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45456.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45456", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.350", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:38:57.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.14", + "matchCriteriaId": "71245A69-8CD3-456C-98B2-99EC31276371" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-5-13-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45458.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45458.json index a2707c7f21c..01916035412 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45458.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45458.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45458", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.763", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:55:46.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.9.14", + "matchCriteriaId": "2CD91243-6FF0-44AA-AE85-B1C4B6604A9F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45620.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45620.json index db7d66ad6ec..4d492da73d0 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45620.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45620.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45620", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-03T22:15:05.743", - "lastModified": "2024-09-12T19:38:16.130", + "lastModified": "2024-09-19T19:21:38.653", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "attackVector": "PHYSICAL", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 6.8, - "baseSeverity": "MEDIUM" + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.9, + "baseSeverity": "LOW" }, - "exploitabilityScore": 0.9, - "impactScore": 5.9 + "exploitabilityScore": 0.5, + "impactScore": 3.4 }, { "source": "secalert@redhat.com", @@ -96,6 +96,22 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.26.0", + "matchCriteriaId": "3220C607-8358-4E23-AB07-11E55FD2727F" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4554.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4554.json index faf459a2946..4113d15b352 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4554.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4554.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4554", "sourceIdentifier": "security@opentext.com", "published": "2024-08-28T07:15:09.330", - "lastModified": "2024-09-12T15:01:12.217", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T18:15:10.433", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-79" } ] } diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46373.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46373.json index 675ab418a19..b822029da9d 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46373.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46373.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46373", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T21:15:13.497", - "lastModified": "2024-09-18T21:15:13.497", + "lastModified": "2024-09-19T19:35:14.767", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dedecms V5.7.115 contains an arbitrary code execution via file upload vulnerability in the backend." + }, + { + "lang": "es", + "value": "Dedecms V5.7.115 contiene una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de carga de archivos en el backend." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46373.md", diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46374.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46374.json index 6068bbc0f8f..7327a796f56 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46374.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46374.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46374", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T21:15:13.543", - "lastModified": "2024-09-18T21:15:13.543", + "lastModified": "2024-09-19T19:35:15.573", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Best House Rental Management System 1.0 contains a SQL injection vulnerability in the delete_category() function of the file rental/admin_class.php." + }, + { + "lang": "es", + "value": "Best House Rental Management System 1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n delete_category() del archivo rental/admin_class.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46374.md", diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46681.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46681.json index b9bf19166c1..d9599dad739 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46681.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46681.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46681", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-13T06:15:12.710", - "lastModified": "2024-09-13T14:06:04.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:10:49.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,100 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pktgen: uso de cpus_read_lock() en pg_net_init() He visto que WARN_ON(smp_processor_id() != cpu) se activa en pktgen_thread_worker() durante las pruebas. Debemos usar cpus_read_lock()/cpus_read_unlock() alrededor del bucle for_each_online_cpu(cpu). Mientras estamos en ello, use WARN_ON_ONCE() para evitar una posible inundaci\u00f3n de syslog." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "6.10.8", + "matchCriteriaId": "2DDC3632-2BC6-4270-A2DC-12DF4F03FA06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5f5f7366dda8ae870e8305d6e7b3c0c2686cd2cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/979b581e4c69257acab1af415ddad6b2d78a2fa5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46684.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46684.json index 84bcf5935a2..ed5bb3d5c07 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46684.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46684", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-13T06:15:13.103", - "lastModified": "2024-09-13T14:06:04.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:04:22.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,100 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binfmt_elf_fdpic: se corrige el c\u00e1lculo del tama\u00f1o de AUXV cuando se define ELF_HWCAP2 create_elf_fdpic_tables() no tiene en cuenta correctamente el espacio para el vector AUX cuando una arquitectura tiene definido ELF_HWCAP2. Antes del commit 10e29251be0e (\"binfmt_elf_fdpic: fix /proc//auxv\"), esto provocaba que la \u00faltima entrada del vector AUX se estableciera en cero, pero con ese cambio se produce un ERROR del kernel. Corrija esto a\u00f1adiendo uno al n\u00famero de entradas AUXV (nitems) cuando se define ELF_HWCAP2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.8", + "matchCriteriaId": "2CE718D7-41ED-4D4A-AED5-326C3D4383FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/c507da85e4f80c630deb9e98222ccf4118cbe6f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6a09e342f8e6d3cac7f7c5c14085236aca284b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46688.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46688.json index 6d75bb827c2..e32ffbd041d 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46688.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46688.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46688", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-13T06:15:13.547", - "lastModified": "2024-09-13T14:06:04.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:01:43.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: erofs: se corrige el acceso fuera de los l\u00edmites cuando z_erofs_gbuf_growsize() falla parcialmente Si z_erofs_gbuf_growsize() falla parcialmente en un b\u00fafer global debido a un error en la asignaci\u00f3n de memoria o inyecci\u00f3n de fallas (como lo inform\u00f3 syzbot [1]), se deben liberar nuevas p\u00e1ginas compar\u00e1ndolas con las p\u00e1ginas existentes para evitar fugas de memoria. Sin embargo, la matriz gbuf->pages[] anterior puede no ser lo suficientemente grande, lo que puede provocar un acceso fuera de los l\u00edmites o una desreferencia de ptr nula. Corrija esto verificando con gbuf->nrpages de antemano. [1] https://lore.kernel.org/r/000000000000f7b96e062018c6e3@google.com" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.8", + "matchCriteriaId": "2CE718D7-41ED-4D4A-AED5-326C3D4383FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0005e01e1e875c5e27130c5e2ed0189749d1e08a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/49c0e081998008cde0c872c0ff9affa1ece4b878", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46694.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46694.json index 5899344a21e..6a50687ad6a 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46694.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46694.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46694", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-13T06:15:14.240", - "lastModified": "2024-09-13T14:06:04.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:16:22.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,128 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: evitar usar un objeto nulo de framebuffer En lugar de usar state->fb->obj[0] directamente, obtener el objeto de framebuffer llamando a drm_gem_fb_get_obj() y devolver un c\u00f3digo de error cuando el objeto es nulo para evitar usar un objeto nulo de framebuffer. (seleccionado del commit 73dd0ad9e5dad53766ea3e631303430116f834b3)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.108", + "matchCriteriaId": "3807A5A8-BA5F-4F06-88B1-DC5FEB956E74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.49", + "matchCriteriaId": "1191B7F1-F275-45F5-9E82-A012FF517BFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.8", + "matchCriteriaId": "1B5D46C3-56A4-4380-9309-27BF73DF29A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/093ee72ed35c2338c87c26b6ba6f0b7789c9e14e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b9a33235c773c7a3768060cf1d2cf8a9153bc37", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/49e1b214f3239b78967c6ddb8f8ec47ae047b051", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6f5e39a3fe7cbdba190f42b28b40bdff03c8cf0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47159.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47159.json new file mode 100644 index 00000000000..a3e55763a04 --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47159.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47159", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-09-19T18:15:09.803", + "lastModified": "2024-09-19T18:15:09.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains YouTrack before 2024.3.44799 user without appropriate permissions could restore workflows attached to a project" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47160.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47160.json new file mode 100644 index 00000000000..aece354defb --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47160.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47160", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-09-19T18:15:10.013", + "lastModified": "2024-09-19T18:15:10.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains YouTrack before 2024.3.44799 access to global app config data without appropriate permissions was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47162.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47162.json new file mode 100644 index 00000000000..65486da11f1 --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47162.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47162", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-09-19T18:15:10.227", + "lastModified": "2024-09-19T18:15:10.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains YouTrack before 2024.3.44799 token could be revealed on Imports page" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6087.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6087.json index f81ccdebfe7..5dba6cbe749 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6087.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6087.json @@ -2,16 +2,42 @@ "id": "CVE-2024-6087", "sourceIdentifier": "security@huntr.dev", "published": "2024-09-13T17:15:13.027", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T19:32:14.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability exists in lunary-ai/lunary at the latest commit (a761d83) on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target users upon registration for their own arbitrary organizations. The attacker can invite a target email, obtain a one-time use token, retract the invite, and later use the token to reset the password of the target user, leading to full account takeover." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de control de acceso indebido en lunary-ai/lunary en la \u00faltima confirmaci\u00f3n (a761d83) en la rama principal. La vulnerabilidad permite a un atacante utilizar los tokens de autenticaci\u00f3n emitidos por la funci\u00f3n \"invitar usuario\" para obtener tokens JWT v\u00e1lidos. Estos tokens se pueden utilizar para comprometer a los usuarios objetivo al registrarse en sus propias organizaciones arbitrarias. El atacante puede invitar a un correo electr\u00f3nico objetivo, obtener un token de uso \u00fanico, retractarse de la invitaci\u00f3n y, m\u00e1s tarde, utilizar el token para restablecer la contrase\u00f1a del usuario objetivo, lo que lleva a la toma de control total de la cuenta." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -37,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,14 +83,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.9", + "matchCriteriaId": "6C97FEE4-5604-4DA0-B695-116366C729AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/844e8855c7a713dc7371766dba4125de4007b1cf", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/bd9f2301-11c7-4cbd-8d77-3e9225bd67e8", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6582.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6582.json index 5b98e3cf633..72f731c24b9 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6582.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6582.json @@ -2,16 +2,42 @@ "id": "CVE-2024-6582", "sourceIdentifier": "security@huntr.dev", "published": "2024-09-13T17:15:13.220", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T19:45:30.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A broken access control vulnerability exists in the latest version of lunary-ai/lunary. The `saml.ts` file allows a user from one organization to update the Identity Provider (IDP) settings and view the SSO metadata of another organization. This vulnerability can lead to unauthorized access and potential account takeover if the email of a user in the target organization is known." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de control de acceso en la \u00faltima versi\u00f3n de lunary-ai/lunary. El archivo `saml.ts` permite que un usuario de una organizaci\u00f3n actualice la configuraci\u00f3n del proveedor de identidad (IDP) y vea los metadatos de SSO de otra organizaci\u00f3n. Esta vulnerabilidad puede provocar acceso no autorizado y una posible apropiaci\u00f3n de cuentas si se conoce el correo electr\u00f3nico de un usuario de la organizaci\u00f3n de destino." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -36,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, { "source": "security@huntr.dev", "type": "Secondary", @@ -47,14 +83,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.9", + "matchCriteriaId": "6C97FEE4-5604-4DA0-B695-116366C729AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/1f043d8798ad87346dfe378eea723bff78ad7433", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/251d138c-3911-4a81-96e5-5a4ab59a0b59", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6862.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6862.json index b9f0c147962..f412105b38c 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6862.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6862.json @@ -2,16 +2,42 @@ "id": "CVE-2024-6862", "sourceIdentifier": "security@huntr.dev", "published": "2024-09-13T17:15:13.420", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:37:20.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in lunary-ai/lunary version 1.2.34 due to overly permissive CORS settings. This vulnerability allows an attacker to sign up for and create projects or use the instance as if they were a user with local access. The main attack vector is for instances hosted locally on personal machines, which are not publicly accessible. The CORS settings in the backend permit all origins, exposing unauthenticated endpoints to CSRF attacks." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la versi\u00f3n 1.2.34 de lunary-ai/lunary debido a una configuraci\u00f3n CORS demasiado permisiva. Esta vulnerabilidad permite que un atacante se registre y cree proyectos o utilice la instancia como si fuera un usuario con acceso local. El principal vector de ataque son las instancias alojadas localmente en m\u00e1quinas personales, que no son de acceso p\u00fablico. La configuraci\u00f3n CORS en el backend permite todos los or\u00edgenes, lo que expone los endpoints no autenticados a ataques CSRF." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -47,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lunary:lunary:1.2.34:*:*:*:*:*:*:*", + "matchCriteriaId": "C6D4C592-3D6E-4371-A03F-BA35C1A6473F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/3451fcd7b9d95e9091d62c515752f39f2faa6e54", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/0b1d851e-3455-480c-ad5a-23565894976f", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6867.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6867.json index 52e5c6395b4..0054ea99a2e 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6867.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6867.json @@ -2,16 +2,42 @@ "id": "CVE-2024-6867", "sourceIdentifier": "security@huntr.dev", "published": "2024-09-13T17:15:13.613", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:28:05.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability exists in the lunary-ai/lunary, specifically in the `runs/{run_id}/related` endpoint. This endpoint does not verify that the user has the necessary access rights to the run(s) they are accessing. As a result, it returns not only the specified run but also all runs that have the `run_id` listed as their parent run. This issue affects the main branch, commit a761d833. The vulnerability allows unauthorized users to obtain information about non-public runs and their related runs, given the `run_id` of a public or non-public run." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en lunary-ai/lunary, espec\u00edficamente en el punto de conexi\u00f3n `runs/{run_id}/related`. Este punto de conexi\u00f3n no verifica que el usuario tenga los derechos de acceso necesarios a las ejecuciones a las que est\u00e1 accediendo. Como resultado, no solo devuelve la ejecuci\u00f3n especificada, sino tambi\u00e9n todas las ejecuciones que tienen el `run_id` indicado como su ejecuci\u00f3n principal. Este problema afecta a la rama principal, commit a761d833. La vulnerabilidad permite a usuarios no autorizados obtener informaci\u00f3n sobre ejecuciones no p\u00fablicas y sus ejecuciones relacionadas, dado el `run_id` de una ejecuci\u00f3n p\u00fablica o no p\u00fablica." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -47,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lunary:lunary:1.4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0DAD2D-0C97-49C3-908F-E3BA6B8E6FFA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/35afd4439464571eb016318cd7b6f85a162225ca", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/460df515-164c-4435-954b-0233a181545f", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json index b601bbe29c4..da4266d366f 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7591", "sourceIdentifier": "security@progress.com", "published": "2024-09-05T18:15:06.480", - "lastModified": "2024-09-06T12:08:21.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T18:19:12.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,10 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kemptechnologies:loadmaster:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.40.0", + "versionEndIncluding": "7.2.60.0", + "matchCriteriaId": "C477074C-D2DF-4BDB-87FD-76133561BABB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:kemptechnologies:multi-tenant_hypervisor_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.35.4", + "versionEndExcluding": "7.1.35.11", + "matchCriteriaId": "A696FEC5-08C0-4297-9684-03CC7C1BE9B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7618.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7618.json index e0a1e4e2441..3fd4f6e37b0 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7618.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7618.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7618", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-10T08:15:03.620", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:20:00.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,30 +81,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.4.6.0", + "matchCriteriaId": "AFC63B3E-224E-4106-864F-6FCB8EBB1519" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.4.0/templates/reactions/admin_reaction.php#L112", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigreactions.php?rev=3147528#L88", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3147528/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://wordpress.org/plugins/peepso-core/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.peepso.com/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edf2e060-5ae4-4b46-bc68-22ae5f516fe8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7655.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7655.json index 6b1efcef0b9..9db24f0d428 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7655.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7655.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7655", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-10T08:15:03.830", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T18:20:53.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -51,30 +71,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.4.6.0", + "matchCriteriaId": "AFC63B3E-224E-4106-864F-6FCB8EBB1519" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigfields.php?rev=3147528#L17", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3147528/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://wordpress.org/plugins/peepso-core/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.peepso.com/6-4-6-0/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.peepso.com/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e85ee611-ae81-4736-b4f0-b9d06714da18?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8417.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8417.json index a1b6ac38434..da849150255 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8417.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8417.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8417", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-04T18:15:06.273", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T19:53:12.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yunknet:online_school_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.5.6", + "matchCriteriaId": "306CF7F4-C30C-4602-94C5-FA26F591A346" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.276496", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276496", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.402376", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.shikangsi.com/post/share/d31fefa1-ca08-48d7-a671-727d63bfaf65", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8963.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8963.json new file mode 100644 index 00000000000..833593517cc --- /dev/null +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8963.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8963", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-09-19T18:15:10.600", + "lastModified": "2024-09-19T18:15:10.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5c5e9eca865..40cb7f9f0b0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-19T18:00:17.803773+00:00 +2024-09-19T20:00:17.597789+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-19T17:59:23.113000+00:00 +2024-09-19T19:58:23.870000+00:00 ``` ### Last Data Feed Release @@ -33,57 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -263450 +263457 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `7` -- [CVE-2024-31570](CVE-2024/CVE-2024-315xx/CVE-2024-31570.json) (`2024-09-19T17:15:12.623`) -- [CVE-2024-38016](CVE-2024/CVE-2024-380xx/CVE-2024-38016.json) (`2024-09-19T17:15:12.947`) -- [CVE-2024-45752](CVE-2024/CVE-2024-457xx/CVE-2024-45752.json) (`2024-09-19T16:15:04.910`) -- [CVE-2024-45861](CVE-2024/CVE-2024-458xx/CVE-2024-45861.json) (`2024-09-19T16:15:05.103`) -- [CVE-2024-45862](CVE-2024/CVE-2024-458xx/CVE-2024-45862.json) (`2024-09-19T16:15:05.227`) -- [CVE-2024-7736](CVE-2024/CVE-2024-77xx/CVE-2024-7736.json) (`2024-09-19T16:15:05.520`) -- [CVE-2024-7737](CVE-2024/CVE-2024-77xx/CVE-2024-7737.json) (`2024-09-19T16:15:05.727`) -- [CVE-2024-8375](CVE-2024/CVE-2024-83xx/CVE-2024-8375.json) (`2024-09-19T16:15:06.023`) -- [CVE-2024-8651](CVE-2024/CVE-2024-86xx/CVE-2024-8651.json) (`2024-09-19T17:15:15.173`) -- [CVE-2024-8652](CVE-2024/CVE-2024-86xx/CVE-2024-8652.json) (`2024-09-19T17:15:15.360`) -- [CVE-2024-8653](CVE-2024/CVE-2024-86xx/CVE-2024-8653.json) (`2024-09-19T17:15:15.503`) -- [CVE-2024-8698](CVE-2024/CVE-2024-86xx/CVE-2024-8698.json) (`2024-09-19T16:15:06.177`) -- [CVE-2024-8883](CVE-2024/CVE-2024-88xx/CVE-2024-8883.json) (`2024-09-19T16:15:06.403`) +- [CVE-2024-25673](CVE-2024/CVE-2024-256xx/CVE-2024-25673.json) (`2024-09-19T19:15:24.093`) +- [CVE-2024-33109](CVE-2024/CVE-2024-331xx/CVE-2024-33109.json) (`2024-09-19T19:15:24.170`) +- [CVE-2024-40125](CVE-2024/CVE-2024-401xx/CVE-2024-40125.json) (`2024-09-19T19:15:24.350`) +- [CVE-2024-47159](CVE-2024/CVE-2024-471xx/CVE-2024-47159.json) (`2024-09-19T18:15:09.803`) +- [CVE-2024-47160](CVE-2024/CVE-2024-471xx/CVE-2024-47160.json) (`2024-09-19T18:15:10.013`) +- [CVE-2024-47162](CVE-2024/CVE-2024-471xx/CVE-2024-47162.json) (`2024-09-19T18:15:10.227`) +- [CVE-2024-8963](CVE-2024/CVE-2024-89xx/CVE-2024-8963.json) (`2024-09-19T18:15:10.600`) ### CVEs modified in the last Commit -Recently modified CVEs: `39` +Recently modified CVEs: `50` -- [CVE-2024-39317](CVE-2024/CVE-2024-393xx/CVE-2024-39317.json) (`2024-09-19T16:08:43.417`) -- [CVE-2024-40865](CVE-2024/CVE-2024-408xx/CVE-2024-40865.json) (`2024-09-19T17:58:37.370`) -- [CVE-2024-41565](CVE-2024/CVE-2024-415xx/CVE-2024-41565.json) (`2024-09-19T16:19:59.317`) -- [CVE-2024-42698](CVE-2024/CVE-2024-426xx/CVE-2024-42698.json) (`2024-09-19T16:29:51.217`) -- [CVE-2024-44589](CVE-2024/CVE-2024-445xx/CVE-2024-44589.json) (`2024-09-19T17:35:04.797`) -- [CVE-2024-45176](CVE-2024/CVE-2024-451xx/CVE-2024-45176.json) (`2024-09-19T17:56:15.603`) -- [CVE-2024-45304](CVE-2024/CVE-2024-453xx/CVE-2024-45304.json) (`2024-09-19T17:26:37.030`) -- [CVE-2024-45440](CVE-2024/CVE-2024-454xx/CVE-2024-45440.json) (`2024-09-19T17:38:40.100`) -- [CVE-2024-46695](CVE-2024/CVE-2024-466xx/CVE-2024-46695.json) (`2024-09-19T17:59:23.113`) -- [CVE-2024-46697](CVE-2024/CVE-2024-466xx/CVE-2024-46697.json) (`2024-09-19T17:53:43.173`) -- [CVE-2024-46706](CVE-2024/CVE-2024-467xx/CVE-2024-46706.json) (`2024-09-19T17:51:07.670`) -- [CVE-2024-6053](CVE-2024/CVE-2024-60xx/CVE-2024-6053.json) (`2024-09-19T17:22:36.697`) -- [CVE-2024-6142](CVE-2024/CVE-2024-61xx/CVE-2024-6142.json) (`2024-09-19T17:47:00.270`) -- [CVE-2024-6143](CVE-2024/CVE-2024-61xx/CVE-2024-6143.json) (`2024-09-19T17:47:33.370`) -- [CVE-2024-6144](CVE-2024/CVE-2024-61xx/CVE-2024-6144.json) (`2024-09-19T17:48:27.787`) -- [CVE-2024-6145](CVE-2024/CVE-2024-61xx/CVE-2024-6145.json) (`2024-09-19T17:50:17.250`) -- [CVE-2024-6146](CVE-2024/CVE-2024-61xx/CVE-2024-6146.json) (`2024-09-19T17:50:48.247`) -- [CVE-2024-6251](CVE-2024/CVE-2024-62xx/CVE-2024-6251.json) (`2024-09-19T16:50:07.723`) -- [CVE-2024-6252](CVE-2024/CVE-2024-62xx/CVE-2024-6252.json) (`2024-09-19T16:51:12.527`) -- [CVE-2024-6266](CVE-2024/CVE-2024-62xx/CVE-2024-6266.json) (`2024-09-19T16:53:36.647`) -- [CVE-2024-6268](CVE-2024/CVE-2024-62xx/CVE-2024-6268.json) (`2024-09-19T17:06:24.663`) -- [CVE-2024-8006](CVE-2024/CVE-2024-80xx/CVE-2024-8006.json) (`2024-09-19T17:46:03.447`) -- [CVE-2024-8260](CVE-2024/CVE-2024-82xx/CVE-2024-8260.json) (`2024-09-19T16:08:58.863`) -- [CVE-2024-8304](CVE-2024/CVE-2024-83xx/CVE-2024-8304.json) (`2024-09-19T17:39:46.687`) -- [CVE-2024-8395](CVE-2024/CVE-2024-83xx/CVE-2024-8395.json) (`2024-09-19T17:53:45.753`) +- [CVE-2024-31416](CVE-2024/CVE-2024-314xx/CVE-2024-31416.json) (`2024-09-19T19:06:59.787`) +- [CVE-2024-34343](CVE-2024/CVE-2024-343xx/CVE-2024-34343.json) (`2024-09-19T19:57:52.007`) +- [CVE-2024-40568](CVE-2024/CVE-2024-405xx/CVE-2024-40568.json) (`2024-09-19T19:35:13.880`) +- [CVE-2024-45159](CVE-2024/CVE-2024-451xx/CVE-2024-45159.json) (`2024-09-19T18:26:24.687`) +- [CVE-2024-45400](CVE-2024/CVE-2024-454xx/CVE-2024-45400.json) (`2024-09-19T18:04:36.627`) +- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2024-09-19T18:12:52.220`) +- [CVE-2024-45455](CVE-2024/CVE-2024-454xx/CVE-2024-45455.json) (`2024-09-19T18:51:15.433`) +- [CVE-2024-45456](CVE-2024/CVE-2024-454xx/CVE-2024-45456.json) (`2024-09-19T18:38:57.500`) +- [CVE-2024-45458](CVE-2024/CVE-2024-454xx/CVE-2024-45458.json) (`2024-09-19T18:55:46.513`) +- [CVE-2024-4554](CVE-2024/CVE-2024-45xx/CVE-2024-4554.json) (`2024-09-19T18:15:10.433`) +- [CVE-2024-45620](CVE-2024/CVE-2024-456xx/CVE-2024-45620.json) (`2024-09-19T19:21:38.653`) +- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2024-09-19T19:35:14.767`) +- [CVE-2024-46374](CVE-2024/CVE-2024-463xx/CVE-2024-46374.json) (`2024-09-19T19:35:15.573`) +- [CVE-2024-46681](CVE-2024/CVE-2024-466xx/CVE-2024-46681.json) (`2024-09-19T18:10:49.623`) +- [CVE-2024-46684](CVE-2024/CVE-2024-466xx/CVE-2024-46684.json) (`2024-09-19T18:04:22.623`) +- [CVE-2024-46688](CVE-2024/CVE-2024-466xx/CVE-2024-46688.json) (`2024-09-19T18:01:43.037`) +- [CVE-2024-46694](CVE-2024/CVE-2024-466xx/CVE-2024-46694.json) (`2024-09-19T18:16:22.247`) +- [CVE-2024-6087](CVE-2024/CVE-2024-60xx/CVE-2024-6087.json) (`2024-09-19T19:32:14.710`) +- [CVE-2024-6582](CVE-2024/CVE-2024-65xx/CVE-2024-6582.json) (`2024-09-19T19:45:30.283`) +- [CVE-2024-6862](CVE-2024/CVE-2024-68xx/CVE-2024-6862.json) (`2024-09-19T18:37:20.910`) +- [CVE-2024-6867](CVE-2024/CVE-2024-68xx/CVE-2024-6867.json) (`2024-09-19T18:28:05.477`) +- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-09-19T18:19:12.210`) +- [CVE-2024-7618](CVE-2024/CVE-2024-76xx/CVE-2024-7618.json) (`2024-09-19T18:20:00.000`) +- [CVE-2024-7655](CVE-2024/CVE-2024-76xx/CVE-2024-7655.json) (`2024-09-19T18:20:53.617`) +- [CVE-2024-8417](CVE-2024/CVE-2024-84xx/CVE-2024-8417.json) (`2024-09-19T19:53:12.383`) ## Download and Usage diff --git a/_state.csv b/_state.csv index eb2a823a6e8..e4e8fcc7a0c 100644 --- a/_state.csv +++ b/_state.csv @@ -58299,12 +58299,12 @@ CVE-2013-0639,0,0,b31be035ceb64b0d082ddfacc740a4210652cc5e7e0dde51ddff1158c160dc CVE-2013-0640,0,0,124b8bb226f7e9d6096b31adba4a0e431bfd4cafe81871fe0024db93f6d5836d,2024-07-16T17:36:16.623000 CVE-2013-0641,0,0,8b435cbf77af4b23b70d0392c35e373c862cd1b7676f3d77a9653fe18e07ad76,2024-07-16T17:36:05.960000 CVE-2013-0642,0,0,bfadc58d9042f0563f6f464599e9d26f03ce9f43f5f43c002304603f48da66a2,2018-12-06T19:47:16.903000 -CVE-2013-0643,0,0,729305f657b64058679da68ad515dc2a54231958b32050c68b1c86f5c900050c,2024-09-18T19:35:01.410000 +CVE-2013-0643,0,1,ac028e28f0c58cfd927fcc5eee044da647ef72101b764105bdbe0ec010bc29b2,2024-09-19T19:48:10.033000 CVE-2013-0644,0,0,79820981c348e4e64b9198c5d6054f480e970cc8d8c247ee3d548bff6c82ac85,2018-12-06T19:48:02.123000 CVE-2013-0645,0,0,6125d0f7d22b366190241b77a7b5922adc7339604421994dce13d534098c6aea,2018-12-06T19:48:36.513000 CVE-2013-0646,0,0,c06c944b7c73de3e62d948a2b222d45721d45f6414f5e68a92e11e952ff01974,2014-03-26T04:44:11.977000 CVE-2013-0647,0,0,eef38ab0e06ece5be29234416a43368cf2dc4818ff0481da512aa8e96cfa7923,2018-12-06T19:50:48.563000 -CVE-2013-0648,0,0,6b0666a3ff66920f1be6ded6a96213840168c4e3336527f9bfefe5c13da1df25,2024-09-18T19:35:02.327000 +CVE-2013-0648,0,1,1bbefef5fe7b99ef5472e70aee3444d59a0b886e0a86d2abe59f31dd3051169e,2024-09-19T19:51:57.317000 CVE-2013-0649,0,0,08f618eda7f64799433610eda3b01050cfd3e669aa064372e20a16c5d61237e1,2018-12-06T19:50:14.467000 CVE-2013-0650,0,0,05a6fa43599436cf52455a9e658850893592583b2a41594c4c9c1629f1ff4728,2014-03-26T04:44:15.773000 CVE-2013-0651,0,0,f49ccbeee68ba586b35032f2fc9fbd62aa3c838e205fd987ab565ea2bea44c76,2013-01-30T05:00:00 @@ -64974,12 +64974,12 @@ CVE-2014-0493,0,0,5980f8ce7bccecebd2e70dd6b857cb4b656971c59fbacbb63249cc45b51f75 CVE-2014-0494,0,0,8b294b47a486336cd6b4db3f06f91abe3b0268360260099a12dc8b5ebb59c596,2017-08-29T01:34:11.030000 CVE-2014-0495,0,0,671e97412a74358a5c6e50a3bb0dbb2b494498ae12e83fc145a13daedb649abf,2018-12-13T15:50:35.977000 CVE-2014-0496,0,0,943eee2f6677ecbddd894736d06d754908e933d15ae4ea4f9cfea3e0ddbbf17b,2018-12-13T15:50:55.103000 -CVE-2014-0497,0,0,d6e32f9fc77d829dbf50e0c69e55537733d441acc9da96160dfc9a69312dffe9,2024-09-18T19:35:02.543000 +CVE-2014-0497,0,1,52c8371071aa4fd7738da924f81c155923a24cc665bb1c815f7c347dec1de3d5,2024-09-19T19:56:17.247000 CVE-2014-0498,0,0,1618f11598fb67e87357bcde2d1122794a71c785ac05d06e2d56fd17028571fc,2018-12-13T15:54:15.917000 CVE-2014-0499,0,0,0361066feb81eae85003bd40e34d63a55b78a3c7f0bdfd41851c555d91004b71,2018-12-13T15:54:47.153000 CVE-2014-0500,0,0,97edfd619058dc26ad56cf33391d9dc91362a50dec1d0dbc02abb7edf993b617,2018-01-03T02:29:03.130000 CVE-2014-0501,0,0,4025edf733331396525b490cf3d77ea02dc26b06228603a4b61385c7de6588f2,2018-01-03T02:29:03.210000 -CVE-2014-0502,0,0,0aec5223f09074d52a34e1c752542c3e472ac2f8b486fe6bc9d439bb474a1256,2024-09-18T19:35:03.393000 +CVE-2014-0502,0,1,411a92a14510541e15575d6525d0a6e735d616f03fe8f2886da4486c39f075fb,2024-09-19T19:53:44.480000 CVE-2014-0503,0,0,c67bf98b7682ef5050d13c43497f2af42e7aa350e509586400ddb6191e666325,2018-12-13T16:00:37.443000 CVE-2014-0504,0,0,e6a68e9a83d1aff357dde03fe34200e26c34033a1843fb3b1a467a539bb2000a,2018-12-13T16:00:23.630000 CVE-2014-0505,0,0,9cf82e807986acb6181ee7efa5d77d0a8127ac7e93c1c91848a81dbe58937cd2,2014-03-14T17:07:42.850000 @@ -128928,7 +128928,7 @@ CVE-2019-10686,0,0,071dffbfdea10181bb98b77b81173ea1ee44c0bf3f27125b70455662edc40 CVE-2019-10687,0,0,4d2aa4f6c0463103aef2503f43b6f1e6753450b125b2eb1b959d173389b0f8e1,2019-08-27T15:51:11.620000 CVE-2019-10688,0,0,139389dbc249e8cae439573037005e32285d24298cd9752f9767fbd85f7cada6,2019-06-17T16:15:11.653000 CVE-2019-10689,0,0,3a6ff66e02d9a27391650c9b85af3797719e726b15e08ea64568eab01a8deea0,2019-06-27T17:26:21.897000 -CVE-2019-1069,0,0,f31e90e4331009e9da44368d612d680d5b98b6b04c978425b0ce779643dd7237,2024-09-19T01:00:03.107000 +CVE-2019-1069,0,1,0515bb971e4f7a4465e7951022bb244d8e5b1246162c1944d1f49a5443592e90,2024-09-19T19:58:01.950000 CVE-2019-10691,0,0,e8e0d767bb2f3b5e08db6f24e350ea086b46abac68877bbd2cba7819c236f317,2023-11-07T03:02:32.480000 CVE-2019-10692,0,0,8adff711cac0bb2de2edadfdf1000b35b700fb5b209d412cad8743610b43de23,2023-05-23T20:30:59.777000 CVE-2019-10694,0,0,9582148ff7994145825de46f0455936b126d6116ce2adec095540a2cc82c30a9,2022-01-24T16:46:01.133000 @@ -175555,7 +175555,7 @@ CVE-2021-31555,0,0,7de5df80bc06456a2bd06cb1ed2fa6bf25b8a0e66ee1e2ceff5a7504cc2b9 CVE-2021-31556,0,0,93b949700d04612fa67f7aa21454bcfa0dedb54b45feb534dfde6a346bbdbf4e,2023-11-07T03:34:58.647000 CVE-2021-31558,0,0,ceed4d2a05c41f9fdd58ce2921315e67a6e46f1c89b4c2da0bce257ffbc7f901,2021-12-28T14:54:32.527000 CVE-2021-31559,0,0,c056101e3a724e5296c3096cffa3217710e8d3f22622b1fbc675682800b56fdf,2022-10-25T16:42:38.307000 -CVE-2021-3156,0,0,756a4c61ba757c306e336a56d1a3eabd3a978cd9871d60b7e3550598effb17de,2024-09-18T17:15:13.843000 +CVE-2021-3156,0,1,c9f0ccb5f8e0b0bd0d85e1cc30dd2ecceb494b21ff9563b3056182a6d1fce82a,2024-09-19T19:58:23.870000 CVE-2021-31562,0,0,ac50e4387893ec363455949ced3c17ca407e9a27f3f2c3f523390c3482b094df,2022-01-28T15:55:53.923000 CVE-2021-31566,0,0,801f1236a607222712dc7741b61bbdda3061d826b7fd22f878d0c5c45a130a15,2024-03-27T16:04:30.260000 CVE-2021-31567,0,0,0da3da305c7b1718259a905dc09c36fc318ae57a531df276f807be7858b88fad,2022-02-03T17:09:44.553000 @@ -213190,7 +213190,7 @@ CVE-2023-0632,0,0,d83115f04f4989ede052facc5d8104ea2fb79fa2a1de534b7f13673b082097 CVE-2023-0633,0,0,c55f2b66671ce085b4ad3974c5b038c8c1ffd9a2f567e03eea54fc854cda175a,2023-09-25T18:32:19.187000 CVE-2023-0634,0,0,e1f434232229f0b69e5813912fc243d281927b7062ddb545130690b604bd0d71,2023-11-07T04:01:03.280000 CVE-2023-0635,0,0,d81026f71e5aca952558a8d499cbeb71f364c949b09c316ae202aeba51d2fc8c,2024-09-19T15:15:12.403000 -CVE-2023-0636,0,1,daf2ae1675c4a664309e700bd6ab90b8f65b32aff69a932fba6e183e64ec4bda,2024-09-19T17:15:12.017000 +CVE-2023-0636,0,0,daf2ae1675c4a664309e700bd6ab90b8f65b32aff69a932fba6e183e64ec4bda,2024-09-19T17:15:12.017000 CVE-2023-0637,0,0,89cd23cbb4fa4626e47231bb03b58900a8eed173642bad665a49a10f9ff14366,2024-05-17T02:17:27.057000 CVE-2023-0638,0,0,ba94fa67c2ce1ebb9da3f45635b51b7bc32a46cbd4ca9f565be0d8435038da97,2024-05-17T02:17:27.163000 CVE-2023-0639,0,0,97ebc3e83332f93df2d560c117d07a78fd7479e47b3a71fd746d3fbb9a517457,2024-05-17T02:17:27.273000 @@ -222909,7 +222909,7 @@ CVE-2023-30458,0,0,48c15acc8080e55dcad253897d98be087ef3a613a48400bab015ca689a5a0 CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05326,2023-04-25T15:56:57.943000 CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000 CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31 -CVE-2023-30464,0,0,7ed8486907cd9811a99dcb420b4c9fa8895464d669565a41f685a043dcdf6d95,2024-09-18T21:15:13.080000 +CVE-2023-30464,0,1,3aae22a2e0f43047e68f03e1c3bca7b8e0d56717d49f06b096746b3b526617e7,2024-09-19T19:35:01.113000 CVE-2023-30465,0,0,03cb642b9d155b8fc540b2b5aab3b36429c8caf9db77ee091c34798766c54d43,2023-04-18T19:30:08.003000 CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000 CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000 @@ -225565,7 +225565,7 @@ CVE-2023-33833,0,0,8cabb27c4a96645953c1a4f1036d344749d66b348828bd126020c3efb5d4e CVE-2023-33834,0,0,8a99184e234095ae4700b728415aa680a907977cb94f44aaa995a53c8fcba752,2023-09-01T20:48:26.573000 CVE-2023-33835,0,0,da6214caf650e801b3a9fdeb758dc442525c15d94e4f974e5b44154e1073b4df,2023-09-01T20:48:06.953000 CVE-2023-33836,0,0,13579f69f5ba3df93b75aa9b258f2d9f33b31ebbc257567a3ea6c574557bd8d7,2023-10-19T16:27:02.050000 -CVE-2023-33837,0,1,50b24b6dd685668a1aa425c6457e8db215df45025fbdff151f60f7fdf3b7780b,2024-09-19T16:15:03.897000 +CVE-2023-33837,0,0,50b24b6dd685668a1aa425c6457e8db215df45025fbdff151f60f7fdf3b7780b,2024-09-19T16:15:03.897000 CVE-2023-33839,0,0,bc28ce9c837b78c2fb043e0a611220533f03485c577d075d53f20054bb056fac,2023-10-28T03:31:20.867000 CVE-2023-3384,0,0,c366782f96c01b6685af33932f5b3dbfa67631b1a69a8be3fadc1c8aad177b98,2023-11-07T04:18:39.110000 CVE-2023-33840,0,0,586d7d4f70d01d8ed3bf3edb820638ca5a1ed02b7e9e624c28a81439ca6eb363,2023-10-28T03:32:15.907000 @@ -225576,7 +225576,7 @@ CVE-2023-33847,0,0,82ca8aa0bc2d03362319c542ea5b2770d3d85f3edc1d48ee0a623bf42e800 CVE-2023-33848,0,0,8c230bcaf355a577515ed758441936574666148d6f8eb2c4fef9542b77704701,2023-06-15T15:08:53.457000 CVE-2023-33849,0,0,cee19490ece517fd373f4e7e8ed6adf35f850894b189fbcc578bbd8d63ec8305,2023-06-15T16:56:56.460000 CVE-2023-3385,0,0,9500094f984a4b5d1e66b5fa4a2c7e1b713d3f8f392f6fc06da408d890552a37,2023-08-04T19:19:04.697000 -CVE-2023-33850,0,1,fbba5b69c67c9acf3b1ad18d606a9ab31046ef79599a8260c291e9eb0693cf7e,2024-09-19T16:15:04.047000 +CVE-2023-33850,0,0,fbba5b69c67c9acf3b1ad18d606a9ab31046ef79599a8260c291e9eb0693cf7e,2024-09-19T16:15:04.047000 CVE-2023-33851,0,0,4ac32a90038a96c4290f8386bc4de44c14e956a2c207f0eac7a85d82111f6074,2024-02-12T19:54:23.117000 CVE-2023-33852,0,0,bc3c73250f73c64645e886b9ff4fe0ce89bb90d67afa464822661d78d1e66b51,2023-08-29T04:43:06.033000 CVE-2023-33855,0,0,aa3542d64ac11799927f1e76ad33cc287cefdca6570205fddaaa45ff2dc14b58,2024-03-26T17:09:53.043000 @@ -226424,7 +226424,7 @@ CVE-2023-35006,0,0,5acb31cc1556024eeb64b08b60260767e246691f5242ee9df31af625e2b32 CVE-2023-35009,0,0,d8de65d8c74d095102650d61033fbe6e6edcf88ae0bfa7092ac4ef92348c016e,2024-06-21T19:15:27.300000 CVE-2023-3501,0,0,a76559ca80d102957b322b035a4ffefc79e9201575b2cccb00498046008bf9e4,2023-11-07T04:18:51.230000 CVE-2023-35011,0,0,38ddb64d0651455b912949926db10e88999c3cf7ce781799eb53e2740057a3b5,2024-06-21T19:15:27.467000 -CVE-2023-35012,0,1,f81d33aa7d3186d868c53d1111ace48462742e3ef54c4edf2c8b154c222007b6,2024-09-19T17:15:12.223000 +CVE-2023-35012,0,0,f81d33aa7d3186d868c53d1111ace48462742e3ef54c4edf2c8b154c222007b6,2024-09-19T17:15:12.223000 CVE-2023-35013,0,0,534ee78f8c171fc79a4adeb51556f3dbd30c4450c8c4b3cfa11fe98e966cbdbc,2023-10-19T16:42:30.197000 CVE-2023-35016,0,0,4fa91503d6f6db95a191dff0d99a0bfebb7cd1f190858d458e96118cac712474,2023-08-04T17:23:18.223000 CVE-2023-35018,0,0,6d336ce3e2614937180971b4858c079e9a4762f40daaf2f592acb48025066235,2023-10-19T16:20:10.327000 @@ -230784,7 +230784,7 @@ CVE-2023-40650,0,0,352b9f0a42924a10ae1ec80f36517882f8a68e0276912361872f5d0ea9707 CVE-2023-40651,0,0,4b7377a587c45b53860a7f5cef45bd5433fa18a2bfcf837a51529a6560be5347,2023-10-11T17:35:31.657000 CVE-2023-40652,0,0,a18e3fe3990e80f554e1b4f55aa445ad66414551a973c9af4895cf611c407613,2023-10-11T17:35:49.427000 CVE-2023-40653,0,0,88eeb937a3e4c749b0b049debb5babce5dcc6cdc9ad79aae89cfb1d78ecb1fb7,2024-02-15T20:53:14.203000 -CVE-2023-40654,0,0,8d852dea043a9db45de1594e9fa2b1213b47065b3e199c550a2cc4f0930babdb,2023-10-11T19:08:04.547000 +CVE-2023-40654,0,1,75ef0ecb7c1b4344a60dff2f1c173adf0d9c0494c9c6a83bf973de2bf626831c,2024-09-19T18:35:02.187000 CVE-2023-40655,0,0,4328cdbb4187e8b0234c53d0517ebc655578d5acdd9d3f7f4547eb76c952f50d,2023-12-19T17:09:11.113000 CVE-2023-40656,0,0,19b49d5f2f04f7adc1e8ec42eabd1ec41b91195134dc054a4b5906547d33a983,2023-12-19T16:53:42.183000 CVE-2023-40657,0,0,de372f5606a6a9c0eb353d9acefa85fa576d984d78e2f34c3e3bafeafb5ce44c,2023-12-19T16:10:07.447000 @@ -233121,7 +233121,7 @@ CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a23020 CVE-2023-43980,0,0,bbbdf96fe43913bc9148a2be4e4cf79c095e8946d088cfcca396bde192a42883,2023-10-06T16:26:51.337000 CVE-2023-43981,0,0,7bc0b04a874fb37912d5a49421c2f5f408de1077870392e33bb57c9ca9c75f89,2023-10-07T02:52:59.353000 CVE-2023-43982,0,0,36c050839890ac22e9c1d01ac6e12f62ba92c226ca1aa60fc6850304f993fad5,2023-11-09T22:07:27.420000 -CVE-2023-43983,0,0,6d9211a02e0a131adf3e167416c4fcfa68bb60a61bdffb8dcb0aef2773cbd238,2023-10-07T02:52:28.870000 +CVE-2023-43983,0,1,9159a914c282ab44b718a500a523f5b25649be59fcdc42674f05ea6f2949ffee,2024-09-19T19:35:04.850000 CVE-2023-43984,0,0,734f41a89a1d8239b9e46c66d768f28b73875d461f17b4c52b2f21e0399d5916,2024-09-05T13:35:00.617000 CVE-2023-43985,0,0,d6426e07dde5bc7e003721bf3af2143d307be62b95406f9014be4ad2380774e6,2024-01-25T20:07:56.693000 CVE-2023-43986,0,0,f6e814df340a370055926dfb76c8e5c7ca2c32dbd5d8ca11c76fab82aae5e055,2023-10-25T19:57:40.860000 @@ -233637,11 +233637,11 @@ CVE-2023-44829,0,0,5db7752f8ecb00403264ccf21f2659fe0ddfcfbbceb6f5c8ddddc55c7780b CVE-2023-44830,0,0,f49977dfe516745c571ff61090d55c8fc4270a5fd142bbbdb6ce53b5908f7adf,2023-10-07T03:18:38.277000 CVE-2023-44831,0,0,b97e9b1170ac4de59d7ff19e0fb6f009616c576284357e866bbfe60abc61bb12,2023-10-07T03:16:56.033000 CVE-2023-44832,0,0,9c1b721dcfa1a8d8e89ace89b9c1b3507031d5009c9747a3da72e27d19da2342,2023-10-07T03:15:46.517000 -CVE-2023-44833,0,0,c2b3c7d97797d8e23ef25182b7d4eadd3c4bf2687e1609987205fb358fa89dd0,2023-10-07T03:17:11.587000 -CVE-2023-44834,0,0,e7d05c7046c9a3cee4e8fdbbf7577987637ea30fb78e39f8a73ce48b0cebfd95,2023-10-07T03:17:41.593000 -CVE-2023-44835,0,0,4087f2df3b958b6a40d6db323c9a86117da5378d28c84199c00ff8f3d171417b,2023-10-07T03:17:27.913000 -CVE-2023-44836,0,0,2ef940f84d5706190363ff3de97961d61304db78caa9a1d358045f9a54e24843,2023-10-06T15:20:09.927000 -CVE-2023-44837,0,0,5aee9220517509b69f4bde4ec41abe9da85d39e01f66ffd26cc455e41c8ce77f,2023-10-06T15:19:36.920000 +CVE-2023-44833,0,1,0c804cc3c43204c5befa90250fbfba4df8a5bf5007c06fd8daefda112103f533,2024-09-19T19:35:05.797000 +CVE-2023-44834,0,1,08996b4cba22df2276f30026a7a29031ecdcee6cb18029b0142bf849bd6c516d,2024-09-19T19:35:06.803000 +CVE-2023-44835,0,1,e17d982550d6512cf6fe9c365f1e06a437afe69d67fde550145cafbe5bb73011,2024-09-19T19:35:07.573000 +CVE-2023-44836,0,1,62a6ff921417f32c3e565b38aade4a341ea0660c3ac13f7991d1da446ddfc7c8,2024-09-19T19:35:08.333000 +CVE-2023-44837,0,1,6edc4c0f7cb805a39f28f03e490a78fd2c9751dfa21d9ab0c3067871839fa870,2024-09-19T19:35:09.180000 CVE-2023-44838,0,0,826bd96275d8c94caef15f783d57a0f555324313131d73e5992ad76971191292,2023-10-06T15:18:30.847000 CVE-2023-44839,0,0,a0e587d190a99eed8b1b0978216fd7d1258814f55b89567589a009468b22137d,2023-10-06T14:59:00.183000 CVE-2023-44846,0,0,f34b0705d17778a0a98e8c488cd79f0636bd3cd4cc85846f0269be4cceaf4a53,2024-09-19T15:35:06.370000 @@ -233901,7 +233901,7 @@ CVE-2023-45234,0,0,52d30ab5beac57d2cd298224003e0bee22da7a17b147520a845e2ba90bf70 CVE-2023-45235,0,0,cff23e65f01ec655fd14e6d133970016dc039673f6b11aca9b36e51667543adf,2024-03-13T02:15:50.617000 CVE-2023-45236,0,0,92efaaa1bc2b9526c3c29cdc6dca31efe1a1886632750ddc1bb644329a7afb03,2024-03-07T17:15:10.670000 CVE-2023-45237,0,0,0f5d91aa15f206eb3d1e77aa53043c5accebb7aca7118063aaf11d800c2c94eb,2024-03-07T17:15:10.760000 -CVE-2023-45239,0,1,2545b4f732ace5a74a14a9e3677c47c49ff70212481a6cf990b811f00b194a93,2024-09-19T17:35:03.203000 +CVE-2023-45239,0,0,2545b4f732ace5a74a14a9e3677c47c49ff70212481a6cf990b811f00b194a93,2024-09-19T17:35:03.203000 CVE-2023-4524,0,0,6171a24003395a10a6c4523565599e5d20b99c80085550635695f5cb34ea1af7,2023-11-07T04:22:41.293000 CVE-2023-45240,0,0,f711761fc8cac003e2c7eefd2a3014f0b4173d214c89b3d991292a0dafe0873d,2023-10-10T14:55:56.860000 CVE-2023-45241,0,0,db8de00a92ca3a17a0e4f01f86babfe2ffbe4970691655ee4146d59ab57686c2,2024-02-27T17:15:10.147000 @@ -233932,7 +233932,7 @@ CVE-2023-45279,0,0,898ce636410e7ee87b3770444fcac6d3f827786fce9dcb4b413820160cb82 CVE-2023-4528,0,0,fb6f9d976b6ad831fd6e3df0b8811afbfab41e66da4fc9cbcc5aac0b556464af,2023-09-13T01:02:46.907000 CVE-2023-45280,0,0,587e5e1ce24b098e3665aa207a0ea7ded3e3371b3bf4c75269401122fcd388cb,2023-10-25T19:05:48.603000 CVE-2023-45281,0,0,cd0978c74ba2a3ae2f0cd409990a0511bfb93e86139e2ad7fb10f6ba5d1be143,2023-10-25T14:47:01.093000 -CVE-2023-45282,0,0,6ed2c2cc801c83a19d22a9f4cb86f11cebdf6066eee12a34876ad1251c661720,2023-11-02T01:23:35.490000 +CVE-2023-45282,0,1,368524b1a0238251df4f98fe6fa760382cdd08500bee7e40ce4ccc29c50e3928,2024-09-19T19:35:10.307000 CVE-2023-45283,0,0,cd5d279d60eb7cff2b94547ec8e6d00135f36cff01f6563cfb3f789184507d96,2023-12-14T10:15:07.947000 CVE-2023-45284,0,0,73d119dc77c426359595c7c8f0829890e7bf623858b010da63a96abc58828085,2024-09-03T19:35:05.593000 CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a300d,2024-01-20T04:15:08.013000 @@ -233943,7 +233943,7 @@ CVE-2023-45289,0,0,55227dc74f3b7eff2b0242a09fa3e698d7b0d3f59cb4bf8a9cc5e9e130d6e CVE-2023-45290,0,0,f22fc13bdae5e6edab97f7e0fddab9822bb3ae91388d56c6e1d234cdc0e49b4d,2024-05-01T17:15:26.040000 CVE-2023-45292,0,0,9325e9e3b78b777445115a8da3de2cb25249d0f8ef4a9d3921e74e58a0d0d777,2023-12-14T16:26:54.007000 CVE-2023-4530,0,0,eeb9daf8b96668373bbb47227634f4b43c799c25d28cf12757e3af97741f4f52,2023-10-11T17:19:19.627000 -CVE-2023-45303,0,0,f21ed387a8abb41711edefd2fe89234918c4e7dbf7062a4c7b8e46ea1b5c5b75,2023-10-12T18:10:31.853000 +CVE-2023-45303,0,1,688e5be499770cb09d83a318de82d649f890929552dc6a722b4fae6f03dffe83,2024-09-19T19:35:11.117000 CVE-2023-4531,0,0,06add8a6070b98064716f1fe58388261ce4316eee88c526ba1a6617b07e80b19,2023-09-08T16:51:00.220000 CVE-2023-45311,0,0,71d49c76ae9cfe1ccb4815d505b4234841f0d63a53ece89b238db654f857d950,2023-11-28T07:15:43.260000 CVE-2023-45312,0,0,461d9c4a1f47fcd79a0ef49d81d7b730848406a39d4ed8738d381c26b5b04ed4,2024-09-18T20:35:04.773000 @@ -234002,11 +234002,11 @@ CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000 CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000 CVE-2023-4537,0,0,d55e9c2ec2d6a309b7146da78217b22dabb54a472777f14cd37d2689a428a754,2024-02-15T14:28:31.380000 -CVE-2023-45370,0,0,9543640caf10dd3e07daee9db7f8e87f89d27c5a0e3530fda019c8f7730c9b18,2023-10-12T16:05:00.760000 +CVE-2023-45370,0,1,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000 CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000 -CVE-2023-45372,0,0,d9bfe48c017efefbc51e4858892313d03ed6df453f512f147a4b3e1b8435be66,2023-10-12T16:04:34.703000 +CVE-2023-45372,0,1,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000 CVE-2023-45373,0,0,eae3bb62b6bed4d1a32b5243afb1d8915435578a2d4194a9f7539a9a665df972,2023-10-12T16:05:49.617000 -CVE-2023-45374,0,0,952f3e8b059091d2fd9e2d60e5dd74685d971435a3e471f0bce6d096d2100546,2023-10-12T16:06:05.330000 +CVE-2023-45374,0,1,e7f1257195844480b5ab4252c7ad2dfc96c3635b0d1bdb6f06b94f101e8f72a1,2024-09-19T18:35:06.723000 CVE-2023-45375,0,0,76059dcd6e9ba7e45e2b8af4dc253230088aab2bc0c3d542b3bea56d2109e241,2023-10-23T13:53:31.007000 CVE-2023-45376,0,0,1752dcacc13952823593868aaeb32cb69bcd8a15123706c8973983a514b83041,2023-10-31T18:06:10.480000 CVE-2023-45377,0,0,8a38d8223faf098b86051796f3101a98163b9ac34429e2c21be3610b867c9a30,2023-11-30T05:42:43.520000 @@ -234322,7 +234322,7 @@ CVE-2023-45845,0,0,9522a3662f29e92e7ad7c10b0718fcfbd446326415f192be0026a1d413e6a CVE-2023-45846,0,0,7e97bec05528c5d3c814716d330ec4cbbf0b8dfe300e92e8f8b68aeca1cee284,2024-07-03T01:41:56.303000 CVE-2023-45847,0,0,f7a26b5da655e9a29f01aa31d2e32a7796ef0da3d21aadd9906e8c1df71a55c7,2023-12-14T18:20:40.697000 CVE-2023-45849,0,0,4630a94faf635ed71b5e98033836bda86572afa3061550d59c00be4ed0b6e7b0,2023-12-08T00:15:07.350000 -CVE-2023-4585,0,0,0c7d484dd3fd4858183e24c37b7c22e1d3749e885c104e9186641bba529400c7,2023-12-21T00:57:28.747000 +CVE-2023-4585,0,1,e01dbed274463ee65ebfe5933af4ba4d70e0f55b294738ea323aa184822c558a,2024-09-19T19:35:12.583000 CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000 CVE-2023-45851,0,0,a3947611dcf22f6805d628e99aaae522253196bfe6bc115a5e6e07eee5573efb,2023-11-06T14:33:29.510000 CVE-2023-45852,0,0,9f9928a73d27493bd16960e42e3753b817edb53bf0a279e8c73f0394583e4b85,2023-10-18T21:02:05.847000 @@ -237416,7 +237416,7 @@ CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac16118 CVE-2023-50172,0,0,0e77f8672f5cf0fb47b8becab367b19a56d5395eded77044b2dad65f5dff69cb,2024-01-18T14:28:59.977000 CVE-2023-50174,0,0,5231481744a295e82b51c5724a4a3afbdad4616950b393d426cf684f8bc4019b,2024-02-14T18:15:46.640000 CVE-2023-50175,0,0,1f4c148f2ad49dc23cadeda416bba9717617a9eed1ffebc27bb2042d761f8318,2024-01-02T19:53:20.863000 -CVE-2023-50178,0,1,e70c7f9333304ad169a3d817a8261a36cae8eb5c6f191d06e5ee03e53b449db7,2024-09-19T16:06:36.073000 +CVE-2023-50178,0,0,e70c7f9333304ad169a3d817a8261a36cae8eb5c6f191d06e5ee03e53b449db7,2024-09-19T16:06:36.073000 CVE-2023-50179,0,0,d7024dbdef420a4bf550a9373a8d6fb995c92f579a6b24fe5fa75e2141103990,2024-09-09T15:54:14.980000 CVE-2023-5018,0,0,cae5f64430f83fdd33bf69324906a6cb5316c44f52a942103dd4a7b86daf8ff3,2024-05-17T02:32:46.463000 CVE-2023-50180,0,0,0e74c4dab87377ea6e7224cae654f4c96addd7d2706381ea322da69706e6caba,2024-05-23T15:55:49.800000 @@ -241188,7 +241188,7 @@ CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee3 CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000 CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000 CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 -CVE-2023-7256,0,1,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000 +CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 CVE-2023-7260,0,0,a283d80bfb35f6dd126dbb811c8254dc2cb2d619c2a0fdb098a89d48e2a7bedf,2024-08-23T16:18:28.547000 @@ -241353,7 +241353,7 @@ CVE-2024-0216,0,0,5db0150a6defe94c534ea06b438d3680a2481b7203149642bcafa6eeb47bdd CVE-2024-0217,0,0,dff0ee3a755b5789dbb3bda1883ae669fffbc3624903a03817fe2262041b1ae5,2024-02-02T15:20:25.843000 CVE-2024-0218,0,0,e0f7082bfe7bdb2b72e28d6537974d07e10b08637004dd51d50eee8295bc543b,2024-05-28T13:15:10.927000 CVE-2024-0219,0,0,b7044527e6312a645cfd11fb721216b84cfeb88504d813d0c3eb89e1835d8e0b,2024-02-09T17:15:31.870000 -CVE-2024-0220,0,0,d7d2c26ce46e9e9d42929c005658acc0239b79eb08b04223165988fb993b20a8,2024-05-27T08:15:09.070000 +CVE-2024-0220,0,1,4478b53c04077624854d5b69c9fe95d675429fc1d7fab33a90dc864a1050bb80,2024-09-19T18:15:05 CVE-2024-0221,0,0,50e4123bdd9330b9856aaead23e8d95b6f2e4b19cc54edeb2503c031d7426fb8,2024-02-13T18:48:37.837000 CVE-2024-0222,0,0,b3f6fc9b6decb29bb4c0f2b45d4d98de1d7ddc35add0e737e26b11cd8923ec19,2024-01-31T17:15:29.990000 CVE-2024-0223,0,0,38a64de470819b095ee0b7b4b77ec34c2ec8923a888de65b096c5951a52e2499,2024-01-31T17:15:30.487000 @@ -241458,7 +241458,7 @@ CVE-2024-0325,0,0,b11f466ff4ff08fafe0e1564b77e877f7ef01996631763e0cca61be78af48c CVE-2024-0326,0,0,46531da0f2066fdd9f046a34fce12789358ed55a6f22b205eff42d5de697942f,2024-03-13T18:16:18.563000 CVE-2024-0333,0,0,9eaf58c044c101ac9ee4da325dc0cbe7baa26316edb9c32b68718e9200d8ba0e,2024-01-18T19:39:16.620000 CVE-2024-0334,0,0,f64e24da86d08ef5624336a0a2ef7f631f77b98c0c17027395f19c584275ec3f,2024-05-01T19:50:25.633000 -CVE-2024-0335,0,0,8c70dc4c2c1cd890e3b797d6942fd50c3abf750fef2989b9ac71c6205ee38bbc,2024-04-04T12:48:41.700000 +CVE-2024-0335,0,1,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377db,2024-09-19T18:15:05.150000 CVE-2024-0336,0,0,9aee920f4a5a0c04ff35e8f707096c50efb4022bceb3480b4da076fedf257149,2024-06-03T14:46:24.250000 CVE-2024-0337,0,0,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000 CVE-2024-0338,0,0,70505a995548ae9a90a762e5c254ec8226f91c5690ecf3e95b0138eb38a5ec9e,2024-02-09T19:28:45.703000 @@ -246192,7 +246192,7 @@ CVE-2024-24760,0,0,712e50ebe0dfd036080457db09cbfac631236bade7f3aab0fefe0bd1d6c76 CVE-2024-24761,0,0,b1f2bf902e5fec122e2292b6e3e60586d417fb53e3af18ffd9589198f195ec1f,2024-03-06T21:42:48.053000 CVE-2024-24762,0,0,35449d26fd46707c48224f8b5b5217335ce323aca77c6984e1cac20361aac3cc,2024-02-17T02:15:52.700000 CVE-2024-24763,0,0,8aa9488aba8310d408295beec746929572897f70a048552a2d0371466f18f492,2024-02-20T19:50:53.960000 -CVE-2024-24764,0,1,51888f40f8d4272aad2d8cb14def9cb3125276a64923f00cc5389ceef9c8c258,2024-09-19T16:57:46.463000 +CVE-2024-24764,0,0,51888f40f8d4272aad2d8cb14def9cb3125276a64923f00cc5389ceef9c8c258,2024-09-19T16:57:46.463000 CVE-2024-24765,0,0,2b41e2c8e0486bcdab8814f4f07d873fcc36842f0236f866fd2e1bdc249f0bf6,2024-03-06T21:42:48.053000 CVE-2024-24766,0,0,c955e8304ba83aae2f62f951890258afd73aa209a898d99ff634435549d8a4d1,2024-03-06T21:42:48.053000 CVE-2024-24767,0,0,96e52ab9e08a81077d985c7f3ec93901c3b769f1869cb5507b822b4ac772704c,2024-03-06T21:42:48.053000 @@ -246835,6 +246835,7 @@ CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb3 CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000 CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000 CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000 +CVE-2024-25673,1,1,81e639b1f7fbf8754b4e267411fcc130c67ff83ee62eb8538403064c33f649ae,2024-09-19T19:15:24.093000 CVE-2024-25674,0,0,a93e87559f3310a2a7f0b0950089f8e58e9cb97b1d3ba4777163ca1197a89f40,2024-08-26T19:35:20.977000 CVE-2024-25675,0,0,557139e6badf2f7cbea8b1e635432a1b7bfe50ad3cd4ea09e589187f2a0848c5,2024-02-12T14:30:28.640000 CVE-2024-25676,0,0,a08186e93b8e72e7d0fccd86e2d99f3ceb03caa74e9fe0fb3ce31f97ab303d23,2024-05-02T13:27:25.103000 @@ -248271,7 +248272,7 @@ CVE-2024-27344,0,0,f44089be578e3c3f48649a645c31f1e56b7af812f6729ae649c4c888c51a0 CVE-2024-27345,0,0,639d5d88d955f31b68d7ac65a92996a1944759655dec4dc8cdc403f6280e1a1d,2024-04-03T17:24:18.150000 CVE-2024-27346,0,0,8179d23e6ef0789d37a1db2f177021069373bc1f8d521305cdf369e9fa46745f,2024-04-03T17:24:18.150000 CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000 -CVE-2024-27348,0,0,add8565b363ebc7d89e1b1994d7f3550469242b7a7f9dbd84c0a9f2f5bcf2bcf,2024-09-19T01:00:03.120000 +CVE-2024-27348,0,1,e96554afb28cbad659be9176aa4ca79d5b61a879b075bffbc242daa401baea3d,2024-09-19T19:55:24.297000 CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000 CVE-2024-2735,0,0,f01bcec823b48d788d322e20cf82a4a7470344ba299463eb0cff5623d9be778d,2024-04-10T13:23:38.787000 CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e5e3,2024-02-26T16:32:25.577000 @@ -251147,9 +251148,9 @@ CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea07 CVE-2024-31411,0,0,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000 CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000 CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000 -CVE-2024-31414,0,0,e14364144fa3f237790ebf592477e0e40448a812dc429d2d1bc787aa72072c1a,2024-09-14T11:47:14.677000 -CVE-2024-31415,0,0,d00ba0ed8019050c1160e178755b13bc22aaa5775f7d5c37e54fc4949be98447,2024-09-14T11:47:14.677000 -CVE-2024-31416,0,0,c5045af1311803e878612c4da84972621f9a5f9de399d3ca1c47f45ef3f2c50e,2024-09-14T11:47:14.677000 +CVE-2024-31414,0,1,e387f0c66bf477a9777c6073fbe8e1bf77c81fd3f2da5d969d5f9db7d198c8b7,2024-09-19T18:48:25.893000 +CVE-2024-31415,0,1,4af626a01b2b209263b9f18365da822790629e58a8f2859d318f652182ce6cf7,2024-09-19T18:50:27.827000 +CVE-2024-31416,0,1,0d8c2b6f5939f620709e7ed49bc9a2b299d23aa8d9465d6808a0e5cb060665e0,2024-09-19T19:06:59.787000 CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000 CVE-2024-3142,0,0,983e14121dea75c617117997ac50797df98bf192fa8cfa7597e476b17cc231ee,2024-05-17T02:39:44.690000 CVE-2024-31420,0,0,93cd6c74288acbee362fcfe80ff941e3294a823738c730373f8d597f177cf09c,2024-04-03T17:24:18.150000 @@ -251249,7 +251250,7 @@ CVE-2024-31552,0,0,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000 CVE-2024-3156,0,0,51decfaeced6eef599bb2d824f817b3e8faaceb41748738897303b173f7baed8,2024-08-01T13:56:20.987000 CVE-2024-3157,0,0,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000 -CVE-2024-31570,1,1,302362516937afe00aad1ae54e1b06de52069ec662fa4dedeb63a6ddae2290c9,2024-09-19T17:15:12.623000 +CVE-2024-31570,0,0,302362516937afe00aad1ae54e1b06de52069ec662fa4dedeb63a6ddae2290c9,2024-09-19T17:15:12.623000 CVE-2024-31574,0,0,9d49c3d810249e7fdec3d7ec5acd27e5dbf702e0786215525f0f8c041faf71ea,2024-04-25T17:24:59.967000 CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000 CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000 @@ -252164,7 +252165,7 @@ CVE-2024-32855,0,0,c49305c977dd2e708a0d316df4ef9be1d74cd331a1c2ffedbc125e28a1059 CVE-2024-32856,0,0,6d8137a0b9dec706e783082fa3a1037a7f0ce7ef4a6d1bed9d383583e1a8b038,2024-06-13T18:35:19.777000 CVE-2024-32857,0,0,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196183,2024-08-08T21:10:04.773000 CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000 -CVE-2024-32859,0,1,6878eb303e3fed06b69428c85d734cc5e74e821709864440c8758419372d20f9,2024-09-19T16:24:39.147000 +CVE-2024-32859,0,0,6878eb303e3fed06b69428c85d734cc5e74e821709864440c8758419372d20f9,2024-09-19T16:24:39.147000 CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000 CVE-2024-32860,0,0,140d176974a544a70b011e4a7385dddf6177887685faa32d97074b7714e98c8d,2024-08-16T16:46:36.203000 CVE-2024-32861,0,0,4690ae217a4b596d64e69c4e91eed7a814ce164eeb5aed983f8d559fa108dfae,2024-08-02T03:15:20.680000 @@ -252358,6 +252359,7 @@ CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176 CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000 CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000 CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000 +CVE-2024-33109,1,1,623840b47a3d2080ddfa6fe372db92281baacbad134dc7e3c1b1fb9648b17803,2024-09-19T19:15:24.170000 CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000 CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000 CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000 @@ -252668,8 +252670,8 @@ CVE-2024-3365,0,0,e3ada40b6344afa9237bbf3a9dbdf421d928eb8fa8993a69cd37398003bfb8 CVE-2024-33650,0,0,8f98f6950383ea7bb5fba364f4ca6f73e01e32591eac1d754836fc53112322d7,2024-04-26T12:58:17.720000 CVE-2024-33651,0,0,f2ee7352faa4d013ce2dbc2e7d6ca251932118d3e5b2422d264e03fcb1cbdc4e,2024-04-26T12:58:17.720000 CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c36e,2024-04-29T12:42:03.667000 -CVE-2024-33653,0,1,f131ad381140a4aa9c30ffd8ecb2981958292f1cb9df7cad93511d6d48dc2039,2024-09-19T16:00:12.400000 -CVE-2024-33654,0,1,59ce1dc0a959d8fd849b3bf72d6a089a8a29bff8045c4a710ae01079c92a98c5,2024-09-19T16:00:43.363000 +CVE-2024-33653,0,0,f131ad381140a4aa9c30ffd8ecb2981958292f1cb9df7cad93511d6d48dc2039,2024-09-19T16:00:12.400000 +CVE-2024-33654,0,0,59ce1dc0a959d8fd849b3bf72d6a089a8a29bff8045c4a710ae01079c92a98c5,2024-09-19T16:00:43.363000 CVE-2024-33655,0,0,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000 CVE-2024-33656,0,0,bcce08f394a095ebca60ada0fb4a4aafac76a15e930d7944ca1f9457799a1c56,2024-08-21T17:24:59.627000 CVE-2024-33657,0,0,4304e9ad6a833f4e772f3f337e66d35550f113c5280de638d62e655b681eb6cd,2024-08-21T17:24:59.627000 @@ -253139,7 +253141,7 @@ CVE-2024-3434,0,0,665daf763cf280ad6e13fab45ba57a35fec69ba9e6cd1628917c4e7d75dedc CVE-2024-34340,0,0,ce6bbf8ca46ec29426c800768c938c7ed5fd800a09085acbf821400587996e11,2024-06-10T17:16:28.827000 CVE-2024-34341,0,0,874d0ac87ba692c788b408f2928cb7b384b1146ea2fb2be7ea431c974b164434,2024-05-07T20:07:58.737000 CVE-2024-34342,0,0,3e142b43b7b4afad7d384023ad82da3d4505656b73350774ba0911c6409bd959,2024-05-07T20:07:58.737000 -CVE-2024-34343,0,0,066fdbea031320951bbbb7067bbd91806cf74901441b806a1f8acbcf80dda5d7,2024-08-06T16:30:24.547000 +CVE-2024-34343,0,1,a3b005bc8eba213738fde9a67dd414ba97bac0d8e4da53b457c6cda9ca8b4f39,2024-09-19T19:57:52.007000 CVE-2024-34344,0,0,f5a9ba01025bca91b189ed9bcd3017020d0db224ae447d4b59293ea787794849,2024-08-06T16:30:24.547000 CVE-2024-34345,0,0,af3be7ad8b1b1d44ae22efd1e5357ec15980df2dfb15c98b9c630c2989cf22cf,2024-05-14T16:12:23.490000 CVE-2024-34346,0,0,461f54cd153daac8a3bd1e483b3a64b76b9087848b91f7f6ce6604a27c331020,2024-05-08T13:15:00.690000 @@ -254668,8 +254670,8 @@ CVE-2024-36414,0,0,3a5660a66d942114556bd0815630fa2959614be320647325e5bb5b0dd386e CVE-2024-36415,0,0,3d862aa9f2826b7b61961813da971e9ec48ebb49fe79a256d77ce95e1decf2be,2024-06-12T17:58:53.497000 CVE-2024-36416,0,0,d6ce7543acefc397e88a4e607f8e8cd9d6d7c5889aa1948b360b7ced938d60dd,2024-07-22T17:15:03.773000 CVE-2024-36417,0,0,1ea038de4e5acdad4256a27455220cbea49cafc564bda7423cce84beb58771db,2024-06-12T17:58:04.477000 -CVE-2024-36418,0,1,de9964a7d485c183b822b8eee7a7bbc85f459ebb87460abd5abb1e92f4c47751,2024-09-19T16:28:35.647000 -CVE-2024-36419,0,1,4f7a601ca880551c5e81b870e61d1cdfdece76b4b4881ac77c77b77ddf8951df,2024-09-19T16:31:00.760000 +CVE-2024-36418,0,0,de9964a7d485c183b822b8eee7a7bbc85f459ebb87460abd5abb1e92f4c47751,2024-09-19T16:28:35.647000 +CVE-2024-36419,0,0,4f7a601ca880551c5e81b870e61d1cdfdece76b4b4881ac77c77b77ddf8951df,2024-09-19T16:31:00.760000 CVE-2024-3642,0,0,18761de76cd7cd0e44650c50bce43f4d6feb32d4cdbac8c295b7b13430f4f486,2024-05-16T13:03:05.353000 CVE-2024-36420,0,0,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc260,2024-07-03T15:29:45.557000 CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000 @@ -255684,7 +255686,7 @@ CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000 CVE-2024-38014,0,0,667a2ca3aa42729c9c1f636c1bc19b21cfc3cbfc4eb15603accaad3e335421c5,2024-09-12T01:00:01.133000 CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000 -CVE-2024-38016,1,1,b2d3139c2c71c4856b736470c4446e549feac25fb459136c9a56122bc3ca8899,2024-09-19T17:15:12.947000 +CVE-2024-38016,0,0,b2d3139c2c71c4856b736470c4446e549feac25fb459136c9a56122bc3ca8899,2024-09-19T17:15:12.947000 CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000 CVE-2024-38018,0,0,60b7566e82c4496b0dca7d4fdef697c13c6221141b8468138e42395de75492a1,2024-09-18T15:04:58.240000 CVE-2024-38019,0,0,da6757aee92bad96249ea36fde1018805a15808ac2fa25fa1dd2f958ebdbe19f,2024-07-11T16:21:19.367000 @@ -255991,7 +255993,7 @@ CVE-2024-38372,0,0,3d54cf49c69f5dcfca10b8ed801434d5b29c7aa6896635c0f913f2cd2b718 CVE-2024-38373,0,0,871cf732e8d89daf91760031051bd3f20f88f5dad720fab8628df5921c7be18f,2024-06-26T15:02:05.100000 CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000 CVE-2024-38375,0,0,626cc37017b5b99d342165d2bf910513bdb2fdf5a18a0e825a4ce243860e1792,2024-06-27T12:47:19.847000 -CVE-2024-38379,0,1,24d3b7135776280dd8cbf565222ffc49917d8846e2a67b6430e1fef8b4588944,2024-09-19T16:46:38.287000 +CVE-2024-38379,0,0,24d3b7135776280dd8cbf565222ffc49917d8846e2a67b6430e1fef8b4588944,2024-09-19T16:46:38.287000 CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d07b,2024-08-06T19:35:06.410000 CVE-2024-38380,0,0,627f70dd365a9409327379c2bf73f222a1302e203d88da4a7b50dd6bb1c7485f,2024-09-17T18:15:03.680000 CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000 @@ -256565,7 +256567,7 @@ CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99c CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000 CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 CVE-2024-39316,0,0,0330ee1f4f66ad5c4fc8d75b41d6a1a5d4b46137b39514674c0311e081ce6ff7,2024-07-02T17:44:45.700000 -CVE-2024-39317,0,1,bae2aa4f7badec0edc31db102a83207f0bd6d840ba46b9f715d3db216be3b8e0,2024-09-19T16:08:43.417000 +CVE-2024-39317,0,0,bae2aa4f7badec0edc31db102a83207f0bd6d840ba46b9f715d3db216be3b8e0,2024-09-19T16:08:43.417000 CVE-2024-39318,0,0,d84809b5481c68217d59c341f89a33a753d6db4b36e662db9d71acc330a074f7,2024-08-01T12:42:36.933000 CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000 CVE-2024-39320,0,0,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000 @@ -257086,6 +257088,7 @@ CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000 CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000 CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000 +CVE-2024-40125,1,1,cc8392b182c6e8c7ee622740e83412c4a0ff89e87d8cc4c186b22da6539e9ed9,2024-09-19T19:15:24.350000 CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000 CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000 CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000 @@ -257204,7 +257207,7 @@ CVE-2024-40554,0,0,975eaaed007d6b505cb8ba22ce57b12be37e7b3d2ebcc8a575de58b8f5a20 CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f460,2024-07-16T13:43:58.773000 CVE-2024-4056,0,0,7c25f0a1764fd01965b39ebc13bb94a8ae53607d9ce0dfc30a27083c9e919722,2024-08-27T11:15:04.430000 CVE-2024-40560,0,0,08dc0b5066047c5e119a09d69ea20c085f8549859adcaecbbf38995d7d2e2e54,2024-08-01T13:57:50.440000 -CVE-2024-40568,0,0,fa33a3ce565335eff8c471d4854e347140063afa111c56d97dc2dc6d636b2948,2024-09-18T21:15:13.390000 +CVE-2024-40568,0,1,293cc67ac7cb929d50728436658796c25ce534bf9199331065d8c719678bb7f3,2024-09-19T19:35:13.880000 CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000 CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 @@ -257406,7 +257409,7 @@ CVE-2024-40860,0,0,e36dab9e833d088b935ab68c9a151e9f1fa4c0b43f03d6bb0621ce4e4428b CVE-2024-40861,0,0,d87cf92bd694c19d1e4d3aca5f00c6e43dee289f9de1a39f0fc2b781db69db0f,2024-09-17T15:35:08.583000 CVE-2024-40862,0,0,41adab65858c72ffe5166360c0c7d08451acfb072731fac3b645799d62b8fb88,2024-09-18T08:35:48.760000 CVE-2024-40863,0,0,8102a55f22f39834a5de79e8de0f022b089678ae9882643f5ee65b65c051fabf,2024-09-17T00:15:49.793000 -CVE-2024-40865,0,1,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000 +CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000 CVE-2024-40866,0,0,ffb4d4555ccfaa65df4084c4704bde934d69f675e3f09339fb6d0f4bf47c0770,2024-09-17T00:15:49.840000 CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 @@ -257826,7 +257829,7 @@ CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b5189 CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 CVE-2024-41564,0,0,3f9573f6925d935097a5479628729abea72980995a08b63ebbf863a6de0d308b,2024-09-19T14:40:32.270000 -CVE-2024-41565,0,1,09b9917fbb2f411622e9ea1f75fe318038921a2fcca27e9c7f8474c7ccbe8a12,2024-09-19T16:19:59.317000 +CVE-2024-41565,0,0,09b9917fbb2f411622e9ea1f75fe318038921a2fcca27e9c7f8474c7ccbe8a12,2024-09-19T16:19:59.317000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 CVE-2024-41570,0,0,548cd2006d0021700d97d9ac462942b0586c18cb85e20f0c023fdc6e3f8676c8,2024-08-29T13:32:21.020000 CVE-2024-41572,0,0,e3312852513c75151c7b09071c0730654908f266b196f942a02a8abd098a0bd7,2024-09-11T14:15:13.380000 @@ -258608,7 +258611,7 @@ CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca7 CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000 CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000 CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 -CVE-2024-42698,0,1,de1720a9d956d361c16c9949dd2868e63ee7adfae9f7ccbc87c98136280e24e5,2024-09-19T16:29:51.217000 +CVE-2024-42698,0,0,de1720a9d956d361c16c9949dd2868e63ee7adfae9f7ccbc87c98136280e24e5,2024-09-19T16:29:51.217000 CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000 @@ -259488,7 +259491,7 @@ CVE-2024-44575,0,0,201a6ca7c7ab73c1cf72eb94fa46c058ee5fb2f214506723411e1243ae73d CVE-2024-44577,0,0,f23b5398825615b1e4c9cdd4a9ee17debd24c87e40c16b163c6e9227921995f9,2024-09-12T12:35:54.013000 CVE-2024-4458,0,0,0a429f9bf96fae3ee6bbb1cf09933ff34e8fcd6340740204bd4095a557c4fb2e,2024-07-24T20:23:12.307000 CVE-2024-44587,0,0,df65b03ef618d179da9d66b0f4fc4c4e495ab75863a2207f1a4d99901686f98d,2024-09-05T17:44:56.007000 -CVE-2024-44589,0,1,8cb7fe0028eed391be14922113778103f1f7a9710ff1959caf828ca38391a02b,2024-09-19T17:35:04.797000 +CVE-2024-44589,0,0,8cb7fe0028eed391be14922113778103f1f7a9710ff1959caf828ca38391a02b,2024-09-19T17:35:04.797000 CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000 CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000 CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000 @@ -259745,7 +259748,7 @@ CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000 CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000 -CVE-2024-45159,0,0,536b41a2ee45b72a77485ff00b0df03c600eee1ed452fbccbec7bdbd95c0104a,2024-09-06T12:08:04.550000 +CVE-2024-45159,0,1,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 @@ -259760,7 +259763,7 @@ CVE-2024-45172,0,0,68b3dace475f9bcf51f79da5da4aa2b3c04841de6dc44424481c247078201 CVE-2024-45173,0,0,9a54bf008dec04451b7071ad4cee60b11c2ddc76ef8f26e46ea5715d67b0ea43,2024-09-05T18:35:11.413000 CVE-2024-45174,0,0,2ba63c333cfe37e6c7dca9f72909d21c7893acb52b292b0e6cf7a4a15b777141,2024-09-05T12:53:21.110000 CVE-2024-45175,0,0,4ada181a2aa083d471c5722f19453f1bfb3dcb4512c65292efacb2e8f687f29f,2024-09-05T18:35:12.220000 -CVE-2024-45176,0,1,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000 +CVE-2024-45176,0,0,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000 CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000 CVE-2024-45178,0,0,2894143084503cc7bb4d728541a98225973d7da963e85745983ffa8b8255b936,2024-09-05T17:44:56.007000 CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000 @@ -259823,7 +259826,7 @@ CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e CVE-2024-45300,0,0,371ea055cbd370f2315f57d501b2d8bde7fe9993dc271953659e5b000db99936,2024-09-06T16:46:26.830000 CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000 CVE-2024-45303,0,0,0f2993ec35c2f5c69a86f92f14083da5a1f9682262497cdf98941162719918c3,2024-09-18T20:25:05.807000 -CVE-2024-45304,0,1,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000 +CVE-2024-45304,0,0,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000 CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000 CVE-2024-45306,0,0,2089f2b015e15041c3f3807cc6f2c8eb1cf893208c28e4b1ca171ff53a3a8feb,2024-09-03T12:59:02.453000 CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000 @@ -259861,8 +259864,8 @@ CVE-2024-45395,0,0,40bba716ba89648b0a5b0a469128bfb2472f289be140a10878a9431641f22 CVE-2024-45398,0,0,7758f6d65fcbad19eab77bcca68b8445fb5c0f0afca8b3214cdef86ff36248a6,2024-09-17T20:15:04.670000 CVE-2024-45399,0,0,037a7bffbd0f8d9091903d0d9148831df46e7343b0a57250b24ff56b22720edf,2024-09-05T12:53:21.110000 CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000 -CVE-2024-45400,0,0,af1e2f79a14b2efa09c2579698273d7be8e8e6f2c9b71f5e572cda7963b006a6,2024-09-06T12:08:04.550000 -CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd48835a,2024-09-06T12:08:21.290000 +CVE-2024-45400,0,1,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000 +CVE-2024-45401,0,1,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000 CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000 CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000 CVE-2024-45407,0,0,363c12723797ac0c72d1d271ead356acc799cc8a41f14636bd37d7f20defb6ac,2024-09-10T17:43:14.410000 @@ -259880,7 +259883,7 @@ CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd CVE-2024-45435,0,0,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797c28,2024-09-03T17:23:36.073000 CVE-2024-45436,0,0,285ce8c7d8a1a73359dbcdd8ed12fdef35f675e020b230adf62e4aee88352a8c,2024-08-30T16:08:54.840000 CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c1564,2024-05-24T13:03:11.993000 -CVE-2024-45440,0,1,5c40cf851b4b7b9412ff4be7ed9eec976a4116ec7f3a4af3e7cd032e9d9d181b,2024-09-19T17:38:40.100000 +CVE-2024-45440,0,0,5c40cf851b4b7b9412ff4be7ed9eec976a4116ec7f3a4af3e7cd032e9d9d181b,2024-09-19T17:38:40.100000 CVE-2024-45441,0,0,5d4634290df0954dd0f61dff1649f0dd3d3d4ad0fc1e8ec875e3be2f2406d8e3,2024-09-12T19:35:47.880000 CVE-2024-45442,0,0,88ceab2d364754645573afab825dc9db7db1156b26adadd90889beed39cf5305,2024-09-13T20:00:30.680000 CVE-2024-45443,0,0,162552df88a79f08b277538012a14f30ef91af105cdfa5945ebbfc7ec02b8e03,2024-09-06T13:33:10.347000 @@ -259894,10 +259897,10 @@ CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97a CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000 CVE-2024-45451,0,0,5229461646061f5229c33d4bf801b0a9f7047a3683ddb2578fb28570321f2734,2024-09-17T23:15:20.970000 CVE-2024-45452,0,0,fdfee902792e194b32d188f2f974cff27f1fb2a2547b725b9bb68c5c8e0a2fab,2024-09-17T23:15:21.183000 -CVE-2024-45455,0,0,2252ed0190aceaaf231db9e13c20002f9f0347dbc9cd3d6637ac9295250f3d43,2024-09-16T15:30:28.733000 -CVE-2024-45456,0,0,f24597a7e3d48154883583103775982966f08c6eeafb8e5ace41268c1fcf3230,2024-09-16T15:30:28.733000 +CVE-2024-45455,0,1,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000 +CVE-2024-45456,0,1,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000 CVE-2024-45457,0,0,56f051ff4ecd4b6bed95d9151f6e0b39eb3d323739c8a3289fa8218221d2fc6c,2024-09-16T15:30:28.733000 -CVE-2024-45458,0,0,40cddece72fc94745b6e482a4da9ccb4b2ab5ddfcc0bf5466a7b36c8f5eb9014,2024-09-16T15:30:28.733000 +CVE-2024-45458,0,1,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000 CVE-2024-45459,0,0,4154d879d23930c356c924ee9751025192ea472198f82d912c4042ce38a9f5ab,2024-09-16T15:30:28.733000 CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000 CVE-2024-45460,0,0,7056065a678a74d2d3d00e0fb051b2bcdebb702f17f31078c0bb6fea26b93765,2024-09-16T15:30:28.733000 @@ -259924,7 +259927,7 @@ CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000 CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000 CVE-2024-45537,0,0,522e8ad70c4a2b88082c6938714c807f5fbe9d880fbc938f7c7e90871d6ceaae,2024-09-17T19:15:28.157000 -CVE-2024-4554,0,0,92f30e92e4fc7deaf96b5e461132de3163a1189a641d3cd890f26d9e64523486,2024-09-12T15:01:12.217000 +CVE-2024-4554,0,1,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000 CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000 CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000 CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000 @@ -259955,7 +259958,7 @@ CVE-2024-45617,0,0,6cb16d6fbb6421ff7c08177427efbe84e4a03cb3cf72e212ba5673d3ad33a CVE-2024-45618,0,0,dc2dc7fd3bf0d86469d9d1e7cf8afe886c6a0db83c5b7c56e1d5c7bc488c4153,2024-09-13T16:30:27.693000 CVE-2024-45619,0,0,19913ec071f09571eb2fafb85b3bcf05650473cef15788106e54de572df55757,2024-09-18T09:15:05.227000 CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000 -CVE-2024-45620,0,0,4b93eb131fcc5aa370c611a1d350fa96cf799a590a6dd2ccf111caa79d7e72d1,2024-09-12T19:38:16.130000 +CVE-2024-45620,0,1,62d7efd1f4f3b2c671c5ae6f75d170d2e8f1f728e1204e1922e6a8c5eec065f3,2024-09-19T19:21:38.653000 CVE-2024-45621,0,0,0e87271e3b523f5d125d92dc504ca3a7772b99de219d6f52d1ecafc891e937da,2024-09-16T17:28:53.437000 CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000 CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000 @@ -259983,7 +259986,7 @@ CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df6109 CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000 CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 -CVE-2024-45752,1,1,011305e5643eeb4a93bf894c37aad5e6746c1482bd06f4dd86def3fd52eea26e,2024-09-19T16:35:06.277000 +CVE-2024-45752,0,0,011305e5643eeb4a93bf894c37aad5e6746c1482bd06f4dd86def3fd52eea26e,2024-09-19T16:35:06.277000 CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 CVE-2024-45769,0,0,92aeaef10977321b3b8f880452f808da2ba9009b0d38d64b0d275ffae85a5d17,2024-09-19T14:15:17.120000 @@ -260035,8 +260038,8 @@ CVE-2024-45856,0,0,0d2d555a4be2f7d0582132e7868cb1ae44e7be28b33194ae92062d7b37f54 CVE-2024-45857,0,0,baf58007ae785d8a411fcf58ab797e8aa621cae99978a873f3918c60d00cf497,2024-09-12T18:14:03.913000 CVE-2024-45858,0,0,26e716964960a7625743254ab836d7c358ad6927670be1bca3f8d6e0ddda0dbf,2024-09-18T15:15:16.333000 CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000 -CVE-2024-45861,1,1,f2700b8537298b1d77c39a6181a74a65e0b5407cbb7c0f50791135712d1ab8bf,2024-09-19T16:15:05.103000 -CVE-2024-45862,1,1,8bee6ce34dafde56e12a20a08c53abf8f2aee4852ffb0aff5a366ec400a7c326,2024-09-19T16:15:05.227000 +CVE-2024-45861,0,0,f2700b8537298b1d77c39a6181a74a65e0b5407cbb7c0f50791135712d1ab8bf,2024-09-19T16:15:05.103000 +CVE-2024-45862,0,0,8bee6ce34dafde56e12a20a08c53abf8f2aee4852ffb0aff5a366ec400a7c326,2024-09-19T16:15:05.227000 CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000 @@ -260093,8 +260096,8 @@ CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef CVE-2024-46362,0,0,19797b772fedfa56b8ab1944bfa10d47aee5c75ee333d19ae89a45da58afb3c6,2024-09-17T18:35:02.140000 CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000 CVE-2024-46372,0,0,fd6f56a0663f220726a1bac55ab58f9ad10bc05a60b983463690dc99ae056ea6,2024-09-18T21:15:13.443000 -CVE-2024-46373,0,0,7e35dc6500a4231fa63976e944e360586157ff1c000ec1338e970f1d2cf36139,2024-09-18T21:15:13.497000 -CVE-2024-46374,0,0,2d124efc7e040a46a76f3f4ea0cc4f1ea6dc1b6fe7a5ac9c6be3c92ddba5c018,2024-09-18T21:15:13.543000 +CVE-2024-46373,0,1,26308fac89234bd0c4e6545029c0375bca524ac42183e23bc115426b28dd097d,2024-09-19T19:35:14.767000 +CVE-2024-46374,0,1,d8f5ae0d53687ee2132192046d5833100ce6e39c88021fb4246bbf0f13d8b372,2024-09-19T19:35:15.573000 CVE-2024-46375,0,0,a3753b0b860f3107bde948855a197ee1efaa17527c91f22e315c5003ce34e48c,2024-09-19T14:35:06.727000 CVE-2024-46376,0,0,a3c7dd3b4bc749abac101cd27fd7d78b57ef129d32ef5359aae71578abaf0c50,2024-09-19T14:35:07.493000 CVE-2024-46377,0,0,95e91e17e2ab812f3da9298bb3d6639e1f6afea01389da755fb47626e16ccaef,2024-09-19T15:35:09.843000 @@ -260175,24 +260178,24 @@ CVE-2024-46678,0,0,0e842f6f0546edbddbc3c711ac91deff93c4a1dd44f16ff31c31239d48d66 CVE-2024-46679,0,0,5bde69d05e3c296a2601ee086688ce4b06bc49b8b5611729b2be82e470bb0f3d,2024-09-13T14:06:04.777000 CVE-2024-4668,0,0,ecbe5c3985983203e802de76c9f88e6fca1078853835be834d70b53a54cc9e61,2024-05-30T13:15:41.297000 CVE-2024-46680,0,0,53c6bf89a5bc3949c31b94cf312216e18ee2de106f93d5214fdad7ca6fdc356e,2024-09-13T14:06:04.777000 -CVE-2024-46681,0,0,1e50ea04845187a91f4f21406f7e93a07cc0e4dfd59a8462802044e628fe7824,2024-09-13T14:06:04.777000 +CVE-2024-46681,0,1,66e176f13756dcc0d8ab331fd0f39d2f2c349ffd10d9d4cbb6d64818840f1c2b,2024-09-19T18:10:49.623000 CVE-2024-46682,0,0,ac171974a7e950a314e59d0243b9e9f062b63a309ff607f2a164bec5594c8099,2024-09-13T16:52:02.067000 CVE-2024-46683,0,0,5299c97d1fc80f78dbfc5ccddf1bf7e66a8882d99e8d0b9ff70c92161eec2568,2024-09-13T16:52:14.373000 -CVE-2024-46684,0,0,5a44bb026dfdb6b73fcc4c9fa21162b9fc4154517e61f7ace6c17f322254cebc,2024-09-13T14:06:04.777000 +CVE-2024-46684,0,1,3dd8d6161a75a02a3be01356f95b0f512dd073e666142fad3ca14e59b093e391,2024-09-19T18:04:22.623000 CVE-2024-46685,0,0,1b48d894cf37f05d909d964324e0bdd0c004048501a99e5c3c6ac200b20fa0d2,2024-09-14T16:00:55.547000 CVE-2024-46686,0,0,4afc0303c037a90aa176527c5c1d12aa028b7efb97890dbc9b5bee7f3de95eed,2024-09-14T16:16:33.087000 CVE-2024-46687,0,0,6df93b329e4c9b4912f75ba797c3862dd3825d176bc4b8d52421481a95ca02a9,2024-09-14T16:17:33.073000 -CVE-2024-46688,0,0,d2d8d862ff8f73fb0df2a233ca2e46f800252dbe84e09f5f72fee3526fe8b520,2024-09-13T14:06:04.777000 +CVE-2024-46688,0,1,742ceea25117b25b2bd80750a6e9911adc074107f75e2746760ff11b497a9894,2024-09-19T18:01:43.037000 CVE-2024-46689,0,0,d4a917f4af8389cbed7fe97091a2204305beeb74bbc4442a420d1eb90798629a,2024-09-13T14:06:04.777000 CVE-2024-4669,0,0,a0976f7ea3148ea450eb6167436e6be2dce8d6ef83862711f573c56cae3ce5e3,2024-06-13T18:36:09.013000 CVE-2024-46690,0,0,5af0b3656d8665491f28716ea7603bb0aea5a272e8c1bf40ddd30a1255705d3f,2024-09-13T14:06:04.777000 CVE-2024-46691,0,0,8d55b848b81c7cb2c778de047700fe79e5a572a7f93e6b725cb6041c3a622df9,2024-09-13T16:52:21.057000 CVE-2024-46692,0,0,9bca0a6bdb61a96f9bc64b59f8db4ea9997f8804d892b4802b2be44c689f8375,2024-09-13T16:52:31.627000 CVE-2024-46693,0,0,f40beda26d58dd63f40fce79476da79807c21e41b509da1c16e262d523bfeffd,2024-09-13T16:52:41.270000 -CVE-2024-46694,0,0,f3c662a07d20538ea5dd6d89e6508a4bf0609b9b63e75079997ab6c6b086a693,2024-09-13T14:06:04.777000 -CVE-2024-46695,0,1,2c8af9d60124692d9b6ffbee8d85890498f0625ad48f0bbdd570b3ffb4d38d01,2024-09-19T17:59:23.113000 +CVE-2024-46694,0,1,06269357f08eee761908cfd9b04c5fe20fc860e28bbdb44b42b210145df9925d,2024-09-19T18:16:22.247000 +CVE-2024-46695,0,0,2c8af9d60124692d9b6ffbee8d85890498f0625ad48f0bbdd570b3ffb4d38d01,2024-09-19T17:59:23.113000 CVE-2024-46696,0,0,4daffe95396a7dfd0d7acd939b4305def2a9b7710efef4f9245a07291857d3de,2024-09-13T16:52:54.363000 -CVE-2024-46697,0,1,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000 +CVE-2024-46697,0,0,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000 CVE-2024-46698,0,0,dd18a350b42292bfa692742bfea20969ac387a40a6df6f50c4209832f6c49c3c,2024-09-13T16:53:03 CVE-2024-46699,0,0,06698b262190134bec89f3644bb256a03fde8105e3a035b81d99b56d18cdb050,2024-09-13T16:53:10.620000 CVE-2024-4670,0,0,08919fb788216a4ef8fb408ade2563afef66ea572b0f16375f44123bc9f15eb1,2024-05-15T16:40:19.330000 @@ -260202,7 +260205,7 @@ CVE-2024-46702,0,0,5aad35e2d7d1ccbb97d6a3251704aac50eabfd028ebefa2b04bd88e7e42de CVE-2024-46703,0,0,e11c195a259f3df31398758ffb3ccf027e5548f4969c954514a9f4cce3608756,2024-09-19T13:33:57.563000 CVE-2024-46704,0,0,f78588eb2f2a44341e8643254e6b27a014ea20b715f19c482965344be2a2c1ed,2024-09-19T13:32:39.257000 CVE-2024-46705,0,0,90099fce686500ca9a4af7d5dad56b9132c185dd3789d400df5fe529ab883451,2024-09-19T13:30:44.133000 -CVE-2024-46706,0,1,42db06665631a62d321d7edbfb78183067249013c54e16b47c4a6e6ba7502d1b,2024-09-19T17:51:07.670000 +CVE-2024-46706,0,0,42db06665631a62d321d7edbfb78183067249013c54e16b47c4a6e6ba7502d1b,2024-09-19T17:51:07.670000 CVE-2024-46707,0,0,74dcaf9ed923021710159c21f486f26a1f03ecaa0f7a649f40a6ffec6ab91290,2024-09-19T13:29:46.757000 CVE-2024-46708,0,0,87dc269451b066b6993dbb5930897253927943ffe2fed7d96f86c37f09c45816,2024-09-19T13:28:49.483000 CVE-2024-46709,0,0,4fbf8864408f806038214e80c57c5097ea72706b241ae096cb98bc0895ec0e4c,2024-09-19T13:26:24.140000 @@ -260367,7 +260370,10 @@ CVE-2024-4712,0,0,8c9912a72fdb973e445c03f0c431e473f67586d80716ea23b3c04f9af648d8 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000 +CVE-2024-47159,1,1,37cd59fd117f5cf50861cd88b8abebb1e1884db1ba94dfcf9ceb69cfa69bb528,2024-09-19T18:15:09.803000 CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000 +CVE-2024-47160,1,1,3f6af29a5418c0ea31328b241c0a67d429ed0f2ea9a2a4795d9856d4f3850696,2024-09-19T18:15:10.013000 +CVE-2024-47162,1,1,7a918a68f616964c3a64fa06f015fde786d9abd7d452c1eb72d0cb1650c8a0a1,2024-09-19T18:15:10.227000 CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000 CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 @@ -261533,7 +261539,7 @@ CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9 CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000 CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000 CVE-2024-6052,0,0,32d564c18d4d17b199f574c28ffe31c1fb3d7a1b6f6859f56e252f37a5a22c28,2024-09-16T14:15:13.410000 -CVE-2024-6053,0,1,bad8fea9e1557f6e3942b82b20978ade64544c8438a72e97ebb03355ea705f3f,2024-09-19T17:22:36.697000 +CVE-2024-6053,0,0,bad8fea9e1557f6e3942b82b20978ade64544c8438a72e97ebb03355ea705f3f,2024-09-19T17:22:36.697000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000 @@ -261565,7 +261571,7 @@ CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5 CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000 CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000 CVE-2024-6086,0,0,28c3e2540b87e65e53355efd52e7428f1a054dcf2c80ab6446e2a8ede4d737ac,2024-09-19T15:57:50.267000 -CVE-2024-6087,0,0,bd8b7ffb5790bff23459a1175abf6870ac2ed6fcd6a6fe860d24726af8d03b75,2024-09-14T11:47:14.677000 +CVE-2024-6087,0,1,2f3eb6d59e26864799858a36adcfa783331a6d1634807496019392d9a2953a02,2024-09-19T19:32:14.710000 CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000 CVE-2024-6089,0,0,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000 CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000 @@ -261612,11 +261618,11 @@ CVE-2024-6137,0,0,e58f6c0787a0fe87e16b6d9ce7e652fbe72d3a55d70774470af6282c4fe57c CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000 CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000 CVE-2024-6141,0,0,1d5a717ee6e758ce9e5016396a1ddc2e4691c96cb20e6973eb41cca889dc4be3,2024-08-23T16:53:48.270000 -CVE-2024-6142,0,1,b5701e63ddcbaf9774de387fff373143cf14e6ab10afa024be2e2ac7f6aaa481,2024-09-19T17:47:00.270000 -CVE-2024-6143,0,1,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1b7,2024-09-19T17:47:33.370000 -CVE-2024-6144,0,1,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000 -CVE-2024-6145,0,1,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000 -CVE-2024-6146,0,1,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000 +CVE-2024-6142,0,0,b5701e63ddcbaf9774de387fff373143cf14e6ab10afa024be2e2ac7f6aaa481,2024-09-19T17:47:00.270000 +CVE-2024-6143,0,0,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1b7,2024-09-19T17:47:33.370000 +CVE-2024-6144,0,0,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000 +CVE-2024-6145,0,0,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000 +CVE-2024-6146,0,0,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000 CVE-2024-6147,0,0,2d9a1014611d118f27efff7052050ed6f6b11c1b39720db4ab48899a60221b47,2024-06-21T11:22:01.687000 CVE-2024-6148,0,0,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000 CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000 @@ -261703,8 +261709,8 @@ CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb479326954 CVE-2024-6243,0,0,af3e968f15710e52d1218645566e4f111ef2efb93699a091cf90e62d1a93b4e5,2024-08-01T14:00:17.580000 CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000 CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000 -CVE-2024-6251,0,1,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000 -CVE-2024-6252,0,1,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000 +CVE-2024-6251,0,0,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000 +CVE-2024-6252,0,0,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000 CVE-2024-6253,0,0,01b6d1d17531ea68c5548dabbc96f038e6efc11a085c095b9b4d1329d8cd997b,2024-09-06T16:57:26.650000 CVE-2024-6254,0,0,fde0fafe626682898f8bbfd16af33ff0c947c80d91ffee5375f17b755d365a35,2024-08-08T13:04:18.753000 CVE-2024-6255,0,0,4b23bc0ba79484acd9ec84f5e33767095b874b70e803764459f9fd056777671c,2024-08-30T16:15:10.467000 @@ -261716,9 +261722,9 @@ CVE-2024-6262,0,0,295b38dc67b71cbe5bd8be303a870636c7b9e2de2092da87a091242e8bc362 CVE-2024-6263,0,0,ea6dc54bae9a6133bb18ce010b56ac510f28080d60dc0881662f41b01cd3c1ce,2024-07-03T18:24:27.877000 CVE-2024-6264,0,0,ad70cfe4611bfb10e28e7f1e9ab3f1d3972f21098785857aa1fab5f0efe27af2,2024-07-02T17:57:31.737000 CVE-2024-6265,0,0,31e31d78b3c7a6511102ac434eb579b5f62a9a1e1457304e8802b01e8e49e130,2024-08-01T16:53:56.223000 -CVE-2024-6266,0,1,97cf72285d45ed69b5824e8f81cb5259b6243a784781e18f8a3198493b251b90,2024-09-19T16:53:36.647000 +CVE-2024-6266,0,0,97cf72285d45ed69b5824e8f81cb5259b6243a784781e18f8a3198493b251b90,2024-09-19T16:53:36.647000 CVE-2024-6267,0,0,33ac6ef4afec730cb116f41e289137ef2658a3490dc4f1e070ef9295b99330a6,2024-09-06T16:56:11.543000 -CVE-2024-6268,0,1,420aef07aef5af0532c73abc04760f1ddb146531b4514a62ba8c9eb47bd8747b,2024-09-19T17:06:24.663000 +CVE-2024-6268,0,0,420aef07aef5af0532c73abc04760f1ddb146531b4514a62ba8c9eb47bd8747b,2024-09-19T17:06:24.663000 CVE-2024-6269,0,0,5faaf462a19676e34593dd0a0afbe0cb206ebbb8a7e70c532ba34e4117e361f3,2024-06-26T19:15:14.483000 CVE-2024-6270,0,0,afb158e2a27846102675d7c9b52684128d3f9cc58ddd69c86dbb7ca5aa644315,2024-08-05T14:35:08.040000 CVE-2024-6271,0,0,427d631db618dffd77aaff0c6f93b041e9536bc7bd39022d5cb6f3d2036ef186,2024-08-01T14:00:18.090000 @@ -261980,7 +261986,7 @@ CVE-2024-6576,0,0,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070 CVE-2024-6578,0,0,8257f7484236e424ea5fc80479c626bf5a4575b6af53231a1ef13b8f880d14c5,2024-08-20T14:51:08.483000 CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 -CVE-2024-6582,0,0,5ee990245e7579fed88b2c8c107090ca6558ea2076f0042f82b0e3b6f6141aab,2024-09-14T11:47:14.677000 +CVE-2024-6582,0,1,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000 CVE-2024-6585,0,0,21557c5e847867bddd52df3ea3c8bef1c24ed1d84f80217fb776a5f25fb72332,2024-09-03T15:35:16.350000 CVE-2024-6586,0,0,fae1812021b838f78d9872593f00167428e312ab2f13f81f35231f528789de0a,2024-09-03T15:35:16.577000 CVE-2024-6587,0,0,a3f7b0fbe3d852ff05f7aac13ae8f9e1a110910501abae4c571a6fba27015678,2024-09-13T16:37:22.997000 @@ -262181,10 +262187,10 @@ CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c1 CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000 CVE-2024-6856,0,0,19b5d479e1e69973e8f497d2ae00f38aea8ffd7644169a9718f707450440aae4,2024-09-11T16:20:45.503000 CVE-2024-6859,0,0,5a84bd798224932fef849d8b4793f644b651b362a6172317aad467bf1bad3991,2024-09-11T16:19:18.517000 -CVE-2024-6862,0,0,fd393379df312bec9e99e771b6e9ca6b56acd2b8ba0014c4d95a4e539000e755,2024-09-14T11:47:14.677000 +CVE-2024-6862,0,1,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7e6,2024-09-19T18:37:20.910000 CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000 CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000 -CVE-2024-6867,0,0,4c5421a734def1499f39e8ebdf18304362d294435484aabee9a2355391e09ba7,2024-09-14T11:47:14.677000 +CVE-2024-6867,0,1,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000 CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000 CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d5379e,2024-08-22T12:48:02.790000 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 @@ -262717,7 +262723,7 @@ CVE-2024-7585,0,0,c8cbc83b6349dead88df56624342a371a1668d621fa6cda31e8fc0e9835fc3 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 -CVE-2024-7591,0,0,5ffbb24db28774add77bc3656c2e21a5720e9e9b63d1c53541af99087acd2dba,2024-09-06T12:08:21.290000 +CVE-2024-7591,0,1,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000 CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000 CVE-2024-7593,0,0,4da85e7ccbdae09b92bad5968b875ba9d0537591e39a68c4cb01282a2ce99145,2024-09-06T22:13:21.197000 CVE-2024-7599,0,0,425c886d21e000ef875307fcd7ee082e5b24e31594a14a2fc6a0c956123982af,2024-09-06T16:46:26.830000 @@ -262737,7 +262743,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 -CVE-2024-7618,0,0,a6149ec34b2a8c7be413bc36f1943fe9aebcb6fe380868fee0becf4e0c41b606,2024-09-10T12:09:50.377000 +CVE-2024-7618,0,1,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00 CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000 CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000 CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000 @@ -262769,7 +262775,7 @@ CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000 CVE-2024-7652,0,0,c7f694e385002b920efe17a183ba7538023c7cf88dd53a372f2912343dfa2405,2024-09-09T13:03:38.303000 CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000 -CVE-2024-7655,0,0,f298cc9a9afea680a6796cf910ff4a570db8418f9a3558eeaf2eff77bb4e3b44,2024-09-10T12:09:50.377000 +CVE-2024-7655,0,1,0e49c78835c3c35a884c75ee847ab7ab55175fc03260920848d00a05b510db96,2024-09-19T18:20:53.617000 CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000 CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000 CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000 @@ -262831,8 +262837,8 @@ CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434 CVE-2024-7732,0,0,8a3c8a90acf6f5b098dbde4b61fbc477d38ff395fb346234319b59a8d03915b0,2024-09-16T16:49:31.427000 CVE-2024-7733,0,0,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000 CVE-2024-7734,0,0,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000 -CVE-2024-7736,1,1,793266d0f87a5b7f5db686013fb7ca43b6829c1d4a302cdbd16f9330a7e437c3,2024-09-19T16:15:05.520000 -CVE-2024-7737,1,1,b86114bd3b9828440bffc5c6b86d2465141e10c2d700271feb71bbfa3f5d7169,2024-09-19T16:15:05.727000 +CVE-2024-7736,0,0,793266d0f87a5b7f5db686013fb7ca43b6829c1d4a302cdbd16f9330a7e437c3,2024-09-19T16:15:05.520000 +CVE-2024-7737,0,0,b86114bd3b9828440bffc5c6b86d2465141e10c2d700271feb71bbfa3f5d7169,2024-09-19T16:15:05.727000 CVE-2024-7738,0,0,77baa8ad9219363c0b9f8c974088b914a426a11beaf2249218dd53ceafa511c2,2024-09-13T16:03:45.013000 CVE-2024-7739,0,0,93ba2cd98f674046a013ca0d04355005a6712730837693604a9e1ff7550070b5,2024-09-13T16:03:11.377000 CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000 @@ -263019,7 +263025,7 @@ CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a21 CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000 CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000 CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000 -CVE-2024-8006,0,1,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db6b,2024-09-19T17:46:03.447000 +CVE-2024-8006,0,0,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db6b,2024-09-19T17:46:03.447000 CVE-2024-8007,0,0,d4843ecbff9c18b0a3733961009c3b0a5fd18a5329783b13479a12d64d8f35f3,2024-09-18T08:15:06.990000 CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000 CVE-2024-8012,0,0,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000 @@ -263169,7 +263175,7 @@ CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c2 CVE-2024-8253,0,0,91918f2cda2657bd2182507d0429f1a8d4a218563516f304bdbf9084cadbf1b5,2024-09-11T16:26:11.920000 CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000 CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000 -CVE-2024-8260,0,1,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000 +CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000 CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000 CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000 CVE-2024-8271,0,0,3562c0d9d060a8b2f43387dce3941b2ee080bc34564191358e2afbabb30a0397,2024-09-14T11:47:14.677000 @@ -263192,7 +263198,7 @@ CVE-2024-8298,0,0,b6e0265f7e06064f96a4b1454f4843c935b76c78438dc3aea3b160aebd5f45 CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000 CVE-2024-8302,0,0,73573fb95f4db9829ae46e4068d229d908324e137e6241c89a1030ab338e0051,2024-08-30T13:00:05.390000 CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000 -CVE-2024-8304,0,1,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000 +CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000 CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000 CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000 CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000 @@ -263238,7 +263244,7 @@ CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e39076 CVE-2024-8372,0,0,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722aa5,2024-09-17T17:24:21.793000 CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000 CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000 -CVE-2024-8375,1,1,aaa7aacdae353ea1e1868b53188416f82d46294c587bbf7a4322d9966d07dd9b,2024-09-19T16:15:06.023000 +CVE-2024-8375,0,0,aaa7aacdae353ea1e1868b53188416f82d46294c587bbf7a4322d9966d07dd9b,2024-09-19T16:15:06.023000 CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000 CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000 CVE-2024-8382,0,0,6313fe051491464f5060a11c4fbfc0623b9d0d82cc5fbeccd812557ff3cd8b8d,2024-09-06T17:15:17.677000 @@ -263251,7 +263257,7 @@ CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f9 CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000 CVE-2024-8391,0,0,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e0076,2024-09-12T16:44:01.247000 CVE-2024-8394,0,0,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000 -CVE-2024-8395,0,1,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000 +CVE-2024-8395,0,0,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000 CVE-2024-8399,0,0,ff5a0b61b9891ed649233268ce0fa37bd0b7c79ba8aa2863ea2ecc61c35c709c,2024-09-12T19:45:07.347000 CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000 CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000 @@ -263263,7 +263269,7 @@ CVE-2024-8413,0,0,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a7854 CVE-2024-8414,0,0,40169a23a4033486754844c64fbfe06d703efd0c5e76953cc0d7fdb87952af16,2024-09-06T16:44:04.583000 CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30fc,2024-09-06T16:40:06.120000 CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb8417,2024-09-06T16:38:44.053000 -CVE-2024-8417,0,0,06f2fb3a9c5f24d70d3e64f2adf01488c8a1074d97d657d22a3388a406d1616e,2024-09-05T12:53:21.110000 +CVE-2024-8417,0,1,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000 CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000 CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,d38eeb7d0c97ad7b1cddb799376a1380930df039d2cf833bc9165ae4323bcbef,2024-09-06T16:46:26.830000 @@ -263349,9 +263355,9 @@ CVE-2024-8641,0,0,6714847a0a2d7b4da8f2ecb0f7b3c9e94c4657d9429961f088a44e0537d838 CVE-2024-8642,0,0,2aae0632e6322f09814ded77019a17c6bdd3adefc0841a6f6e92e4043db21740,2024-09-19T15:18:47.917000 CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000 CVE-2024-8646,0,0,80914337a2bd562d2db1f36aec06ad883cb607d6cc039af494590eb0a0b50d8e,2024-09-18T20:20:51.643000 -CVE-2024-8651,1,1,24c43d83d88e55ccb42455ca7f2a06a85f1137676fd4c59e592afc727b0a6f4f,2024-09-19T17:15:15.173000 -CVE-2024-8652,1,1,01de35da454bcf77db821c9e18f381f6885088365f6408939562cc6f4bdec039,2024-09-19T17:15:15.360000 -CVE-2024-8653,1,1,30c691d97001a678d25f8d3bf4fef38ffd5cd2e38e7a3f0a9c9d02b4c7c9017c,2024-09-19T17:15:15.503000 +CVE-2024-8651,0,0,24c43d83d88e55ccb42455ca7f2a06a85f1137676fd4c59e592afc727b0a6f4f,2024-09-19T17:15:15.173000 +CVE-2024-8652,0,0,01de35da454bcf77db821c9e18f381f6885088365f6408939562cc6f4bdec039,2024-09-19T17:15:15.360000 +CVE-2024-8653,0,0,30c691d97001a678d25f8d3bf4fef38ffd5cd2e38e7a3f0a9c9d02b4c7c9017c,2024-09-19T17:15:15.503000 CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000 CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000 CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a82a,2024-09-13T14:06:04.777000 @@ -263372,7 +263378,7 @@ CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490dae CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000 CVE-2024-8695,0,0,52bc6b8b60aae6c315837e4eb131cf540e2b445dfd9cef8ca664c148d103d584,2024-09-13T16:01:31.340000 CVE-2024-8696,0,0,3ba62a921109450e540b318e77e86831bda9c658513319d0aed77dfa516028ff,2024-09-13T16:01:22.410000 -CVE-2024-8698,1,1,c0d35a3336e4f52767b135ff04ba45500c7dcae9cd5d2fa662eee7f90410608f,2024-09-19T16:15:06.177000 +CVE-2024-8698,0,0,c0d35a3336e4f52767b135ff04ba45500c7dcae9cd5d2fa662eee7f90410608f,2024-09-19T16:15:06.177000 CVE-2024-8705,0,0,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000 CVE-2024-8706,0,0,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000 CVE-2024-8707,0,0,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000 @@ -263422,7 +263428,7 @@ CVE-2024-8869,0,0,b189f35b5a28c07852ca6d00280a8a46d906bab51b4d56357a90dd535f0651 CVE-2024-8875,0,0,0e9f0f93ae52ceba12c10384b7bbc3067de71e5c05493a69fd2a253e00e4d595,2024-09-16T15:30:28.733000 CVE-2024-8876,0,0,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee31,2024-09-16T15:30:28.733000 CVE-2024-8880,0,0,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000 -CVE-2024-8883,1,1,0f1b63aa77f8575956d79a906cb024f514d666d4a8c9ffedf8d766e5d9bb5bf7,2024-09-19T16:15:06.403000 +CVE-2024-8883,0,0,0f1b63aa77f8575956d79a906cb024f514d666d4a8c9ffedf8d766e5d9bb5bf7,2024-09-19T16:15:06.403000 CVE-2024-8887,0,0,3a4ee8c7c72402467690a1d5baf4ee46122c1a9bd1979c36a47f557846bba5ff,2024-09-18T11:15:10.530000 CVE-2024-8888,0,0,1e74f6eae96ea2bc3e4d1e807f25808d32b7d4278014e4cabc70fec925ff3214,2024-09-18T12:15:03.520000 CVE-2024-8889,0,0,d14885671be48487e73dc26a56497c68dd08124696a268e049900425bd24a291,2024-09-18T12:15:03.710000 @@ -263447,5 +263453,6 @@ CVE-2024-8949,0,0,558b0f2a15aa10d0215f6e776b245d8a42240ea8527c9ffd4d56905704832d CVE-2024-8951,0,0,fdcc8f1ef8d6875cdf064fe8ca72ee0e4237f3f89d53a358120e1931bee39aef,2024-09-17T20:15:07.020000 CVE-2024-8956,0,0,8fb796f1e52be7bf3f012ac38934615fcbd07a654b11f2c40ea225bc31651e57,2024-09-17T20:15:07.287000 CVE-2024-8957,0,0,745e7f02f1c26d5de4df67e0c2795340d562588c5301af2d060cb965e1ba5dae,2024-09-17T21:15:13.423000 +CVE-2024-8963,1,1,bad5e8de51e4d1a286774f7d07084658a354cb4de050dbe04254efc089204dfb,2024-09-19T18:15:10.600000 CVE-2024-8969,0,0,b91ca645bf2071dccf15db49fd3efa26a97008959fe8a964028e51af15b02de3,2024-09-18T07:15:04.657000 CVE-2024-8986,0,0,26509263613f6b019d61b82311e5933cc6dfa31601ff6ae6235d1951248ed56c,2024-09-19T11:15:10.913000