Auto-Update: 2024-10-23T20:00:18.487407+00:00

This commit is contained in:
cad-safe-bot 2024-10-23 20:03:19 +00:00
parent 54f6035d8e
commit 2c78827db1
62 changed files with 3890 additions and 295 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25696",
"sourceIdentifier": "security@apache.org",
"published": "2023-02-24T12:15:30.790",
"lastModified": "2023-11-07T04:09:08.073",
"lastModified": "2024-10-23T19:35:03.353",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52160",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T17:15:08.263",
"lastModified": "2024-08-27T20:35:07.373",
"vulnStatus": "Modified",
"lastModified": "2024-10-23T19:34:09.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -82,44 +82,6 @@
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5ACCACAF-7BD6-4C0A-8E6A-67E13D5E341D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.10",
"matchCriteriaId": "334B562B-B7A1-480C-ADF0-B92A14385AD1"
}
]
}
]
},
{
"nodes": [
{
@ -131,6 +93,11 @@
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
@ -149,6 +116,44 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.10",
"matchCriteriaId": "DDD0DCCD-4E81-4916-A5DA-40EA04EE4A58"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
}
],
"references": [
@ -169,7 +174,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QU6IR4KV3ZXJZLK2BY7HAHGZNCP7FPNI/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://w1.fi/cgit/hostap/commit/?id=8e6485a1bcb0baffdea9e55255a81270b768439c",

View File

@ -0,0 +1,133 @@
{
"id": "CVE-2024-10297",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-23T18:15:05.137",
"lastModified": "2024-10-23T18:15:05.137",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Medical Card Generation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/changeimage.php of the component Managecard Edit Image Page. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.281564",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.281564",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-10298",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-23T19:15:14.920",
"lastModified": "2024-10-23T19:15:14.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in PHPGurukul Medical Card Generation System 1.0. This affects an unknown part of the file /admin/edit-card-detail.php of the component Managecard Edit Card Detail Page. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.281565",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.281565",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.427403",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,133 @@
{
"id": "CVE-2024-10299",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-23T19:15:15.183",
"lastModified": "2024-10-23T19:15:15.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in PHPGurukul Medical Card Generation System 1.0. This vulnerability affects unknown code of the file /admin/view-card-detail.php of the component Managecard View Detail Page. The manipulation of the argument viewid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.281566",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.281566",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20364",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:05.427",
"lastModified": "2024-10-23T18:15:05.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20370",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:05.637",
"lastModified": "2024-10-23T18:15:05.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco FXOS CLI feature on specific hardware platforms for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to elevate their administrative privileges to root. The attacker would need valid administrative credentials on the device to exploit this vulnerability. This vulnerability exists because certain system configurations and executable files have insecure storage and permissions. An attacker could exploit this vulnerability by authenticating on the device and then performing a series of steps that includes downloading malicious system files and accessing the Cisco FXOS CLI to configure the attack. A successful exploit could allow the attacker to obtain root access on the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-priv-esc-hBS9gnwq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20372",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:05.863",
"lastModified": "2024-10-23T18:15:05.863",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20374",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:06.100",
"lastModified": "2024-10-23T18:15:06.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker with Administrator-level privileges to execute arbitrary commands on the underlying operating system.\r\n\r This vulnerability is due to insufficient input validation of certain HTTP request parameters that are sent to the web-based management interface. An attacker could exploit this vulnerability by authenticating to the Cisco FMC web-based management interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute commands as the root user on the affected device. To exploit this vulnerability, an attacker would need Administrator-level credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-2HBkA97G",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20377",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:06.327",
"lastModified": "2024-10-23T18:15:06.327",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability is due to the web-based management interface not properly validating user-supplied input. An attacker could exploit this vulnerability by by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20379",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:06.553",
"lastModified": "2024-10-23T18:15:06.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system.\r\n\r This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-36"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-read-5q4mQRn",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20382",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:06.780",
"lastModified": "2024-10-23T18:15:06.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application. A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-yjj7ZjVq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20384",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:07.030",
"lastModified": "2024-10-23T18:15:07.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Network Service Group (NSG) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device.\r\n\r This vulnerability is due to a logic error that occurs when NSG ACLs are populated on an affected device. An attacker could exploit this vulnerability by establishing a connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20386",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:07.257",
"lastModified": "2024-10-23T18:15:07.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20387",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:07.480",
"lastModified": "2024-10-23T18:15:07.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco FMC Software could allow an authenticated, remote attacker to store malicious content for use in XSS attacks. This vulnerability is due to improper input sanitization in the web-based management interface of Cisco FMC Software. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to conduct a stored XSS attack on an affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20388",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:07.697",
"lastModified": "2024-10-23T18:15:07.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the password change feature of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to determine valid user names on an affected device.\r\n\r This vulnerability is due to improper authentication of password update responses. An attacker could exploit this vulnerability by forcing a password reset on an affected device. A successful exploit could allow the attacker to determine valid user names in the unauthenticated response to a forced password reset."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-202"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20402",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:07.930",
"lastModified": "2024-10-23T18:15:07.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SSL VPN feature for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a logic error in memory management when the device is handling SSL VPN connections. An attacker could exploit this vulnerability by sending crafted SSL/TLS packets to the SSL VPN server of the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-788"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-dos-hOnB9pH4",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20403",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:08.193",
"lastModified": "2024-10-23T18:15:08.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20407",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:08.413",
"lastModified": "2024-10-23T18:15:08.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the interaction between the TCP Intercept feature and the Snort 3 detection engine on Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies on an affected system. Devices that are configured with Snort 2 are not affected by this vulnerability. \r\n\r This vulnerability is due to a logic error when handling embryonic (half-open) TCP connections. An attacker could exploit this vulnerability by sending a crafted traffic pattern through an affected device. A successful exploit could allow unintended traffic to enter the network protected by the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-bypass-PTry37fX",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20408",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:08.697",
"lastModified": "2024-10-23T18:15:08.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Dynamic Access Policies (DAP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly. To exploit this vulnerability, an attacker would need valid remote access VPN user credentials on the affected device.\r\n\r This vulnerability is due to improper validation of data in HTTPS POST requests. An attacker could exploit this vulnerability by sending a crafted HTTPS POST request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1287"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dap-dos-bhEkP7n",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20409",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:08.970",
"lastModified": "2024-10-23T18:15:08.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20410",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:09.197",
"lastModified": "2024-10-23T18:15:09.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20412",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:09.430",
"lastModified": "2024-10-23T18:15:09.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000, 2100, 3100, and 4200 Series could allow an unauthenticated, local attacker to access an affected system using static credentials.\r\n\r This vulnerability is due to the presence of static accounts with hard-coded passwords on an affected system. An attacker could exploit this vulnerability by logging in to the CLI of an affected device with these credentials. A successful exploit could allow the attacker to access the affected system and retrieve sensitive information, perform limited troubleshooting actions, modify some configuration options, or render the device unable to boot to the operating system, requiring a reimage of the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-statcred-dFC8tXT5",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20415",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:09.713",
"lastModified": "2024-10-23T18:15:09.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20424",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:09.930",
"lastModified": "2024-10-23T18:15:09.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system as root.\r\n\r This vulnerability is due to insufficient input validation of certain HTTP requests. An attacker could exploit this vulnerability by authenticating to the web-based management interface of an affected device and then sending a crafted HTTP request to the device. A successful exploit could allow the attacker to execute arbitrary commands with root permissions on the underlying operating system of the Cisco FMC device or to execute commands on managed Cisco Firepower Threat Defense (FTD) devices. To exploit this vulnerability, the attacker would need valid credentials for a user account with at least the role of Security Analyst (Read Only)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-v3AWDqN7",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20426",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:10.147",
"lastModified": "2024-10-23T18:15:10.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol for VPN termination of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-9FgEyHsF",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20431",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:10.440",
"lastModified": "2024-10-23T18:15:10.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the geolocation access control feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass an access control policy.\r\n\r This vulnerability is due to improper assignment of geolocation data. An attacker could exploit this vulnerability by sending traffic through an affected device. A successful exploit could allow the attacker to bypass a geolocation-based access control policy and successfully send traffic to a protected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-229"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-geoip-bypass-MB4zRDu",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20471",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:10.773",
"lastModified": "2024-10-23T18:15:10.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20472",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:11.007",
"lastModified": "2024-10-23T18:15:11.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r\nThis vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20473",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:11.280",
"lastModified": "2024-10-23T18:15:11.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r\nThis vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20474",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:11.517",
"lastModified": "2024-10-23T18:15:11.517",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Internet Key Exchange version 2 (IKEv2) processing of Cisco Secure Client Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of Cisco Secure Client.\r\n\r This vulnerability is due to an integer underflow condition. An attacker could exploit this vulnerability by sending a crafted IKEv2 packet to an affected system. A successful exploit could allow the attacker to cause Cisco Secure Client Software to crash, resulting in a DoS condition on the client software.\r\n\r Note: Cisco Secure Client Software releases 4.10 and earlier were known as Cisco AnyConnect Secure Mobility Client."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csc-dos-XvPhM3bj",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20481",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:11.737",
"lastModified": "2024-10-23T18:15:11.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the RAVPN service.\r\n\r This vulnerability is due to resource exhaustion. An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device. A successful exploit could allow the attacker to exhaust resources, resulting in a DoS of the RAVPN service on the affected device. Depending on the impact of the attack, a reload of the device may be required to restore the RAVPN service. Services that are not related to VPN are not affected.\r\n\r Cisco Talos discussed these attacks in the blog post Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-772"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20482",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:12.063",
"lastModified": "2024-10-23T18:15:12.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker must have a valid account on the device that is configured with a custom read-only role.\r\n\r This vulnerability is due to insufficient validation of role permissions in part of the web-based management interface. An attacker could exploit this vulnerability by performing a write operation on the affected part of the web-based management interface. A successful exploit could allow the attacker to modify certain parts of the configuration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-priv-esc-CMQ4S6m7",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20485",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:12.273",
"lastModified": "2024-10-23T18:15:12.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the VPN web server of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.\r\n\r This vulnerability is due to improper validation of a specific file when it is read from system flash memory. An attacker could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-lce-vU3ekMJ3",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20493",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:12.533",
"lastModified": "2024-10-23T18:15:12.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the login authentication functionality of the Remote Access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to deny further VPN user authentications for several minutes, resulting in a temporary denial of service (DoS) condition.\r\n\r This vulnerability is due to ineffective handling of memory resources during the authentication process. An attacker could exploit this vulnerability by sending crafted packets, which could cause resource exhaustion of the authentication process. A successful exploit could allow the attacker to deny authentication for Remote Access SSL VPN users for several minutes, resulting in a temporary DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-772"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-4gYEWMKg",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20494",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:12.783",
"lastModified": "2024-10-23T18:15:12.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the TLS cryptography functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper data validation during the TLS 1.3 handshake. An attacker could exploit this vulnerability by sending a crafted TLS 1.3 packet to an affected system through a TLS 1.3-enabled listening socket. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: This vulnerability can also impact the integrity of a device by causing VPN HostScan communication failures or file transfer failures when Cisco ASA Software is upgraded using Cisco Adaptive Security Device Manager (ASDM)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1287"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-tls-CWY6zXB",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20495",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:13.007",
"lastModified": "2024-10-23T18:15:13.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Remote Access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper validation of client key data after the TLS session is established. An attacker could exploit this vulnerability by sending a crafted key value to an affected system over the secure TLS session. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-cZf8gT",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20526",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:13.303",
"lastModified": "2024-10-23T18:15:13.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SSH server of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition for the SSH server of an affected device.\r\n\r This vulnerability is due to a logic error when an SSH session is established. An attacker could exploit this vulnerability by sending crafted SSH messages to an affected device. A successful exploit could allow the attacker to exhaust available SSH resources on the affected device so that new SSH connections to the device are denied, resulting in a DoS condition. Existing SSH connections to the device would continue to function normally. The device must be rebooted manually to recover. However, user traffic would not be impacted and could be managed using a remote application such as Cisco Adaptive Security Device Manager (ASDM)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-dos-eEDWu5RM",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25209",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:08.910",
"lastModified": "2024-02-14T16:13:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T18:10:52.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Se descubri\u00f3 que Barangay Population Monitoring System 1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro residente en /endpoint/delete-resident.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rems:barangay_population_monitoring_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0169E517-4FD9-444B-9073-A1F772B5BCAC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20SQL%20Injection.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25210",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:08.967",
"lastModified": "2024-02-14T16:13:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T18:16:34.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Se descubri\u00f3 que Simple Expense Tracker v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de gastos en /endpoint/delete_expense.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rems:simple_expense_tracker_app:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36F85F3C-BCB2-45FC-8710-073FCA7995FB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tacker%20-%20SQL%20Injection-1.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25211",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:09.013",
"lastModified": "2024-02-14T16:13:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T18:16:31.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Se descubri\u00f3 que Simple Expense Tracker v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de categor\u00eda en /endpoint/delete_category.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rems:simple_expense_tracker_app:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36F85F3C-BCB2-45FC-8710-073FCA7995FB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tracker%20-%20SQL%20Injection-2.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25217",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:09.323",
"lastModified": "2024-02-14T16:13:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T18:08:33.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Se descubri\u00f3 que Online Medicine Ordering System v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /omos/?p=products/view_product."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BA8DED5-CD2F-4667-A647-F56E5E0E5FC7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Medicine%20Ordering%20System/OMOS%20-%20SQL%20Injection%28Unauthenticated%29.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25223",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:09.627",
"lastModified": "2024-02-14T16:13:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T18:06:48.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Se descubri\u00f3 que la aplicaci\u00f3n Simple Admin Panel v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro orderID en /adminView/viewEachOrder.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_admin_panel:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D10F0DB8-FC71-4227-90E2-4354DC33B2E7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20SQL%20Injection.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25224",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:09.680",
"lastModified": "2024-02-14T16:13:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T18:07:49.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la aplicaci\u00f3n Simple Admin Panel v1.0 permite a los atacantes script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro N\u00famero de tama\u00f1o en la funci\u00f3n Agregar tama\u00f1o."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_admin_panel:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D10F0DB8-FC71-4227-90E2-4354DC33B2E7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%202.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25225",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:09.723",
"lastModified": "2024-02-14T16:13:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T18:07:34.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la aplicaci\u00f3n Simple Admin Panel v1.0 permite a los atacantes script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre de categor\u00eda en la funci\u00f3n Agregar categor\u00eda."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_admin_panel:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D10F0DB8-FC71-4227-90E2-4354DC33B2E7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%201.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25226",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:09.767",
"lastModified": "2024-02-14T16:13:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T18:05:01.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,66 @@
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la aplicaci\u00f3n Simple Admin Panel v1.0 permite a los atacantes script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre de categor\u00eda en la funci\u00f3n Agregar categor\u00eda."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_admin_panel:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D10F0DB8-FC71-4227-90E2-4354DC33B2E7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Supplier%20Managment%20System/Supplier%20Managment%20System%20-%20SQL%20Injection.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42005",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T15:15:56.220",
"lastModified": "2024-09-03T18:35:10.293",
"vulnStatus": "Modified",
"lastModified": "2024-10-23T18:22:48.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 3.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42643",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:04.860",
"lastModified": "2024-10-23T15:12:34.673",
"lastModified": "2024-10-23T18:35:01.897",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El desbordamiento de entero en fast_ping.c en SmartDNS Release46 permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de un acceso a memoria desalineada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://github.com/pymumu/smartdns/issues/1779",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43577",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-18T23:15:06.510",
"lastModified": "2024-10-21T17:10:22.857",
"lastModified": "2024-10-23T19:15:18.673",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-449"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43577",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44331",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:05.463",
"lastModified": "2024-10-23T15:12:34.673",
"lastModified": "2024-10-23T18:35:02.893",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " El control de acceso incorrecto en el servidor RTSP de GStreamer 1.25.0 en gst-rtsp-server/rtsp-media.c permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de una serie de solicitudes hexstream especialmente manipuladas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/dqp10515/c6a8879bebe92d8c74f7c52667fd3400",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45526",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T21:15:06.720",
"lastModified": "2024-10-23T15:12:34.673",
"lastModified": "2024-10-23T19:35:10.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en OPC Foundation OPCFoundation/UA-.NETStandard hasta la versi\u00f3n 1.5.374.78. Un atacante remoto puede enviar solicitudes con credenciales no v\u00e1lidas y provocar que el rendimiento del servidor se degrade gradualmente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2024-45526.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46482",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:05.633",
"lastModified": "2024-10-23T15:12:34.673",
"lastModified": "2024-10-23T18:35:03.670",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,46 @@
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de generaci\u00f3n de tickets de Ladybird Web Solution Faveo-Helpdesk v2.0.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo .html o .svg manipulado espec\u00edficamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Asadiqbal2/Vulnerabilities-Research/tree/main/CVE-2024-46482",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46483",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:05.720",
"lastModified": "2024-10-23T15:12:34.673",
"lastModified": "2024-10-23T19:35:11.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " El servidor FTP Xlight <3.9.4.3 tiene una vulnerabilidad de desbordamiento de enteros en la l\u00f3gica de an\u00e1lisis de paquetes del servidor SFTP, lo que puede provocar un desbordamiento de almacenamiento din\u00e1mico con contenido controlado por el atacante."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://github.com/kn32/cve-2024-46483",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47670",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-09T15:15:15.673",
"lastModified": "2024-10-17T14:15:13.560",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T19:16:56.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,116 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: agregar comprobaci\u00f3n de los l\u00edmites a ocfs2_xattr_find_entry() Agregue una comprobaci\u00f3n de paranoia para asegurarse de que no se desv\u00ede m\u00e1s all\u00e1 de la regi\u00f3n de memoria v\u00e1lida que contiene entradas xattr de ocfs2 al escanear en busca de una coincidencia. Esto evitar\u00e1 el acceso fuera de los l\u00edmites en caso de im\u00e1genes manipuladas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.112",
"matchCriteriaId": "E4EA94C6-CF4C-4A51-8A5A-A99B713451CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.53",
"matchCriteriaId": "007075FA-C231-42B1-A525-B87CEA313C63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.12",
"matchCriteriaId": "42054751-2A4F-4982-ADE9-A8251AD9A7BC"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1f6e167d6753fe3ea493cdc7f7de8d03147a4d39",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/34759b7e4493d7337cbc414c132cef378c492a2c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5bbe51eaf01a5dd6fb3f0dea81791e5dbc6dc6dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8e7bef408261746c160853fc27df3139659f5f77",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9b32539590a8e6400ac2f6e7cf9cbb8e08711a2f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9e3041fecdc8f78a5900c3aa51d3d756e73264d6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47671",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-09T15:15:15.753",
"lastModified": "2024-10-17T14:15:13.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T19:36:08.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,169 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: usbtmc: prevent kernel-usb-infoleak El syzbot inform\u00f3 una kernel-usb-infoleak en usbtmc_write, debemos borrar la estructura antes de completar los campos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "6.1.112",
"matchCriteriaId": "A83EDBE9-06AD-45E0-8A2C-4E3261362FA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.53",
"matchCriteriaId": "007075FA-C231-42B1-A525-B87CEA313C63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.12",
"matchCriteriaId": "42054751-2A4F-4982-ADE9-A8251AD9A7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*",
"matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc8:*:*:*:*:*:*",
"matchCriteriaId": "E9D7C49C-53E7-4B23-9AFE-DAC5A18B153A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEEE81FC-0548-4F4D-881B-F608C1A21714"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0c927dfc0b9bd177f7ab6ee59ef0c4ea06c110a7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/16e0ab9ed3ae7d19ca8ee718ba4e09d5c0f909ca",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/51297ef7ad7824ad577337f273cd092e81a9fa08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/625fa77151f00c1bd00d34d60d6f2e710b3f9aad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6c7fc36da021b13c34c572a26ba336cd102418f8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ba6269e187aa1b1f20faf3c458831a0d6350304b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e872738e670ddd63e19f22d0d784f0bdf26ecba5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47672",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-09T15:15:15.827",
"lastModified": "2024-10-17T14:15:13.780",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-23T19:44:08.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,142 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: no espere colas de transmisi\u00f3n si el firmware est\u00e1 muerto Hay una ADVERTENCIA en iwl_trans_wait_tx_queues_empty() (que se convirti\u00f3 recientemente de solo un mensaje), que puede verse afectada si esperamos a que las colas de transmisi\u00f3n se vac\u00eden despu\u00e9s de que el firmware haya muerto. Claramente, no podemos esperar nada del firmware despu\u00e9s de que se declare muerto. No llame a iwl_trans_wait_tx_queues_empty() en este caso. Si bien podr\u00eda ser una buena idea detener el flujo antes, las funciones de vaciado realizan un trabajo de mantenimiento que no est\u00e1 relacionado con el firmware, as\u00ed que mantenga esa parte del c\u00f3digo en ejecuci\u00f3n incluso cuando el firmware no se est\u00e9 ejecutando. [editar mensaje de confirmaci\u00f3n]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.227",
"versionEndExcluding": "6.1.112",
"matchCriteriaId": "71E49152-A827-4510-B530-E47898675B55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.53",
"matchCriteriaId": "007075FA-C231-42B1-A525-B87CEA313C63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.12",
"matchCriteriaId": "42054751-2A4F-4982-ADE9-A8251AD9A7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1afed66cb271b3e65fe9df1c9fba2bf4b1f55669",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1b0cd832c9607f41f84053b818e0b7908510a3b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3a84454f5204718ca5b4ad2c1f0bf2031e2403d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4d0a900ec470d392476c428875dbf053f8a0ae5e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7188b7a72320367554b76d8f298417b070b05dd3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/de46b1d24f5f752b3bd8b46673c2ea4239661244",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48644",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:05.970",
"lastModified": "2024-10-23T15:12:34.673",
"lastModified": "2024-10-23T19:35:12.593",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad de enumeraci\u00f3n de cuentas en el componente de inicio de sesi\u00f3n de Reolink Duo 2 WiFi Camera (versi\u00f3n de firmware v3.0.0.1889_23031701) permite a atacantes remotos determinar cuentas de usuario v\u00e1lidas mediante intentos de inicio de sesi\u00f3n. Esto puede dar lugar a la enumeraci\u00f3n de cuentas de usuario y, potencialmente, facilitar otros ataques, como la fuerza bruta de contrase\u00f1as. La vulnerabilidad surge de que la aplicaci\u00f3n responde de forma diferente a los intentos de inicio de sesi\u00f3n con nombres de usuario v\u00e1lidos e inv\u00e1lidos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://github.com/rosembergpro/CVE-2024-48644",

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-48963",
"sourceIdentifier": "report@snyk.io",
"published": "2024-10-23T19:15:19.607",
"lastModified": "2024-10-23T19:15:19.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The package Snyk CLI before 1.1294.0 is vulnerable to Code Injection when scanning an untrusted PHP project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.5,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/snyk/snyk-php-plugin/releases/tag/v1.10.0",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-48964",
"sourceIdentifier": "report@snyk.io",
"published": "2024-10-23T19:15:19.833",
"lastModified": "2024-10-23T19:15:19.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The package Snyk CLI before 1.1294.0 is vulnerable to Code Injection when scanning an untrusted Gradle project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.5,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/snyk/snyk-gradle-plugin/commit/2f5ee7579f00660282dd161a0b79690f4a9c865d",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-9949",
"sourceIdentifier": "a14582b7-06f4-4d66-8e82-3d7ba3739e88",
"published": "2024-10-23T18:15:13.763",
"lastModified": "2024-10-23T18:15:13.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Denial of Service in Forescout SecureConnector\u00a011.1.02.1019 on Windows allows Unprivileged user to corrupt the configuration file and cause Denial of Service in the application."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "a14582b7-06f4-4d66-8e82-3d7ba3739e88",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "a14582b7-06f4-4d66-8e82-3d7ba3739e88",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
]
}
],
"references": [
{
"url": "https://forescout.my.site.com/support/s/article/High-Severity-Vulnerability-in-Secure-Connector-HPS-Inspection-Engine-v11-3-5-and-lower",
"source": "a14582b7-06f4-4d66-8e82-3d7ba3739e88"
}
]
}

104
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-23T18:00:25.728102+00:00
2024-10-23T20:00:18.487407+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-23T17:58:08.720000+00:00
2024-10-23T19:44:08.623000+00:00
```
### Last Data Feed Release
@ -33,69 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
266841
266880
```
### CVEs added in the last Commit
Recently added CVEs: `39`
- [CVE-2024-20300](CVE-2024/CVE-2024-203xx/CVE-2024-20300.json) (`2024-10-23T17:15:17.253`)
- [CVE-2024-20329](CVE-2024/CVE-2024-203xx/CVE-2024-20329.json) (`2024-10-23T17:15:17.457`)
- [CVE-2024-20330](CVE-2024/CVE-2024-203xx/CVE-2024-20330.json) (`2024-10-23T17:15:17.663`)
- [CVE-2024-20331](CVE-2024/CVE-2024-203xx/CVE-2024-20331.json) (`2024-10-23T17:15:17.870`)
- [CVE-2024-20339](CVE-2024/CVE-2024-203xx/CVE-2024-20339.json) (`2024-10-23T17:15:18.097`)
- [CVE-2024-20340](CVE-2024/CVE-2024-203xx/CVE-2024-20340.json) (`2024-10-23T17:15:18.300`)
- [CVE-2024-20341](CVE-2024/CVE-2024-203xx/CVE-2024-20341.json) (`2024-10-23T17:15:18.493`)
- [CVE-2024-20342](CVE-2024/CVE-2024-203xx/CVE-2024-20342.json) (`2024-10-23T17:15:18.703`)
- [CVE-2024-20351](CVE-2024/CVE-2024-203xx/CVE-2024-20351.json) (`2024-10-23T17:15:18.913`)
- [CVE-2024-30124](CVE-2024/CVE-2024-301xx/CVE-2024-30124.json) (`2024-10-23T16:15:05.667`)
- [CVE-2024-49652](CVE-2024/CVE-2024-496xx/CVE-2024-49652.json) (`2024-10-23T16:15:06.027`)
- [CVE-2024-49653](CVE-2024/CVE-2024-496xx/CVE-2024-49653.json) (`2024-10-23T16:15:06.243`)
- [CVE-2024-49657](CVE-2024/CVE-2024-496xx/CVE-2024-49657.json) (`2024-10-23T16:15:06.450`)
- [CVE-2024-49658](CVE-2024/CVE-2024-496xx/CVE-2024-49658.json) (`2024-10-23T16:15:06.660`)
- [CVE-2024-49668](CVE-2024/CVE-2024-496xx/CVE-2024-49668.json) (`2024-10-23T16:15:06.970`)
- [CVE-2024-49669](CVE-2024/CVE-2024-496xx/CVE-2024-49669.json) (`2024-10-23T16:15:07.330`)
- [CVE-2024-49671](CVE-2024/CVE-2024-496xx/CVE-2024-49671.json) (`2024-10-23T16:15:08.260`)
- [CVE-2024-49676](CVE-2024/CVE-2024-496xx/CVE-2024-49676.json) (`2024-10-23T16:15:09.040`)
- [CVE-2024-49684](CVE-2024/CVE-2024-496xx/CVE-2024-49684.json) (`2024-10-23T16:15:09.620`)
- [CVE-2024-49690](CVE-2024/CVE-2024-496xx/CVE-2024-49690.json) (`2024-10-23T16:15:09.867`)
- [CVE-2024-49701](CVE-2024/CVE-2024-497xx/CVE-2024-49701.json) (`2024-10-23T16:15:10.097`)
- [CVE-2024-49751](CVE-2024/CVE-2024-497xx/CVE-2024-49751.json) (`2024-10-23T16:15:10.310`)
- [CVE-2024-49756](CVE-2024/CVE-2024-497xx/CVE-2024-49756.json) (`2024-10-23T17:15:19.250`)
- [CVE-2024-50382](CVE-2024/CVE-2024-503xx/CVE-2024-50382.json) (`2024-10-23T17:15:19.453`)
- [CVE-2024-50383](CVE-2024/CVE-2024-503xx/CVE-2024-50383.json) (`2024-10-23T17:15:19.540`)
- [CVE-2024-20402](CVE-2024/CVE-2024-204xx/CVE-2024-20402.json) (`2024-10-23T18:15:07.930`)
- [CVE-2024-20403](CVE-2024/CVE-2024-204xx/CVE-2024-20403.json) (`2024-10-23T18:15:08.193`)
- [CVE-2024-20407](CVE-2024/CVE-2024-204xx/CVE-2024-20407.json) (`2024-10-23T18:15:08.413`)
- [CVE-2024-20408](CVE-2024/CVE-2024-204xx/CVE-2024-20408.json) (`2024-10-23T18:15:08.697`)
- [CVE-2024-20409](CVE-2024/CVE-2024-204xx/CVE-2024-20409.json) (`2024-10-23T18:15:08.970`)
- [CVE-2024-20410](CVE-2024/CVE-2024-204xx/CVE-2024-20410.json) (`2024-10-23T18:15:09.197`)
- [CVE-2024-20412](CVE-2024/CVE-2024-204xx/CVE-2024-20412.json) (`2024-10-23T18:15:09.430`)
- [CVE-2024-20415](CVE-2024/CVE-2024-204xx/CVE-2024-20415.json) (`2024-10-23T18:15:09.713`)
- [CVE-2024-20424](CVE-2024/CVE-2024-204xx/CVE-2024-20424.json) (`2024-10-23T18:15:09.930`)
- [CVE-2024-20426](CVE-2024/CVE-2024-204xx/CVE-2024-20426.json) (`2024-10-23T18:15:10.147`)
- [CVE-2024-20431](CVE-2024/CVE-2024-204xx/CVE-2024-20431.json) (`2024-10-23T18:15:10.440`)
- [CVE-2024-20471](CVE-2024/CVE-2024-204xx/CVE-2024-20471.json) (`2024-10-23T18:15:10.773`)
- [CVE-2024-20472](CVE-2024/CVE-2024-204xx/CVE-2024-20472.json) (`2024-10-23T18:15:11.007`)
- [CVE-2024-20473](CVE-2024/CVE-2024-204xx/CVE-2024-20473.json) (`2024-10-23T18:15:11.280`)
- [CVE-2024-20474](CVE-2024/CVE-2024-204xx/CVE-2024-20474.json) (`2024-10-23T18:15:11.517`)
- [CVE-2024-20481](CVE-2024/CVE-2024-204xx/CVE-2024-20481.json) (`2024-10-23T18:15:11.737`)
- [CVE-2024-20482](CVE-2024/CVE-2024-204xx/CVE-2024-20482.json) (`2024-10-23T18:15:12.063`)
- [CVE-2024-20485](CVE-2024/CVE-2024-204xx/CVE-2024-20485.json) (`2024-10-23T18:15:12.273`)
- [CVE-2024-20493](CVE-2024/CVE-2024-204xx/CVE-2024-20493.json) (`2024-10-23T18:15:12.533`)
- [CVE-2024-20494](CVE-2024/CVE-2024-204xx/CVE-2024-20494.json) (`2024-10-23T18:15:12.783`)
- [CVE-2024-20495](CVE-2024/CVE-2024-204xx/CVE-2024-20495.json) (`2024-10-23T18:15:13.007`)
- [CVE-2024-20526](CVE-2024/CVE-2024-205xx/CVE-2024-20526.json) (`2024-10-23T18:15:13.303`)
- [CVE-2024-48963](CVE-2024/CVE-2024-489xx/CVE-2024-48963.json) (`2024-10-23T19:15:19.607`)
- [CVE-2024-48964](CVE-2024/CVE-2024-489xx/CVE-2024-48964.json) (`2024-10-23T19:15:19.833`)
- [CVE-2024-9949](CVE-2024/CVE-2024-99xx/CVE-2024-9949.json) (`2024-10-23T18:15:13.763`)
### CVEs modified in the last Commit
Recently modified CVEs: `57`
Recently modified CVEs: `21`
- [CVE-2024-47737](CVE-2024/CVE-2024-477xx/CVE-2024-47737.json) (`2024-10-23T17:00:01.357`)
- [CVE-2024-47739](CVE-2024/CVE-2024-477xx/CVE-2024-47739.json) (`2024-10-23T16:58:37.707`)
- [CVE-2024-47745](CVE-2024/CVE-2024-477xx/CVE-2024-47745.json) (`2024-10-23T17:25:19.657`)
- [CVE-2024-47748](CVE-2024/CVE-2024-477xx/CVE-2024-47748.json) (`2024-10-23T17:28:00.460`)
- [CVE-2024-47750](CVE-2024/CVE-2024-477xx/CVE-2024-47750.json) (`2024-10-23T17:29:01.330`)
- [CVE-2024-47751](CVE-2024/CVE-2024-477xx/CVE-2024-47751.json) (`2024-10-23T17:33:52.440`)
- [CVE-2024-48049](CVE-2024/CVE-2024-480xx/CVE-2024-48049.json) (`2024-10-23T16:12:12.127`)
- [CVE-2024-48415](CVE-2024/CVE-2024-484xx/CVE-2024-48415.json) (`2024-10-23T16:35:09.317`)
- [CVE-2024-48652](CVE-2024/CVE-2024-486xx/CVE-2024-48652.json) (`2024-10-23T16:35:10.103`)
- [CVE-2024-48656](CVE-2024/CVE-2024-486xx/CVE-2024-48656.json) (`2024-10-23T16:35:12.613`)
- [CVE-2024-48657](CVE-2024/CVE-2024-486xx/CVE-2024-48657.json) (`2024-10-23T16:35:13.890`)
- [CVE-2024-49286](CVE-2024/CVE-2024-492xx/CVE-2024-49286.json) (`2024-10-23T16:13:37.823`)
- [CVE-2024-49323](CVE-2024/CVE-2024-493xx/CVE-2024-49323.json) (`2024-10-23T16:05:49.617`)
- [CVE-2024-49328](CVE-2024/CVE-2024-493xx/CVE-2024-49328.json) (`2024-10-23T17:08:31.910`)
- [CVE-2024-49334](CVE-2024/CVE-2024-493xx/CVE-2024-49334.json) (`2024-10-23T16:08:01.277`)
- [CVE-2024-49851](CVE-2024/CVE-2024-498xx/CVE-2024-49851.json) (`2024-10-23T16:00:52.597`)
- [CVE-2024-49852](CVE-2024/CVE-2024-498xx/CVE-2024-49852.json) (`2024-10-23T16:14:01.857`)
- [CVE-2024-49853](CVE-2024/CVE-2024-498xx/CVE-2024-49853.json) (`2024-10-23T16:14:30.750`)
- [CVE-2024-49854](CVE-2024/CVE-2024-498xx/CVE-2024-49854.json) (`2024-10-23T16:29:32.857`)
- [CVE-2024-49856](CVE-2024/CVE-2024-498xx/CVE-2024-49856.json) (`2024-10-23T16:33:20.857`)
- [CVE-2024-49858](CVE-2024/CVE-2024-498xx/CVE-2024-49858.json) (`2024-10-23T16:35:10.097`)
- [CVE-2024-49860](CVE-2024/CVE-2024-498xx/CVE-2024-49860.json) (`2024-10-23T16:44:58.473`)
- [CVE-2024-49861](CVE-2024/CVE-2024-498xx/CVE-2024-49861.json) (`2024-10-23T16:48:47.573`)
- [CVE-2024-49862](CVE-2024/CVE-2024-498xx/CVE-2024-49862.json) (`2024-10-23T16:53:51.050`)
- [CVE-2024-6010](CVE-2024/CVE-2024-60xx/CVE-2024-6010.json) (`2024-10-23T16:15:10.483`)
- [CVE-2023-25696](CVE-2023/CVE-2023-256xx/CVE-2023-25696.json) (`2024-10-23T19:35:03.353`)
- [CVE-2023-52160](CVE-2023/CVE-2023-521xx/CVE-2023-52160.json) (`2024-10-23T19:34:09.370`)
- [CVE-2024-25209](CVE-2024/CVE-2024-252xx/CVE-2024-25209.json) (`2024-10-23T18:10:52.630`)
- [CVE-2024-25210](CVE-2024/CVE-2024-252xx/CVE-2024-25210.json) (`2024-10-23T18:16:34.577`)
- [CVE-2024-25211](CVE-2024/CVE-2024-252xx/CVE-2024-25211.json) (`2024-10-23T18:16:31.940`)
- [CVE-2024-25217](CVE-2024/CVE-2024-252xx/CVE-2024-25217.json) (`2024-10-23T18:08:33.577`)
- [CVE-2024-25223](CVE-2024/CVE-2024-252xx/CVE-2024-25223.json) (`2024-10-23T18:06:48.657`)
- [CVE-2024-25224](CVE-2024/CVE-2024-252xx/CVE-2024-25224.json) (`2024-10-23T18:07:49.573`)
- [CVE-2024-25225](CVE-2024/CVE-2024-252xx/CVE-2024-25225.json) (`2024-10-23T18:07:34.100`)
- [CVE-2024-25226](CVE-2024/CVE-2024-252xx/CVE-2024-25226.json) (`2024-10-23T18:05:01.290`)
- [CVE-2024-42005](CVE-2024/CVE-2024-420xx/CVE-2024-42005.json) (`2024-10-23T18:22:48.937`)
- [CVE-2024-42643](CVE-2024/CVE-2024-426xx/CVE-2024-42643.json) (`2024-10-23T18:35:01.897`)
- [CVE-2024-43577](CVE-2024/CVE-2024-435xx/CVE-2024-43577.json) (`2024-10-23T19:15:18.673`)
- [CVE-2024-44331](CVE-2024/CVE-2024-443xx/CVE-2024-44331.json) (`2024-10-23T18:35:02.893`)
- [CVE-2024-45526](CVE-2024/CVE-2024-455xx/CVE-2024-45526.json) (`2024-10-23T19:35:10.713`)
- [CVE-2024-46482](CVE-2024/CVE-2024-464xx/CVE-2024-46482.json) (`2024-10-23T18:35:03.670`)
- [CVE-2024-46483](CVE-2024/CVE-2024-464xx/CVE-2024-46483.json) (`2024-10-23T19:35:11.493`)
- [CVE-2024-47670](CVE-2024/CVE-2024-476xx/CVE-2024-47670.json) (`2024-10-23T19:16:56.403`)
- [CVE-2024-47671](CVE-2024/CVE-2024-476xx/CVE-2024-47671.json) (`2024-10-23T19:36:08.090`)
- [CVE-2024-47672](CVE-2024/CVE-2024-476xx/CVE-2024-47672.json) (`2024-10-23T19:44:08.623`)
- [CVE-2024-48644](CVE-2024/CVE-2024-486xx/CVE-2024-48644.json) (`2024-10-23T19:35:12.593`)
## Download and Usage

View File

@ -214692,7 +214692,7 @@ CVE-2023-20059,0,0,b99d0f72dcc000eb953ace65e13282c926b8d14b4c6816adcddee8cc0dd72
CVE-2023-2006,0,0,576ccd01f75cc25728924f4ed5e26d8b930bd4477bce9be56dd71bf07e1c6057,2023-08-25T15:23:55.877000
CVE-2023-20061,0,0,2ec24e7f0c8bcf98f0de0b7378a7de0b9009080959b3f6e60b70d985f8c0253b,2023-11-07T04:05:54.383000
CVE-2023-20062,0,0,74adefadccfa785110e4e05f634c8688933a1b2a514cb692712de49e45b87ba6,2023-11-07T04:05:54.797000
CVE-2023-20063,0,1,ab9aa4a035ed2a1055c8eae268aa7b6b803ad113e479a4dca4e69fb32738c3a9,2024-10-23T17:15:13.320000
CVE-2023-20063,0,0,ab9aa4a035ed2a1055c8eae268aa7b6b803ad113e479a4dca4e69fb32738c3a9,2024-10-23T17:15:13.320000
CVE-2023-20064,0,0,4fb6eea994847593a5691428054af43a79d6c56e373019f0486f9d00b0b02026,2023-11-07T04:05:55.203000
CVE-2023-20065,0,0,81430541a93df410494722673f12792a2634008c9260d929b5c39744df124b03,2024-01-25T17:15:28.263000
CVE-2023-20066,0,0,73655ff4f10fb72e4c703f3b9b74de3d4367fbe1790c14663ffdcd68bf01e548,2023-11-07T04:05:55.540000
@ -218995,7 +218995,7 @@ CVE-2023-25191,0,0,85db906bc04b5d6fc3bb6f91c549d5e5b7ee59e11d5b5bb8995020c923f11
CVE-2023-25192,0,0,408ab00a0fee17449a1dde61e3baf17726d13732731f80e617385e1174ac9859,2023-02-24T18:02:49.487000
CVE-2023-25193,0,0,bb13e9cc83390a370c88c7378b81fba62155a53b53b0c63c1f904971087b2319,2023-11-07T04:08:55.837000
CVE-2023-25194,0,0,627f7e679a8ddc56f21a88dfb8c6aecb60a2d17e15408a6ee303eea4dd09669d,2023-07-21T12:15:09.957000
CVE-2023-25195,0,1,a8806b01cd80fa4dd2e673896870ae2b778e6441ccc22f4a0c2ef09a93c3e2e5,2024-10-23T16:35:02.517000
CVE-2023-25195,0,0,a8806b01cd80fa4dd2e673896870ae2b778e6441ccc22f4a0c2ef09a93c3e2e5,2024-10-23T16:35:02.517000
CVE-2023-25196,0,0,b27797dea60d6f1ca75aaefa8c45cfe08f534c8a44f054fa68a519e6b580f255,2023-11-07T04:08:56.920000
CVE-2023-25197,0,0,36632fb9114380ab53315f939856a7cb749e1ad04cfdad6bf03eefa5abd06e25,2023-11-07T04:08:56.980000
CVE-2023-25199,0,0,d81c21d02b584034420981193f7edaddf04af66a9a34943af59142dee29ed9d2,2024-04-04T12:48:41.700000
@ -219351,7 +219351,7 @@ CVE-2023-25692,0,0,fe8ce10778331217120a3d16c6be1c4e7fe49de5460740279374417fff536
CVE-2023-25693,0,0,916c6115d79d2537f418bfc1a65c91efc6f5f6c5cc4c02ee9bbca7b14646920f,2023-11-07T04:09:07.557000
CVE-2023-25694,0,0,691788347499d8910b0fb9d838b2ec03f561930ff4f163b5d5059696a97b673c,2023-11-07T04:09:07.633000
CVE-2023-25695,0,0,37e6663510c8059f3afecc18e486b7c3b47d5b2bc1f3881e774cc51cfa3ee131,2023-11-07T04:09:08.003000
CVE-2023-25696,0,0,9ce4eb86a67471ac84ceef0c099312f367709e5e46144dc68ae4a6add731556f,2023-11-07T04:09:08.073000
CVE-2023-25696,0,1,59c620a111b2925e4d0db60ab1ca946a03d1f9eb1c487416687720f8535b1615,2024-10-23T19:35:03.353000
CVE-2023-25697,0,0,850bdc0b445737adcac3c2df5d7a1c5b49d3e27d7b30fd188b38487c111cf221,2024-07-31T20:08:06.667000
CVE-2023-25698,0,0,09d3f741592a2d751e1f39b5dcc9ec5ccc34a7da0de196ac5378bd69524d6974,2023-05-25T16:27:29.670000
CVE-2023-25699,0,0,2b97d86fa171c399b8b2276a7bb72273a6a4094537f7eac2d1488ba23e51b76b,2024-04-03T17:24:18.150000
@ -219602,7 +219602,7 @@ CVE-2023-25952,0,0,463ec8e960958d9e12aae14faa2213415ac314b7ce1af5d976a9825591309
CVE-2023-25953,0,0,5abb1a478f3e66cc9afa5420123d11a3200a4e70c29330cde9432b4b3f700576,2023-05-30T22:18:54.947000
CVE-2023-25954,0,0,a22ef5203d50fc0480af4dc4db46497b5ccc4201f195b9b49e98a817b6f6f318,2023-04-21T17:54:46.243000
CVE-2023-25955,0,0,80d69d36b96029d7d809d5f273a6bc50c18c854c06dfff1234fe75f72986346f,2023-04-18T17:27:26.637000
CVE-2023-25956,0,1,7cbec8d3007e3a7786f170ed42aca5b21d56e362307f600b262f49b4c63cff18,2024-10-23T17:35:01.983000
CVE-2023-25956,0,0,7cbec8d3007e3a7786f170ed42aca5b21d56e362307f600b262f49b4c63cff18,2024-10-23T17:35:01.983000
CVE-2023-25957,0,0,0ca1e6df774e8912df15e291f60f0dd14b565090b52716e56259ed009dc52219,2023-08-08T10:15:14.060000
CVE-2023-25958,0,0,aae7f1aa655cad32a978f018b3f1f52414803acae6045171f96d970d8d4025af,2023-05-19T18:33:11.257000
CVE-2023-2596,0,0,015265e2b8bad821041964cc8c18c77c829d110dea5f84cd58ae34ff26d6006d,2024-05-17T02:23:04.757000
@ -220045,7 +220045,7 @@ CVE-2023-26460,0,0,09bcce303e158ae83d1cec712076aaab9640ff1eeb2f35c534cde3cb3bc0a
CVE-2023-26461,0,0,1be0a9324f43155f2bc84f4b47acd382de189386f8c26789ea0fc9d0dba2ef61,2023-04-11T21:15:21.523000
CVE-2023-26462,0,0,2cf2f1856afdd0ec18a1efa4bdd036897dfc66a127a8884fc6db1913a4dbd3c2,2023-08-29T20:18:02.617000
CVE-2023-26463,0,0,f42b00e49c23551a5e7f8c420dd115c4bfcd030b1ba9301912753c51c391eba5,2023-05-17T20:15:09.867000
CVE-2023-26464,0,1,e3fb2c4b488f34926b4726d6a9388d77f363c6411723dd94fbd4b633dac9b84e,2024-10-23T17:35:02.213000
CVE-2023-26464,0,0,e3fb2c4b488f34926b4726d6a9388d77f363c6411723dd94fbd4b633dac9b84e,2024-10-23T17:35:02.213000
CVE-2023-26465,0,0,b1026679d3f1fd253202bc23565c0be069807ba2b2d1db930af089cd44f34373,2023-06-16T03:45:07.707000
CVE-2023-26466,0,0,c62f799fb6efefc9c0895a060aab3bb858acc96d0dd9ee89e9e9aa43e06b014f,2023-04-14T22:48:29.043000
CVE-2023-26467,0,0,c4a14535c41306a19a06219c1d340a2974d1f8aa6b01ef56dac17132a33d1407,2023-04-21T15:50:56.567000
@ -220553,7 +220553,7 @@ CVE-2023-27292,0,0,4b71dae87596b4225f5f80cb93749df5f440f54ccd36705b374d9d1a03a1d
CVE-2023-27293,0,0,22bf65abc3378a579cff7f5d98aa48c50981bcf4420ad0fbf693ea2aba4268df,2023-03-09T23:57:51.313000
CVE-2023-27294,0,0,77fa6c3837d4dc373bd3a6be9aa46cb2ef8cacbae5d14d5be618c3e50d4abae3,2023-03-10T00:10:31.677000
CVE-2023-27295,0,0,2b35ba9c23ec3dc889df00063b1455884aad22232738faa01bb0bf18541951d3,2023-03-04T04:02:33.297000
CVE-2023-27296,0,1,ac526d965cc9c628083bee965fb00658a7cd5ea35aeceefe70ab20d36985c2a5,2024-10-23T17:35:02.430000
CVE-2023-27296,0,0,ac526d965cc9c628083bee965fb00658a7cd5ea35aeceefe70ab20d36985c2a5,2024-10-23T17:35:02.430000
CVE-2023-27298,0,0,8bddc45578699197351b23ab0fdfb8ded3b03ac7d83cd4217eac4097302905ee,2023-11-07T04:09:53.857000
CVE-2023-2730,0,0,dd1d0188c4d0b52d9edc97402eec83c6293a8bdf8db32c0db8927e99022b2050,2023-05-22T17:20:52.117000
CVE-2023-27300,0,0,99f876ece91964344f0eebd6d8c2cb263e6e1b21447c6d7d46fcd9bc2f97ebc6,2024-10-10T21:25:40.267000
@ -220783,7 +220783,7 @@ CVE-2023-27519,0,0,a391ebab6444406e7a3b8b418ece9eed27e3ed5b38569a1f2acc3c7e30c15
CVE-2023-2752,0,0,70c18716b0ce17d99cdd18556a1bb6fc4f3b8c301b80b04f13ae0f7949ffb99a,2023-05-24T15:18:32.437000
CVE-2023-27520,0,0,88918e8309839a6b2865808731f25e8498979e76ae5bf152ea538c4d760e6f7d,2023-08-24T13:33:15.207000
CVE-2023-27521,0,0,c3df7ba417ea69981a00d0cb4344f4b4fa7ad8cd4322b50b49e89e02b97e4d6c,2023-05-30T15:40:34.467000
CVE-2023-27522,0,1,dd8d83015b05e5fd11015771b9afe5322debc065b0fc4b5cddee23f7b97b302e,2024-10-23T17:35:02.630000
CVE-2023-27522,0,0,dd8d83015b05e5fd11015771b9afe5322debc065b0fc4b5cddee23f7b97b302e,2024-10-23T17:35:02.630000
CVE-2023-27523,0,0,54a991d48921934c3a11334d86af3c71d0bb746326f91a9928585be9374afa20,2023-09-11T13:46:08.797000
CVE-2023-27524,0,0,9481033c2b05e6b4fc5490841b164d05ee8c3ac345de5a070de0a8b4f8a5800f,2024-06-10T16:22:22.223000
CVE-2023-27525,0,0,7c240a2f08571daddd8713ec5aa1af9fc0e566fe02bb68bc2d7ea66a936e76a1,2023-04-27T19:54:20.913000
@ -221477,7 +221477,7 @@ CVE-2023-28322,0,0,e6f8a76dbfdaa1843cff4928586c0e102202ae87109018408c12011fd0e73
CVE-2023-28323,0,0,45a7580f5caaf370f52fa79201231573e457be28510d4650ecf80ae2fe96b361,2023-07-10T15:55:23.607000
CVE-2023-28324,0,0,9aea6ad31e5715b0a7ecba6b2b0f7468ba0870be2dca0f7bc052bb6544030f3e,2024-09-25T13:35:00.443000
CVE-2023-28325,0,0,4fd6e0b0b7c505c2fd43504d4b63a966dc708437fb5467ce1e281a243ba9f9bf,2023-05-22T14:29:00.840000
CVE-2023-28326,0,1,a35bf3ccc9f67bc30f35b153c5d63934f968a1f7a9dac978ba51db6caba9e811,2024-10-23T16:35:03.653000
CVE-2023-28326,0,0,a35bf3ccc9f67bc30f35b153c5d63934f968a1f7a9dac978ba51db6caba9e811,2024-10-23T16:35:03.653000
CVE-2023-28327,0,0,b6f0484e5b7bfca56361e43c7bf8608f46ecfd24e3583be1082bf3cc2207865b,2023-04-29T03:12:41.973000
CVE-2023-28328,0,0,6eb97773227e91e84c59492ab717b39c114153827c4b434985b4820421f15e17,2023-05-03T14:15:33.387000
CVE-2023-28329,0,0,14bd1237be8c834d2b6903d2022400762656c030012fd364a4d4901ffcc904ce,2024-07-03T01:39:49.640000
@ -238824,12 +238824,12 @@ CVE-2023-52093,0,0,e5c1a7d2899634e3dd74877448ad2935c810be4b7cfdaa86d6e3986efd5b9
CVE-2023-52094,0,0,4fe35d686e9aaa16917fcb4e8908de19501ec3c5e058a7dadbf997f9265ab5a9,2024-01-30T17:37:53.377000
CVE-2023-52096,0,0,3cd682d37ba49f631e741015a80f522eb53ddb54c07bc448922d28093bd106ba,2024-01-04T03:38:49.740000
CVE-2023-52097,0,0,9cf324ea5c75bb0be2decd65d2aa19c1775b4f9769bf145c7f2d8323de59cc16,2024-02-20T19:50:53.960000
CVE-2023-52098,0,1,f9442dba6c2846d8e7393dfe00ce50b8971e81576d24e3dc9687ebb2827a1487,2024-10-23T16:35:05.387000
CVE-2023-52098,0,0,f9442dba6c2846d8e7393dfe00ce50b8971e81576d24e3dc9687ebb2827a1487,2024-10-23T16:35:05.387000
CVE-2023-52099,0,0,bfc9bdb68b0c7e52d9873971478dde8043179287a290b1bd09e3860d962c8154,2024-01-19T18:49:15.680000
CVE-2023-5210,0,0,e89d379a123909cad07e8ff7fc6db33d4ca483dfc688b56aafd4c18e04eafc1a,2023-12-07T20:19:07.767000
CVE-2023-52100,0,0,b6faf61b52a98fa8dbb7a75d5211da9571935ad01301b317833f2f39d7d429cf,2024-01-19T19:19:43.283000
CVE-2023-52101,0,0,3c9ff6a037b24ee13732ed793e4e2445283898e3d6528f27e79396841748398a,2024-01-19T19:29:35.453000
CVE-2023-52102,0,1,f4a47ae73fb72cdf024cc543d0248b657487918ac0d4c86190121e03d4e2e033,2024-10-23T16:35:06.720000
CVE-2023-52102,0,0,f4a47ae73fb72cdf024cc543d0248b657487918ac0d4c86190121e03d4e2e033,2024-10-23T16:35:06.720000
CVE-2023-52103,0,0,3f7edfcad72344ac9f16b265ed4d2f9946bebd5ea8149345431fb35863c0e6ca,2024-08-29T20:35:45.027000
CVE-2023-52104,0,0,f049ca940874eb58ba54cef68934d63a04e4b3378dc9ae1bb4954f25a44ee8d5,2024-01-19T19:45:11.830000
CVE-2023-52105,0,0,7fca37ca631a27b8dc8fe3b9940e54b91efedf447c5fd0587d260b590112a217,2024-08-27T16:35:04.960000
@ -238888,7 +238888,7 @@ CVE-2023-52153,0,0,8610f30de3b3ae26b18922885a0ae2aaa344e98001b8664f3e5b159222943
CVE-2023-52154,0,0,584c31e9dcb509dcf4ec6529c6b2b60f796cc6725c9995bdaa5fe8eac3b0afde,2024-08-29T20:35:45.453000
CVE-2023-52155,0,0,66b2036b8aa4b2b0821aeadedccb952fd85f88f5197038ead7aa814bc9f3095a,2024-08-14T17:35:02.300000
CVE-2023-52159,0,0,bec77c293fd7ebf7e62680f3fc4955e6930fe18607be4ec5691592c67d41ceeb,2024-03-25T14:15:09.267000
CVE-2023-52160,0,0,c093db7e7e15611138ccc3551019d7df1c0aa646781730ca0b99d5dd89206d76,2024-08-27T20:35:07.373000
CVE-2023-52160,0,1,d681b5845c0678b995a2e5dd0fb68ca43d9a2f91fb854a11ec3a8bfd082851d2,2024-10-23T19:34:09.370000
CVE-2023-52161,0,0,7435ff27094b5f516c6d4ae117b3b32a667f2734906d5b71227e934eb1b22dd4,2024-08-29T20:35:46.440000
CVE-2023-52162,0,0,1bd9338733b6c2d388fd5a0badb736e81147c7da89aba74926195068a6aea86e,2024-07-03T01:43:27.207000
CVE-2023-52168,0,0,2060585b65f263d6d67dbd4e8280988fb72cd05eaf965a48557428598a2a0937,2024-07-12T16:11:20.130000
@ -242411,8 +242411,8 @@ CVE-2024-10189,0,0,c7e7e9c9433451acc4ead77e2398a65c092c06680c0a336db7286291fd8ac
CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000
CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000
CVE-2024-10192,0,0,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000
CVE-2024-10193,0,1,b44a42fd354bbacf77f6767c189a0eddd1a8f11ea5e00dc8bb5624fa68c91f85,2024-10-23T16:16:11.837000
CVE-2024-10194,0,1,beb4695ee0759be44b5390e88d9177fecdddb4f13d71de2f923c2908ef946665,2024-10-23T16:16:49.703000
CVE-2024-10193,0,0,b44a42fd354bbacf77f6767c189a0eddd1a8f11ea5e00dc8bb5624fa68c91f85,2024-10-23T16:16:11.837000
CVE-2024-10194,0,0,beb4695ee0759be44b5390e88d9177fecdddb4f13d71de2f923c2908ef946665,2024-10-23T16:16:49.703000
CVE-2024-10195,0,0,433002dc4be76148bf0f1e8e85e5de7bd9f18de30e21fefcd1f30061067a4930,2024-10-21T17:09:45.417000
CVE-2024-10196,0,0,90b9a4c8c1bbc9cc12d3c54632ebd3a76326bf6f32219a9f3d2039a7242e607d,2024-10-23T14:15:16.843000
CVE-2024-10197,0,0,7718b3c8726b69a6cc1d39e0b2a3a9b59c3c49ee29e6d3bc5c07a1b64761daac,2024-10-23T14:14:52.420000
@ -242448,10 +242448,13 @@ CVE-2024-10288,0,0,62632d8190e731a41f6f6f95077008cfc723ce3872e777e1665c799e13844
CVE-2024-10289,0,0,70e6b8f04ff845fceee5b0c76d2707d88bce3ae7973ab8343d2bcc50274f9bd6,2024-10-23T15:12:34.673000
CVE-2024-1029,0,0,0f58435c5c731694bc563330e2e0cc48091c7d28b092c9a25a6684c410525166,2024-05-17T02:35:11.633000
CVE-2024-10290,0,0,d3e172c9c7b7b0403c392ffa2d79ecaff1aea477f009179997ba8147d4bbe88f,2024-10-23T15:15:30.110000
CVE-2024-10291,1,1,4221f9dc258e6d84993fa0f34bdeaf5dfcbfbf20fdb69558d099a0b3635f00b4,2024-10-23T16:15:04.597000
CVE-2024-10292,1,1,8f4c4ab580d9e369d7e7dd331e4604716d13ad341c8b824d3d76d119c02d65de,2024-10-23T16:15:04.943000
CVE-2024-10293,1,1,a923f6e085338d69ea2111da01f3e4f9e0b9ff921e35106d46ce0e7cea63eda3,2024-10-23T16:15:05.207000
CVE-2024-10296,1,1,6780536acb419474ab08f42f0ff74d0f3d24a7a6b50377aafc4dcdaecc7d294f,2024-10-23T17:15:13.690000
CVE-2024-10291,0,0,4221f9dc258e6d84993fa0f34bdeaf5dfcbfbf20fdb69558d099a0b3635f00b4,2024-10-23T16:15:04.597000
CVE-2024-10292,0,0,8f4c4ab580d9e369d7e7dd331e4604716d13ad341c8b824d3d76d119c02d65de,2024-10-23T16:15:04.943000
CVE-2024-10293,0,0,a923f6e085338d69ea2111da01f3e4f9e0b9ff921e35106d46ce0e7cea63eda3,2024-10-23T16:15:05.207000
CVE-2024-10296,0,0,6780536acb419474ab08f42f0ff74d0f3d24a7a6b50377aafc4dcdaecc7d294f,2024-10-23T17:15:13.690000
CVE-2024-10297,1,1,21e16b153ab50c5e76cb5a479cf3c5f080b3f490cdf8b294a5380f2a80d7bd42,2024-10-23T18:15:05.137000
CVE-2024-10298,1,1,62d5e88eb741969e4d70e673f71e4b81aab32ca793b396e4ddc4938c3dc3242a,2024-10-23T19:15:14.920000
CVE-2024-10299,1,1,6195810db7c440da4266e61e5a52ee7993d76183ab9acfe71c1ede9ba57163f7,2024-10-23T19:15:15.183000
CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884fe0,2024-05-17T02:35:11.737000
CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
@ -243495,23 +243498,23 @@ CVE-2024-20257,0,0,94e6f725ee467caadda6c4f11d4a2013bcc777b9457d0e9c013d22aaa9d3e
CVE-2024-20258,0,0,dd86e76a96b4e6a893c0c6ec61ba16ebd8778c22b6c500e3943b86dcf8fd547a,2024-07-03T01:46:01.017000
CVE-2024-20259,0,0,b030aa6453db8e20f0a04d40b0f287f88d896d1fac7ce9dc4574fc3152667686,2024-03-27T17:48:21.140000
CVE-2024-2026,0,0,ab8e0446e355058e8d457eece1c7755ea02ace0a1b5891450eaff276723ece15,2024-04-10T13:23:38.787000
CVE-2024-20260,1,1,fcb37f0d67e48ad13fc96d997ac1d8b667ae611f0f59c5f8257fc6e86d51195d,2024-10-23T17:15:13.950000
CVE-2024-20260,0,0,fcb37f0d67e48ad13fc96d997ac1d8b667ae611f0f59c5f8257fc6e86d51195d,2024-10-23T17:15:13.950000
CVE-2024-20261,0,0,5c65061910678ae58b328f6a0e37c321fe1bf57a9d47085baeb418960297a3d6,2024-05-22T18:59:20.240000
CVE-2024-20262,0,0,d20e355bf64045bb726321c22659f6c213d6a34b5f8360db4262a3c1acced6db,2024-03-13T18:15:58.530000
CVE-2024-20263,0,0,a03c106a8ca3bb4647e4caa99728a3814edbbe0073eadd982e4b8d15f1108007,2024-02-06T19:23:20.600000
CVE-2024-20264,1,1,2357b3e75809a39eb05bab14c62f333818398d9d74eabad38f9ac1e13b2fce41,2024-10-23T17:15:14.180000
CVE-2024-20264,0,0,2357b3e75809a39eb05bab14c62f333818398d9d74eabad38f9ac1e13b2fce41,2024-10-23T17:15:14.180000
CVE-2024-20265,0,0,405f08c8e7e8849163f2eb6a8e5eb3eed5d428c9d5f1700fe4a57c86124fbf2c,2024-03-27T17:48:21.140000
CVE-2024-20266,0,0,6dbb5ce45980d47bf7eb6b4f22011bf963dd46d368a6ae781e4da8879de7a610,2024-03-13T18:15:58.530000
CVE-2024-20267,0,0,49082794ba6fffb4cd0ccafc96537e8303023b31c83143a02b2c16e741876cc2,2024-03-04T22:45:43.893000
CVE-2024-20268,1,1,610169357ed86c852511ce766370727b0a7a207ecc013cac31b7a963b6e3776f,2024-10-23T17:15:14.387000
CVE-2024-20269,1,1,b47b048d7ad3d42f0af7353e5a6ae69e2eab255702995fd07ddeb4a1f8fdcf82,2024-10-23T17:15:14.610000
CVE-2024-20268,0,0,610169357ed86c852511ce766370727b0a7a207ecc013cac31b7a963b6e3776f,2024-10-23T17:15:14.387000
CVE-2024-20269,0,0,b47b048d7ad3d42f0af7353e5a6ae69e2eab255702995fd07ddeb4a1f8fdcf82,2024-10-23T17:15:14.610000
CVE-2024-2027,0,0,8a6da780f00ef83adadf5b93e79e41584ae4ce15f32aba2548f6552eaa755565,2024-04-10T13:23:38.787000
CVE-2024-20270,0,0,eb515a12dde6cc2ab0dfdeee187efe297a3536ebbda30c8e847c7138ffa84d0d,2024-02-02T16:15:54.227000
CVE-2024-20271,0,0,9bce8a64e9296ad22ee19fd2c64f9f191014f0d9052b00608129f7da079ff720,2024-03-27T17:48:21.140000
CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bbea6,2024-02-02T16:15:54.683000
CVE-2024-20273,1,1,0c64215bfe4eb31c9abc66e58dd871fd28fdf487b8b306b926a80421597ddba4,2024-10-23T17:15:14.813000
CVE-2024-20274,1,1,950d0b96fbece1c2f3bfef05d6c4375775cf3ee452aef336c926a8d179f4d16b,2024-10-23T17:15:15.027000
CVE-2024-20275,1,1,578779891302f0f473b3773444d314502c72a840f36622f8905e8ac2188d0668,2024-10-23T17:15:15.237000
CVE-2024-20273,0,0,0c64215bfe4eb31c9abc66e58dd871fd28fdf487b8b306b926a80421597ddba4,2024-10-23T17:15:14.813000
CVE-2024-20274,0,0,950d0b96fbece1c2f3bfef05d6c4375775cf3ee452aef336c926a8d179f4d16b,2024-10-23T17:15:15.027000
CVE-2024-20275,0,0,578779891302f0f473b3773444d314502c72a840f36622f8905e8ac2188d0668,2024-10-23T17:15:15.237000
CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000
CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462f58,2024-02-02T16:15:54.787000
CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000
@ -243534,11 +243537,11 @@ CVE-2024-20293,0,0,616028e08a52b8ee6918b00b66aa203f272bb9f0716f3e2ece06ab3be6eda
CVE-2024-20294,0,0,742861094e87571e845203e831bfb7a087118860ed05792647beba51da9e1c54,2024-02-29T13:49:29.390000
CVE-2024-20295,0,0,440a3fe735baf91af4ba8e7f15eaba3890b664a180f3cc6b1b84c3c2ae93a20b,2024-04-25T13:18:20.370000
CVE-2024-20296,0,0,40bbd38e07d81658299d895ad9afa6a2a8c553e04b04f72d9f3dda0ddd6b036f,2024-07-18T12:28:43.707000
CVE-2024-20297,1,1,0f0053be912b3664236ccc4bcda1386d1d47c742dd4a43a94a18427636e68e14,2024-10-23T17:15:15.437000
CVE-2024-20298,1,1,b97ac8aee03a2d8cdf5fb245fd223b7d29c21670cb9f893c39b27fbcfd9716e4,2024-10-23T17:15:15.710000
CVE-2024-20299,1,1,24900ce21bdd8f93191cf6fa90d837336fa7d1b15b835ef84f42e28122f35de7,2024-10-23T17:15:16.900000
CVE-2024-20297,0,0,0f0053be912b3664236ccc4bcda1386d1d47c742dd4a43a94a18427636e68e14,2024-10-23T17:15:15.437000
CVE-2024-20298,0,0,b97ac8aee03a2d8cdf5fb245fd223b7d29c21670cb9f893c39b27fbcfd9716e4,2024-10-23T17:15:15.710000
CVE-2024-20299,0,0,24900ce21bdd8f93191cf6fa90d837336fa7d1b15b835ef84f42e28122f35de7,2024-10-23T17:15:16.900000
CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bbc1,2024-03-13T18:15:58.530000
CVE-2024-20300,1,1,c66314da7d9b6a86aad3725cb29f811511b90e46cad89ddd9b0064e7de385fa2,2024-10-23T17:15:17.253000
CVE-2024-20300,0,0,c66314da7d9b6a86aad3725cb29f811511b90e46cad89ddd9b0064e7de385fa2,2024-10-23T17:15:17.253000
CVE-2024-20301,0,0,ee58125f54e59b57e5b1ea49a524ecc5e7feeaab3c308ff448cca9b61624ff41,2024-03-07T13:52:27.110000
CVE-2024-20302,0,0,bb282df08e1d4adc1029a76ce336553cafd173c3d92914cdfd5b12151cc62afc,2024-04-03T17:24:18.150000
CVE-2024-20303,0,0,393665d251452d2f76b8a508b1c314e9e2878d06110c2d34091d44dcf2cc0a6d,2024-03-27T17:48:21.140000
@ -243569,10 +243572,10 @@ CVE-2024-20325,0,0,54ea99e12b48a3199864bbc6b8e057b2420390f797e4ed26add8a6233c894
CVE-2024-20326,0,0,fc15c10256dd5a166a1027ec5ae4c1e91a980e0789f9cd1c71ded8bffcb2bc99,2024-07-03T01:46:03.803000
CVE-2024-20327,0,0,2a507e36cc296b47cc299425ea02720eb37cb46ee21e1b819fdbd44ab608c928,2024-03-13T18:15:58.530000
CVE-2024-20328,0,0,e64c0687495a40f9ecee0bb3a778a786de8f7c2c3bc47f7e8f9d7cb2e2feaa92,2024-03-01T22:22:25.913000
CVE-2024-20329,1,1,ef5df26e7e4b9742ae0cf4cf5c97eb40260f80cf774a90d4fa3092d9f3cec47c,2024-10-23T17:15:17.457000
CVE-2024-20329,0,0,ef5df26e7e4b9742ae0cf4cf5c97eb40260f80cf774a90d4fa3092d9f3cec47c,2024-10-23T17:15:17.457000
CVE-2024-2033,0,0,892e4525fdc9a24c67717f6bae7974a0431189616f9c08a3ecfab5a122c6fa8c,2024-04-10T13:23:38.787000
CVE-2024-20330,1,1,2d3b2922aec6a9959bea7dabaf3ff76b0b64f3efe31df18e8de347255df5714c,2024-10-23T17:15:17.663000
CVE-2024-20331,1,1,18751d407b8dd996f1299d2719f669982b9bb52ce42afbfe58a6411d8fa9338b,2024-10-23T17:15:17.870000
CVE-2024-20330,0,0,2d3b2922aec6a9959bea7dabaf3ff76b0b64f3efe31df18e8de347255df5714c,2024-10-23T17:15:17.663000
CVE-2024-20331,0,0,18751d407b8dd996f1299d2719f669982b9bb52ce42afbfe58a6411d8fa9338b,2024-10-23T17:15:17.870000
CVE-2024-20332,0,0,26f138359eebae9b93dd534c37bd2e0eadd8f2090b9372a1604e6dbd4d4b38f8,2024-04-03T17:24:18.150000
CVE-2024-20333,0,0,a9cf37f279014aaeb1b44ced238e2455395f4982508f682aac206cd9791404fd,2024-03-27T17:48:21.140000
CVE-2024-20334,0,0,e33ad74f302c1a5c76e2802518dc9baee72b2876d58eb107a37b467217796798,2024-04-03T17:24:18.150000
@ -243580,10 +243583,10 @@ CVE-2024-20335,0,0,3ae82e4e51ce7dc67e890bbf3242dddc369bcec5a9c67ccb96545dde173de
CVE-2024-20336,0,0,7da9174c756054acc761610c3354924a4d132dd65f90fcdc8e0995c2dbe104c8,2024-03-07T13:52:27.110000
CVE-2024-20337,0,0,a7c8d58b2276bc115bd59fc582b798a8fadaf5ed39ee4effba6490a0740366a8,2024-03-07T13:52:27.110000
CVE-2024-20338,0,0,510c65881ff77bd5a9b4264c80e30939b8e2e91bda87ae599bea8187a8352e74,2024-03-07T13:52:27.110000
CVE-2024-20339,1,1,f12c9cf009910af4d0bf2f5be029740c4563e5a469e2dc2f4d11d5aee3aea487,2024-10-23T17:15:18.097000
CVE-2024-20340,1,1,d3781a696f0c0fdc55b72c9908f8b4d0dd4e40f8816b825663f4c84408114855,2024-10-23T17:15:18.300000
CVE-2024-20341,1,1,4ad595ee4427ba9567e3ee88bb4614efb5f062252ceb15c8768aa4e7dda27877,2024-10-23T17:15:18.493000
CVE-2024-20342,1,1,5b1f544948e8a6e10625a4bcf7d61eb4b8bd5d1f17dcaed02adeefa8d3bda791,2024-10-23T17:15:18.703000
CVE-2024-20339,0,0,f12c9cf009910af4d0bf2f5be029740c4563e5a469e2dc2f4d11d5aee3aea487,2024-10-23T17:15:18.097000
CVE-2024-20340,0,0,d3781a696f0c0fdc55b72c9908f8b4d0dd4e40f8816b825663f4c84408114855,2024-10-23T17:15:18.300000
CVE-2024-20341,0,0,4ad595ee4427ba9567e3ee88bb4614efb5f062252ceb15c8768aa4e7dda27877,2024-10-23T17:15:18.493000
CVE-2024-20342,0,0,5b1f544948e8a6e10625a4bcf7d61eb4b8bd5d1f17dcaed02adeefa8d3bda791,2024-10-23T17:15:18.703000
CVE-2024-20343,0,0,7c9d164f9ec94ab3681a2158dfc37a563399321d4ad394ceb86611456e6f03d7,2024-10-07T17:42:40.777000
CVE-2024-20344,0,0,0c95d8c456a266581d87105f2300bfe021552d9f4a6b780624736cdaf9bbf776,2024-02-29T13:49:29.390000
CVE-2024-20345,0,0,e5a5f742b4ff4031a273ec9fe2b2ad050940d29d6b880414ea07f31d237eeb39,2024-03-07T13:52:27.110000
@ -243592,7 +243595,7 @@ CVE-2024-20347,0,0,b7a6ed5ce0c3cf37e0f41269507973b9ad509f6fe22a9ad105d991e5f0ee5
CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000
CVE-2024-2035,0,0,216279b16f620c2ff4b0a8961dd1dd14e0bafebc256a395c018effc533e0c28d,2024-10-11T14:20:05.590000
CVE-2024-20350,0,0,a12c7038f7859e98d5699951ee7006a12ff1675d76aabb6f00e8b49b9f735c1a,2024-09-26T13:32:02.803000
CVE-2024-20351,1,1,49340f90a7e434ea63384eaa71854418893ac3bbb77be8f8ccb27d63b516bbf3,2024-10-23T17:15:18.913000
CVE-2024-20351,0,0,49340f90a7e434ea63384eaa71854418893ac3bbb77be8f8ccb27d63b516bbf3,2024-10-23T17:15:18.913000
CVE-2024-20352,0,0,b6df069392724fdc834a80403afd09f590785680a76232df596c3f6fea90f0b6,2024-04-03T17:24:18.150000
CVE-2024-20353,0,0,e2f72ffa3936c97cc6267050a0bce7d53259a8a25c98d8322d782dc399b18d7e,2024-04-26T15:22:27.803000
CVE-2024-20354,0,0,2b17296c0b4719e35a35904483c6c06073bfa6005008b3509f848c7bb9f4faf5,2024-03-27T17:48:21.140000
@ -243606,19 +243609,30 @@ CVE-2024-20360,0,0,b9376885f3bd33f8b376cfcd9d1a4c2997937c1a075603d8638d862812d3e
CVE-2024-20361,0,0,8fc8c6bd1287a52550fd38650e66a5006a20e7eae1aa8f8c99b728af1c48ddd5,2024-05-22T18:59:20.240000
CVE-2024-20362,0,0,0fe85dbbc396fc356835f570820efb6142358d26355d59753469b06ab8b1d26f,2024-04-03T17:24:18.150000
CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000
CVE-2024-20364,1,1,53e19904c9e0d94b7a4802511c05ec5eafd79488f2c0b268be0f80cfc187164d,2024-10-23T18:15:05.427000
CVE-2024-20365,0,0,b941e81c62a5622fb3207cd284578983abbf20cf62d6c3be738ab76890047c8c,2024-10-08T14:28:42.727000
CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f48f,2024-05-15T18:35:11.453000
CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000
CVE-2024-20368,0,0,11ba77e6ca928b43fcf33bd9b64c67655ca382b15bfec85a328bbca787a43cf3,2024-04-03T17:24:18.150000
CVE-2024-20369,0,0,e23910e4adf6ac7fe444b246c85eb12e2e56e7b12054f1339b9256c8ec4ec112,2024-05-15T18:35:11.453000
CVE-2024-20370,1,1,e17f06dab842aafa4eb25216b3afbdf725e8401dde85d330c6bf3cd3dc279393,2024-10-23T18:15:05.637000
CVE-2024-20372,1,1,083a72f953ca2d824008d9e66807a6c80e336d49075ae5aa3dc58f95ce280a9b,2024-10-23T18:15:05.863000
CVE-2024-20374,1,1,91b2ce8a99789e3e6ba9fe42f419cc89f03cf74f27f8086d871ae5080005d729,2024-10-23T18:15:06.100000
CVE-2024-20375,0,0,a4ae364a987d406a5046b71b718fe2e5ce4da208cd9db67ac24eb19997b1276b,2024-08-21T17:24:59.627000
CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc478,2024-05-01T19:50:25.633000
CVE-2024-20377,1,1,6e4dc4a45da877257b356117e0e47304b23333c92ece0717a36cc60353e8113c,2024-10-23T18:15:06.327000
CVE-2024-20378,0,0,1d0c211142ee7b64cb979c7d6fe81a8dda4cc3d613763c0904f9ebf5643e5461,2024-05-01T19:50:25.633000
CVE-2024-20379,1,1,94b044f9dc079108b4ce7c03f84a8a93273b2af1b15545c7829d5d3e65871c51,2024-10-23T18:15:06.553000
CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0ec,2024-05-24T01:15:30.977000
CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000
CVE-2024-20381,0,0,5afd1f58e322b631892fd0b679ab12e22dc7593190ff9ffdf30dc24fabdc730b,2024-10-08T21:43:28.757000
CVE-2024-20382,1,1,9c4240ac4ccb3a36d448c31cb4a230e7b1b476e8c2c2ecfd509f2219352ce477,2024-10-23T18:15:06.780000
CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000
CVE-2024-20384,1,1,58f09ed3191e76c521d3535894d5ace5a044a3f198e6037195fa6d2ce5a3bd93,2024-10-23T18:15:07.030000
CVE-2024-20385,0,0,acb41bb9b0e8de27149b5546043f469887d2173135754c6ef5f9970c450eec9d,2024-10-08T14:22:34.120000
CVE-2024-20386,1,1,0c0984c652b5711f67cf28af8db71b168906c2b795c12c350d90f9b2c6a625e5,2024-10-23T18:15:07.257000
CVE-2024-20387,1,1,27143a3b9fc5ddde4b47171d9ada6f0bfeea9d36e048a90421af3e635a6b4d9d,2024-10-23T18:15:07.480000
CVE-2024-20388,1,1,6b70fa570c6267413ccb4b09ab0209e11e75f4e65458cd5591c4c499b6d4f2eb,2024-10-23T18:15:07.697000
CVE-2024-20389,0,0,9d9dfa82add773af2318fea3c227cdb315f4c8df4ee8e66f868a7095c866fa43,2024-05-16T15:44:44.683000
CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000
CVE-2024-20390,0,0,7596f8a252957b7a86b18b13b44a3f994e7e9bd3a3934d5a22e0cf6b5c4165f3,2024-10-07T17:51:37.197000
@ -243633,22 +243647,33 @@ CVE-2024-20399,0,0,164174c543ab6ae29aa0171daa283df0ddb65a3fecfd5ef8bf748eebe57b6
CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000
CVE-2024-20400,0,0,e22f5359b4eae3d1123c96473d077f1ed8cfcffe9256c923e22249fabd71dd12,2024-07-18T12:28:43.707000
CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002753,2024-07-18T12:28:43.707000
CVE-2024-20402,1,1,60133d71f30bcf4e3ad530c1d8460057e794aeeda4fa4bf24216494d038441b3,2024-10-23T18:15:07.930000
CVE-2024-20403,1,1,05685ccbfd2eba3eb3b33053a1870911f5bb7d9c6bd131c8a011f640f20030ed,2024-10-23T18:15:08.193000
CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
CVE-2024-20406,0,0,7d60bf0d9d6961c2b6b66dc82a40eb5c60b9f8634630e4f8bc14ebf8ca20093e,2024-10-07T17:56:43.103000
CVE-2024-20407,1,1,a2953b74cedac4344a7884b9bd2c46dc5877f9a6b032e65275134515de973dad,2024-10-23T18:15:08.413000
CVE-2024-20408,1,1,0354a7c0be1805929a7d16876d6724d613b7c00f95222a5d5c93d7dff338127a,2024-10-23T18:15:08.697000
CVE-2024-20409,1,1,4f85793aa90ebd008f9180a2ea8bd0ecd294622d43d399c42ca210e9bab6f432,2024-10-23T18:15:08.970000
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
CVE-2024-20410,1,1,ab2a7f36feb02c2a8cb37c790377914d7e8c4c68030f03ac6ffa64ad1c15c5ac,2024-10-23T18:15:09.197000
CVE-2024-20411,0,0,4f003e5090f28bf95bd35a4fbdae5180d9a8ba20c425549807eec3131f67ce95,2024-08-29T13:25:27.537000
CVE-2024-20412,1,1,0c3ce6f8afa2291828e9a587cb220d8ad5b79ecf993dcfb7bb6ccfe8c8f136b6,2024-10-23T18:15:09.430000
CVE-2024-20413,0,0,eef91fa550f9bdcbf9b050eb11a257fdd75cd91f9c74286f67575b2cf9d8093e,2024-08-29T13:25:27.537000
CVE-2024-20414,0,0,18adcabc3ea83c021e3e42e80805abb0da254bdf76c23740c5471d9c9fa12ab4,2024-10-02T20:02:22.740000
CVE-2024-20415,1,1,b94f136f4175c9ce84789a2c17769eeb98b1b8f85f003c58e52d9c56b2dcfe58,2024-10-23T18:15:09.713000
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
CVE-2024-20420,0,0,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000
CVE-2024-20421,0,0,b8d90bf4638dbe0c37023b3ff1bd11c5ac7ded44281786691979af6c9dbb0983,2024-10-22T17:51:08.113000
CVE-2024-20424,1,1,3cb1ac75a498d4dbd7bfac5cf8fa5dbdec073bae9c2cdfa4d469becb7492a462,2024-10-23T18:15:09.930000
CVE-2024-20426,1,1,593f7fc6877e97c3095b4f074b5375f35e9b1312c49cf610dee00295e7e22832,2024-10-23T18:15:10.147000
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000
CVE-2024-20431,1,1,d98ed39aa58ca2a199f6cf94d07363107f0f718f064440b900ffbd7bad0a347d,2024-10-23T18:15:10.440000
CVE-2024-20432,0,0,7fd746c387447b9ece17aaab52e949ef84dfd8dfcd9de8216b6df6b205f1574f,2024-10-08T14:10:35.317000
CVE-2024-20433,0,0,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bce20,2024-10-03T13:34:37.547000
CVE-2024-20434,0,0,904368830c218856dc09e88c749c79a929855ae5c25f03306a83a7691e310e6c,2024-10-08T16:20:30.933000
@ -243685,13 +243710,20 @@ CVE-2024-20467,0,0,c1af58980ccad99499fcb95639264b5a0614f69936f5a7ffc5edb35f8fbf6
CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
CVE-2024-20470,0,0,f40c5f3d443e730674f42085e42ea8d2de51e3f4830b15dca54c9f67812afae9,2024-10-09T16:55:23.887000
CVE-2024-20471,1,1,6af2de359d64426abda8c5ecf7a2f6fac81d32aba2d81a87c414b825931d6b2d,2024-10-23T18:15:10.773000
CVE-2024-20472,1,1,bdc5c52fb0474740ab8303919c88230f31e097520bd6557ce8365054e69fa6ee,2024-10-23T18:15:11.007000
CVE-2024-20473,1,1,fa29d6dbacdc64f0c1ac8b38950b4beedbf4361353838b488e1d931dd2618066,2024-10-23T18:15:11.280000
CVE-2024-20474,1,1,1526abcb15aa524acfb7a6c2824a2d55dd1ee57351070ff6a84bd540013cfcb8,2024-10-23T18:15:11.517000
CVE-2024-20475,0,0,3f291467cc737decf2fac9adb4dea13bddd59923e910f2a0d4abb07dc30557b9,2024-10-03T17:49:17.797000
CVE-2024-20477,0,0,546baafd3f9cb181a62a5bf8f2d6a935693c1d9566bac043856053043d6e851c,2024-10-08T16:00:30.167000
CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611029,2024-08-29T13:25:27.537000
CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
CVE-2024-20480,0,0,1929c3dc705e1e48392e67050891180fdb659aa9ab6d1d255c10d5b0e58c773c,2024-10-03T20:07:33.900000
CVE-2024-20481,1,1,b62955fb190ed786dd124dfc5a9bb8b8ac45c1667eb04c2d4b7906348f68d84d,2024-10-23T18:15:11.737000
CVE-2024-20482,1,1,4e9e2d047418217629e6536e3facec9d517fc08e2d0091ccd73aa8ec445bca2a,2024-10-23T18:15:12.063000
CVE-2024-20483,0,0,7bbf4d5b1e3697b5bad7f81531333e630361007007985921b04d8f51e2bedc77,2024-10-03T01:44:17.827000
CVE-2024-20485,1,1,e20fbea5c2873101d5a1ba041773570d1e3a6ca1eeb59eb55f296172b87929d1,2024-10-23T18:15:12.273000
CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000
CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000
CVE-2024-20489,0,0,d68cce5506ad42f67e500e952ef8846db91b43a7e51bd083fc776681145c15d8,2024-10-03T01:40:11.637000
@ -243699,6 +243731,9 @@ CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b
CVE-2024-20490,0,0,35fe5d8ca4a68248677c43c34084b321931d0d2945ab4df4da8782f5e23eb605,2024-10-08T15:15:39.160000
CVE-2024-20491,0,0,a6a1b451f6dda658d800035b80719f5bd0d6502321ff1f094bbee2194c64d03b,2024-10-08T15:55:08.933000
CVE-2024-20492,0,0,2a16b24462714ef70d9e342f3dfc09a86ef4cf713f3ed6d37bd4c4f35d4f0135,2024-10-08T16:07:26.280000
CVE-2024-20493,1,1,7db4eaa7af6126ed4826b14736fa5386fd532ae0b5c91a9a1a6bf155a57fed06,2024-10-23T18:15:12.533000
CVE-2024-20494,1,1,f8a26e99e1efb1f6312688084f8eef4516e1e10bf0eede404bf0c418cba250a5,2024-10-23T18:15:12.783000
CVE-2024-20495,1,1,036002374c3b88a9a021999f059971039cf026e5a414bbc25a243eee2c026631,2024-10-23T18:15:13.007000
CVE-2024-20496,0,0,127f60097f974f24aadc62900a388547cdf18c3a62d9e6416696d085e67625df,2024-09-26T13:32:02.803000
CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000
CVE-2024-20498,0,0,f163bbceccccd5135efcc240b318bf6f09c1a57795ce60620399b214d4e300ea,2024-10-08T18:32:54.457000
@ -243727,6 +243762,7 @@ CVE-2024-20521,0,0,1256f22cccdc014ca7c6dcaf50cda0cfa20b26ee2ae968d316f808a9bafa0
CVE-2024-20522,0,0,4751fc0b46eb3f3442a4302d9aa0da06e525e7320f0f9f33ce2b1091dde97b23,2024-10-08T13:48:19.060000
CVE-2024-20523,0,0,c7bf45998c89086dd758eb4d3eeb25d63406d90c0a145566280d2888a4fab120,2024-10-08T13:48:29.500000
CVE-2024-20524,0,0,1ddae342fccf4faf6880cbe25cc035c1903428edec9e63909e1d89933e06b31e,2024-10-08T13:48:58.273000
CVE-2024-20526,1,1,015e035bdcefa7dd41ccce19d529f68aa0ca4c90da5d8202abaf33b8011a6499,2024-10-23T18:15:13.303000
CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000
CVE-2024-2055,0,0,07b933beaff1c6c6636c1d85ffcd111ff83285195075526678d7cb747831ae01,2024-08-26T16:35:08.047000
@ -245258,7 +245294,7 @@ CVE-2024-2232,0,0,eb55e6d1211c43c7498854b3b8820fe2f01b88d448661718d29c577fdabad9
CVE-2024-22320,0,0,ec85534fc104e628cf2f58dee5a98a0a436bfe75ddbc94f8841f4752e5e01ce2,2024-03-21T02:52:02.607000
CVE-2024-22326,0,0,0b9083c74a3b6261928ae256538efe0ffc9696087bfcb2cd57b40a111b96cf5d,2024-10-15T19:51:10.393000
CVE-2024-22328,0,0,a39f02e34baf95d793f8f0fc19cf685bee17730011f4e69feb7fe01d897a8992,2024-04-08T18:48:40.217000
CVE-2024-22329,0,1,a26fcaebd7c684f01199e2a26d0c180c47a076077aaf7657b6c0685c38639e05,2024-10-23T16:15:05.493000
CVE-2024-22329,0,0,a26fcaebd7c684f01199e2a26d0c180c47a076077aaf7657b6c0685c38639e05,2024-10-23T16:15:05.493000
CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000
CVE-2024-22331,0,0,d490fba89e7f88683c136dfcfc87c9cff8ad31b547c7cdf5425991357b2dcb7b,2024-02-13T20:26:23.780000
CVE-2024-22332,0,0,638d06450f89d191258df8fe36d1620abd0564acdb0d8f1f383caf127d6d43b9,2024-04-03T02:15:07.973000
@ -247122,26 +247158,26 @@ CVE-2024-25201,0,0,4fdcb35250323e572813a693d6853c3ef4ab83f766da9aed4664bbcb27b57
CVE-2024-25202,0,0,9adfc980042282b2282c5de366e0faab584a67a356cb2bc8d9fefc993344243a,2024-08-01T13:47:35.900000
CVE-2024-25207,0,0,ec83a3d2fdfbcc8587a8c698a4db83963fe7b272fef5e645520fca4923aa1dac,2024-02-15T06:26:56.397000
CVE-2024-25208,0,0,f36b1a6d7aae28307bb7793a95052fac69e54ce6608a781b44e351b5e3bee7f4,2024-08-01T13:47:36.680000
CVE-2024-25209,0,0,d5a869bb410fd2403b975aa6acf4c48509a1d388c3696e8d5965ba3440b96129,2024-02-14T16:13:16.563000
CVE-2024-25209,0,1,b1f6e3cb76f55767067781f1fa474868eaee82b51b5724ac518a7dae1856da97,2024-10-23T18:10:52.630000
CVE-2024-2521,0,0,0838497f1916a708252295ddb1e5512e6c3ac757ef93b04ae3f403784c7490e3,2024-05-17T02:38:16.787000
CVE-2024-25210,0,0,dd28b2c6cb9a88a5b91c68f6ad7360de203218fb8e2273a408f42a17c2d3394b,2024-02-14T16:13:16.563000
CVE-2024-25211,0,0,f0c0cc0b75a85bd287956104006e6509dabb58e126ecbb91e5dbba932e52990a,2024-02-14T16:13:16.563000
CVE-2024-25210,0,1,e2236a1ca9a28c613c58f91408c4689148114b702761c3d9e2b9b93ca58582e6,2024-10-23T18:16:34.577000
CVE-2024-25211,0,1,9b81b7a573fcda1b42e078eda6a072273266dba8db71d1e7cb852fa7a214936a,2024-10-23T18:16:31.940000
CVE-2024-25212,0,0,2f511dbe53dda725f1026e6fb3684ad3dcdbb4e3a9bf4b3999eacf1d7a2579a0,2024-08-28T20:35:07.213000
CVE-2024-25213,0,0,c54ec18894af4a5d6ced7000bcaa8c487846e8fcbfc5321ba8aad242a58f22d8,2024-02-15T06:27:20.520000
CVE-2024-25214,0,0,1ba8af84b5d311dbb39674bae13cefbf6d7fcb4d9ffa5558f51b66ae2fef5be2,2024-08-16T20:35:06.060000
CVE-2024-25215,0,0,3b37a94df90b65e7417dee74161c3b1b221d93df92a185b49be1c5811fcd762a,2024-02-15T06:27:41.287000
CVE-2024-25216,0,0,11c4d54de29132b318d8fac4cf2638f23334598861bfc6052b13658ed431e101,2024-02-15T06:27:52.447000
CVE-2024-25217,0,0,52fe646ffd496a2f65172db7d33af9d3eec0a14bd40e1d04a6a9369af2712a81,2024-02-14T16:13:16.563000
CVE-2024-25217,0,1,b12c0a70895784380388972b1e6d209bac8636e8e59753bf100055ee92d5fc1b,2024-10-23T18:08:33.577000
CVE-2024-25218,0,0,24ef98e1bccb157a2451c5f9b220886a7fb0241b266eff1652e4e6ac16c1f097,2024-02-16T19:45:37.420000
CVE-2024-25219,0,0,2b14c2a937dde787f169ebecefb0773ff2a33faa5372ec5d4d94840140008c7f,2024-08-01T13:47:37.463000
CVE-2024-2522,0,0,b1904c746f2168a450105eeee7c6ec024878645f7c80803e5354174d41069fb1,2024-05-17T02:38:16.867000
CVE-2024-25220,0,0,daa59dcd9ece57f6686d3daab3ad1c6bf87173bccf0e7b0d45f22f663c276cc6,2024-02-16T19:34:51.807000
CVE-2024-25221,0,0,836a2ef30482eb3c912fcb2ea8423f311ca51ef1df402038f46280db854b0fca,2024-02-16T19:33:17.330000
CVE-2024-25222,0,0,b478769e227f88ae785ae926f36de4c67ad090de60d1c993e61fb1a7c9115dcf,2024-08-16T19:35:05.500000
CVE-2024-25223,0,0,3e39c49b724876e00263d5c225f568a8aafd2599510d70f37ee0ffbc58ef8514,2024-02-14T16:13:16.563000
CVE-2024-25224,0,0,0e4ddbf17b2f3af4e8b711f013d1013327bc88045b288484b1d39a1b2997457c,2024-02-14T16:13:16.563000
CVE-2024-25225,0,0,ed276bea7fdcfb9ccf74e725f090230c14b88b21dd39318c1cfb47c52c367cfd,2024-02-14T16:13:16.563000
CVE-2024-25226,0,0,a94a8e1788c862ef58b0ed2eb46de6a558b42d7d9a21f41527b53f293afa362b,2024-02-14T16:13:16.563000
CVE-2024-25223,0,1,5d6cacf2b13647324dfa76310a55aaf8e1884b61852ade33cb69a8edc8d7c837,2024-10-23T18:06:48.657000
CVE-2024-25224,0,1,b2669ebf3135683eb85c1805f64ddfb5a30c91a61ee983f1c2767c163a7cb404,2024-10-23T18:07:49.573000
CVE-2024-25225,0,1,f66ea50e2f5c6fabf8cab20ca33e7d24f86fcb5d5bda0fe98505e1caf9a4ba36,2024-10-23T18:07:34.100000
CVE-2024-25226,0,1,97f7b16f186ea0179a22a0c87da3f54d3414f8a1469856acbaf9c5340044a008,2024-10-23T18:05:01.290000
CVE-2024-25227,0,0,ea5530dbbdd5c3d6d19d0f04e703afa5a7f7647312c2414a8b6eea3327fe905b,2024-03-15T12:53:06.423000
CVE-2024-25228,0,0,3af3abe7eded0e11771171c4cdbd8c63732731a741dfc258ccf129037aa6c61d,2024-08-26T21:35:07.760000
CVE-2024-2523,0,0,e99f827828881b6023c3d0b03cc5186561dec89c809d2a0b1bf23b937570e859,2024-05-17T02:38:16.957000
@ -248032,7 +248068,7 @@ CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba007956
CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000
CVE-2024-2651,0,0,deae8674d69402627d10f964604ef39b1dc02d308e0346f206cd12e33908ca51,2024-10-03T07:15:30.030000
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
CVE-2024-26519,0,1,d399f89cf16e716d8efdce5dcb6cfd10331360e5248d0edfbf32c2b0f97facf1,2024-10-23T17:35:03.570000
CVE-2024-26519,0,0,d399f89cf16e716d8efdce5dcb6cfd10331360e5248d0edfbf32c2b0f97facf1,2024-10-23T17:35:03.570000
CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000
CVE-2024-26521,0,0,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000
CVE-2024-26529,0,0,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000
@ -250750,7 +250786,7 @@ CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f57
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
CVE-2024-30122,0,0,7f99b857c9a2e4fa501efea0d5e828571448ebeb675ef96bce92bb002f2beb46,2024-10-23T15:15:30.390000
CVE-2024-30124,1,1,3e72aa8cd82102d3f19d5510f084e3089df5e840b24de40000f61cfaecb728ff,2024-10-23T16:15:05.667000
CVE-2024-30124,0,0,3e72aa8cd82102d3f19d5510f084e3089df5e840b24de40000f61cfaecb728ff,2024-10-23T16:15:05.667000
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000
CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e7b5,2024-09-26T13:32:02.803000
@ -251420,7 +251456,7 @@ CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca
CVE-2024-3102,0,0,9ab659046e55d9ecd56e44281bca18746bc15afba53539e701a3b46145b5c936,2024-10-22T14:26:30.447000
CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000
CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000
CVE-2024-31029,0,1,f794c293631261937654515790ec5ca976aef60dadef09c8a4b3cafec33b0ea9,2024-10-23T17:35:04.327000
CVE-2024-31029,0,0,f794c293631261937654515790ec5ca976aef60dadef09c8a4b3cafec33b0ea9,2024-10-23T17:35:04.327000
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000
CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000
@ -257963,8 +257999,8 @@ CVE-2024-40486,0,0,4cd2f281e08f3291d37d3a4823af93070215d87d687ca41653f1c72ca427a
CVE-2024-40487,0,0,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000
CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553bbf,2024-08-13T01:13:53.230000
CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000
CVE-2024-40493,0,1,3bc280cc490a2ad40b207182dbb218bcfe50ed3c364fef5a0b9179bdf888cd2f,2024-10-23T16:35:08.327000
CVE-2024-40494,0,1,48a84fe0e443f816c7deb1ffb2fa8d49462b96b77d70d281cb18dcbf2a2ebfcd,2024-10-23T17:35:05.100000
CVE-2024-40493,0,0,3bc280cc490a2ad40b207182dbb218bcfe50ed3c364fef5a0b9179bdf888cd2f,2024-10-23T16:35:08.327000
CVE-2024-40494,0,0,48a84fe0e443f816c7deb1ffb2fa8d49462b96b77d70d281cb18dcbf2a2ebfcd,2024-10-23T17:35:05.100000
CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000
CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000
CVE-2024-40500,0,0,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d9db,2024-08-21T16:05:32.603000
@ -258964,7 +259000,7 @@ CVE-2024-41997,0,0,84a3f0ea395077fa02b4a334ab8509ff391bef43bdcea38ddd875b5794f83
CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
CVE-2024-42005,0,0,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000
CVE-2024-42005,0,1,6e7acd676fdd0820d0ef383abbd9c31b747692d4d747e9756762f959c9b515e9,2024-10-23T18:22:48.937000
CVE-2024-42006,0,0,cac16dcebbdfd7db60164c8c9c083b31913f86e474f6e93c1530c3119039cdca,2024-08-21T13:26:54.577000
CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000
CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e2c4,2024-09-06T21:48:31.597000
@ -259478,7 +259514,7 @@ CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c3
CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000
CVE-2024-42640,0,0,aa9fdc0f8db2e7e48ae8090075d403a2f9c88e4c7abd16509bc27a944cdc3dcd,2024-10-15T17:35:04.623000
CVE-2024-42642,0,0,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000
CVE-2024-42643,0,0,021d70a76409d4143f9037f029c526c4fb401b0dda4433b26f06d4a6991e3f9e,2024-10-23T15:12:34.673000
CVE-2024-42643,0,1,bc822a6b73ba664d99782bb83e8cc157e110a7a6a996980d55e1c973153f8531,2024-10-23T18:35:01.897000
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
CVE-2024-42657,0,0,7a9e5456dd66d94be3a75e811d67a1de5788317e788930f1ba2e8b5887d23144,2024-08-20T16:13:12.413000
CVE-2024-42658,0,0,54060235edd9bcf5ce68f6b48efde0940a62552fb8b9f2dcc8d06d163b4ded88,2024-08-20T16:12:50.290000
@ -260043,7 +260079,7 @@ CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756
CVE-2024-43574,0,0,27cb32f4bd91a68a1d79359c4fa56d2ab297703b1b8d3a2c872a415c852b6007,2024-10-17T18:58:37.100000
CVE-2024-43575,0,0,24f2c5a591586cc897a2d8a6a2db6f48b0fde505b74f11c59d7d9cf153abc125,2024-10-16T21:53:59.407000
CVE-2024-43576,0,0,fe1fcad43644aa438f5b12fd73a64989a355f1461202f1bc35d3359c0344ca8c,2024-10-16T21:54:24.047000
CVE-2024-43577,0,0,9c001169f8d29d26d0d5c95cdd133d9ce3de19c6716ab9be96916c0c8c8f1d05,2024-10-21T17:10:22.857000
CVE-2024-43577,0,1,9ad14dcefbd030fa0688c88dbbfc5058326bcc0356d042cfd158d58c49892f41,2024-10-23T19:15:18.673000
CVE-2024-43578,0,0,6e078fa937e90c65f5f983f7a227c4832334de65ca7467e3741fe920a590572e,2024-10-18T16:59:29.557000
CVE-2024-43579,0,0,75408e79b417f23da70191f7a80539f890575fc25e973282afc3f46a6611c497,2024-10-18T16:54:06.810000
CVE-2024-4358,0,0,947921f329844fe043b805245fd7e3c28f7c0f168bb436200605d302b39b1665,2024-06-14T17:59:33.993000
@ -260501,7 +260537,7 @@ CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c7109
CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000
CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000
CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000
CVE-2024-44331,0,0,598c01d980cf0f1c91e7287a2a8238a45c252270701e9a14115ae5190303492a,2024-10-23T15:12:34.673000
CVE-2024-44331,0,1,73262ef7340ef820af39aead30aed03cb4a68bd84c03029c20d228a5fd73829a,2024-10-23T18:35:02.893000
CVE-2024-44333,0,0,d4fac21295587aa2979fd79e1578e51567e5183cd9197e256154e36309cd2381,2024-09-09T21:35:11.347000
CVE-2024-44334,0,0,27220524666d063359048a7f3de8a9bf531c5b74b035bcd3d68284cc277b9a46,2024-09-09T20:35:12.473000
CVE-2024-44335,0,0,bea255eb7004ca14c44e24d39ca0678896b2d706dfe75c727ca75c52a4a40bff,2024-09-09T20:35:17.330000
@ -261145,7 +261181,7 @@ CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db29
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
CVE-2024-45526,0,0,d4628a03fc7d8a7cfb2442f76a34dac3190b6a61bb43d7edb2d6687c9af7ff5e,2024-10-23T15:12:34.673000
CVE-2024-45526,0,1,f14e1fcc5198e28bcb9f7b3a43daa36e99814812ca109c1c007380ac29ec0aa1,2024-10-23T19:35:10.713000
CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
@ -261481,8 +261517,8 @@ CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a0
CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4610,2024-09-30T12:45:57.823000
CVE-2024-46475,0,0,6dd32d21b34d5ed62fc4d47e4e31b7806525d2f693fc3da0c33e5fca3fe88762,2024-10-04T13:51:25.567000
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
CVE-2024-46482,0,0,4c7cc9f8abefdf394d703170cab2c1d0f6815a856ba8a2a17cbdc610ce072993,2024-10-23T15:12:34.673000
CVE-2024-46483,0,0,75ffc445ccb8ac003ecbb6c3c08c1b221eff0be1f110f3f40bfdb9fa10891b03,2024-10-23T15:12:34.673000
CVE-2024-46482,0,1,0bd11529577a79bda1c61c449bff3d306490c152de71c2fae5d4eea05925babd,2024-10-23T18:35:03.670000
CVE-2024-46483,0,1,efd1621b21138809f35625ddb77fc021e753097710878e96af20d908574d610c,2024-10-23T19:35:11.493000
CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000
CVE-2024-46486,0,0,6fe755bff404a9260861863774df3deb9fd23fe20cfc4f9cee682ab32adf5d48,2024-10-07T19:37:29.423000
CVE-2024-46488,0,0,41c2092a15aede67b224d6f9481dd8740d600089d5047373dfa98024a8d780a7,2024-10-02T16:21:36.507000
@ -261795,7 +261831,7 @@ CVE-2024-46868,0,0,f9213706fab3b425fd6d7b9c70ceaf5cede666ff7057d8fa56ee82d754aa0
CVE-2024-46869,0,0,9ed81572871432f968131373b48d9116fc414e30c1ec7495d6906513924c285a,2024-10-04T13:51:25.567000
CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000
CVE-2024-46870,0,0,652ca601a7652d849ccf9f3fa227a6384ea9072535f4139d45e923bcd7c9f15f,2024-10-23T14:26:28.690000
CVE-2024-46871,0,1,4bbafc222a5b983e7eee48edc0ec35209cfa7a3a04fb16a3dfef1b1e5b5df95d,2024-10-23T16:10:48.077000
CVE-2024-46871,0,0,4bbafc222a5b983e7eee48edc0ec35209cfa7a3a04fb16a3dfef1b1e5b5df95d,2024-10-23T16:10:48.077000
CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000
CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000
CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000
@ -262218,29 +262254,29 @@ CVE-2024-47654,0,0,78d80ab92ea0ad6076e47a7f8ed2f44135bb23a3e7682564585e92d9487a7
CVE-2024-47655,0,0,41934f94579191292376f845dc30fc7330cbde82071ca41f41ba8eb2594186d2,2024-10-16T15:26:15.350000
CVE-2024-47656,0,0,4a7b40727fe0bc16fd3cab3d10ee814920e8818b1c83af2c468f34cc9e39f8a6,2024-10-16T15:32:01.460000
CVE-2024-47657,0,0,708576a218ada67737fc2a655868a1f777fbac283ee172e5336c76140e63933f,2024-10-16T15:44:16.807000
CVE-2024-47658,0,1,947a688b2a86da9457477de88fb5bff9df9a2e5d87371477ab4988d2ebf34f8c,2024-10-23T16:14:46.213000
CVE-2024-47659,0,1,731051564fdd9abc181845d3e50137cbdca7b1a84c7236a873f8e213b5f1af37,2024-10-23T16:29:14.800000
CVE-2024-47658,0,0,947a688b2a86da9457477de88fb5bff9df9a2e5d87371477ab4988d2ebf34f8c,2024-10-23T16:14:46.213000
CVE-2024-47659,0,0,731051564fdd9abc181845d3e50137cbdca7b1a84c7236a873f8e213b5f1af37,2024-10-23T16:29:14.800000
CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000
CVE-2024-47660,0,1,e2ac446e9523902ead466409c8feba83110dd39b410ed7aaabcc96633073d26b,2024-10-23T17:00:47.747000
CVE-2024-47660,0,0,e2ac446e9523902ead466409c8feba83110dd39b410ed7aaabcc96633073d26b,2024-10-23T17:00:47.747000
CVE-2024-47661,0,0,0c740796dab368d37558db934f0b4e8bdfdcea457a0f8107f53cd199a836ef43,2024-10-15T16:03:29.260000
CVE-2024-47662,0,1,920f325626eb85508758136f5394582e182e91aad17f6b7b72068d65db6d25e8,2024-10-23T16:53:12.973000
CVE-2024-47663,0,1,0520ca5d6812be23092506a46bd53a6f2ab6e887252710a210ce4d11a4df1647,2024-10-23T16:50:53.183000
CVE-2024-47664,0,1,ed8a7e5e5d422df82ea173458af2fecf23bb2712b244089e51a1d9602304a958,2024-10-23T16:47:35.643000
CVE-2024-47665,0,1,44c24759c1101f90cf6a5dd5fef1f257134e85f7779de40d7338a9657664b646,2024-10-23T16:44:59.270000
CVE-2024-47666,0,1,24c02ab2ebe5713940a0fb6d9b5be80231f00e1b1a92eb5ee8c0e6e7e5de0a9d,2024-10-23T16:34:49.307000
CVE-2024-47667,0,1,0d67103013a699588d2c658822c71f03525e987820a1f237d10bb2d28261a600,2024-10-23T16:31:43.003000
CVE-2024-47662,0,0,920f325626eb85508758136f5394582e182e91aad17f6b7b72068d65db6d25e8,2024-10-23T16:53:12.973000
CVE-2024-47663,0,0,0520ca5d6812be23092506a46bd53a6f2ab6e887252710a210ce4d11a4df1647,2024-10-23T16:50:53.183000
CVE-2024-47664,0,0,ed8a7e5e5d422df82ea173458af2fecf23bb2712b244089e51a1d9602304a958,2024-10-23T16:47:35.643000
CVE-2024-47665,0,0,44c24759c1101f90cf6a5dd5fef1f257134e85f7779de40d7338a9657664b646,2024-10-23T16:44:59.270000
CVE-2024-47666,0,0,24c02ab2ebe5713940a0fb6d9b5be80231f00e1b1a92eb5ee8c0e6e7e5de0a9d,2024-10-23T16:34:49.307000
CVE-2024-47667,0,0,0d67103013a699588d2c658822c71f03525e987820a1f237d10bb2d28261a600,2024-10-23T16:31:43.003000
CVE-2024-47668,0,0,cf94068f0e7f8e5e7d64a7e8a1d91fb4c9f70ff81ce5d918148c4e18a53dc56f,2024-10-23T15:30:00.057000
CVE-2024-47669,0,0,cc07106cf0c3934e18c2295dc4d9599646844641786bb44db10c2dc10f6e6435,2024-10-21T13:28:34.330000
CVE-2024-4767,0,0,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000
CVE-2024-47670,0,0,47fba4dee4b00f21dbff6c6decd1bc6ab83cdd30571ca10600e97efb139e20ef,2024-10-17T14:15:13.560000
CVE-2024-47671,0,0,6ed788244a5b1c264869a97a389632df94bcd4e1ed09a4e006408f0739ce7d92,2024-10-17T14:15:13.697000
CVE-2024-47672,0,0,208c9363d63200a0f87e54b2ecaa4588cdcb8ebe0fa60448ea15f5f621cd45a2,2024-10-17T14:15:13.780000
CVE-2024-47670,0,1,4f6f24b9d042d05ec6e48a849d4c3d1cf2732e084a5df0c8e882387f060847a0,2024-10-23T19:16:56.403000
CVE-2024-47671,0,1,c766f4d06d7fa92c1ab21a038deb8b785ad54c89553a98d3a1e0620d6f119cde,2024-10-23T19:36:08.090000
CVE-2024-47672,0,1,b0413c6242def5ae2c81fa9ccaa43041d25435df473c2d18634172bf0cf9639d,2024-10-23T19:44:08.623000
CVE-2024-47673,0,0,2317135deeb5a2ba1be6a2e702cd3dee3239bc7e08807d40785f15a0d93329d9,2024-10-17T14:15:13.853000
CVE-2024-47674,0,0,9273dcf5991b9b8c8433130a4938740f9721051fe1fcb6d45b5c4bc4625153d6,2024-10-21T18:15:05.993000
CVE-2024-47675,0,0,624f315494e47c95b1269b56800071e724c94a3629173e26cf42531c4b63e4de,2024-10-23T13:39:38.647000
CVE-2024-47676,0,0,d31d6f56ccab7b160561fa0b3c682aa5c75e9dbbe155592bcb66f3a4628abbed,2024-10-22T16:12:39.830000
CVE-2024-47677,0,0,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000
CVE-2024-47678,0,1,15331914c6780ab092c41bd83df4ddc0c2577572736b4bdeb76d32ddb58569bc,2024-10-23T17:58:08.720000
CVE-2024-47678,0,0,15331914c6780ab092c41bd83df4ddc0c2577572736b4bdeb76d32ddb58569bc,2024-10-23T17:58:08.720000
CVE-2024-47679,0,0,ff4453f27f8106322d7b03df5908d00952b689ca70903c4a49e7a2270442cdd5,2024-10-23T14:49:48.763000
CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000
CVE-2024-47680,0,0,779185d87101541924dc45d047ca1b9e685cb152836bf7742a8884724035e45e,2024-10-21T17:09:45.417000
@ -262298,30 +262334,30 @@ CVE-2024-47727,0,0,b4841d049fe7977d7ae76ed99e0c8291d4ff9401863cf2613bdea9ae7e9a1
CVE-2024-47728,0,0,20d7130b4cb2af3704697b2735b8691238f821693df5a91fa37a4e7099218c8a,2024-10-21T17:09:45.417000
CVE-2024-47729,0,0,7d1f6f34e39d97ae406ce74219e7048254356610a727b3668c7c3f2cd0d70ad2,2024-10-21T17:09:45.417000
CVE-2024-4773,0,0,451efafbcecc3ef1a9913dd6e3fbbf39d79f9aa10bbe1841409a244ef36a044e,2024-08-01T13:59:35.080000
CVE-2024-47730,0,1,c0a5c91cff9686d35e7d5bba835997d9b023fdf179e028f8bc2ed84a7532d3a2,2024-10-23T17:03:23.140000
CVE-2024-47731,0,1,638886df73f40aa07e5281bd61c3b7b99724fd1016f0d993a184b6b88ee52510,2024-10-23T17:06:14.323000
CVE-2024-47732,0,1,9bc62d67d7f143b6014d17a7ed2de2f0043ff2b794c0d08b7eea0116f4ed29c9,2024-10-23T16:31:03.873000
CVE-2024-47733,0,1,1c9459511d59622fe23ef7946b3f574a7492e174f9c27d9f4ffcf7cfc5787cac,2024-10-23T17:11:29.537000
CVE-2024-47734,0,1,e239ae2a9be9c00fbcd9a4d42a9a7fa3b7a748dc8899bc352b365478d6153c50,2024-10-23T17:16:13.457000
CVE-2024-47730,0,0,c0a5c91cff9686d35e7d5bba835997d9b023fdf179e028f8bc2ed84a7532d3a2,2024-10-23T17:03:23.140000
CVE-2024-47731,0,0,638886df73f40aa07e5281bd61c3b7b99724fd1016f0d993a184b6b88ee52510,2024-10-23T17:06:14.323000
CVE-2024-47732,0,0,9bc62d67d7f143b6014d17a7ed2de2f0043ff2b794c0d08b7eea0116f4ed29c9,2024-10-23T16:31:03.873000
CVE-2024-47733,0,0,1c9459511d59622fe23ef7946b3f574a7492e174f9c27d9f4ffcf7cfc5787cac,2024-10-23T17:11:29.537000
CVE-2024-47734,0,0,e239ae2a9be9c00fbcd9a4d42a9a7fa3b7a748dc8899bc352b365478d6153c50,2024-10-23T17:16:13.457000
CVE-2024-47735,0,0,918ed1ed6ba7267950dd2758ef51888a5f5662ceef4cc5d4887e675b3769fc56,2024-10-21T17:09:45.417000
CVE-2024-47736,0,0,80e1bfd6b5ee20de3403a27bfa1c47b54d41ea5fc193ba9fd9ef66cf274c64f3,2024-10-21T17:09:45.417000
CVE-2024-47737,0,1,7ecc6ae6c1b7ceace54d63a73c9f7205b0dc762c4dd0ff8f399efa15e9e49515,2024-10-23T17:00:01.357000
CVE-2024-47737,0,0,7ecc6ae6c1b7ceace54d63a73c9f7205b0dc762c4dd0ff8f399efa15e9e49515,2024-10-23T17:00:01.357000
CVE-2024-47738,0,0,df8a42001823c1e7a29c78a2dc7b7b033a870108f55c2c690b931c943d1f277c,2024-10-21T17:09:45.417000
CVE-2024-47739,0,1,e6e0a492029d3fb19a9a4e9cd0586875e46e9d018e544231fa7b5cba2e661da0,2024-10-23T16:58:37.707000
CVE-2024-47739,0,0,e6e0a492029d3fb19a9a4e9cd0586875e46e9d018e544231fa7b5cba2e661da0,2024-10-23T16:58:37.707000
CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f70a,2024-05-14T19:17:55.627000
CVE-2024-47740,0,0,768c60cc2aa6353990ba6be4a715ba73240d08f7aa920e59da8dba820cceb126,2024-10-21T17:09:45.417000
CVE-2024-47741,0,0,16de1929b973495fab2b76c1e0c3aec13d1144f771036e4c19ce75034196e012,2024-10-21T17:09:45.417000
CVE-2024-47742,0,0,d4bdf050ad676b843a45f07aa46808bebd66cb4930bdf4a3846418b0470ff5e9,2024-10-21T17:09:45.417000
CVE-2024-47743,0,0,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000
CVE-2024-47744,0,0,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000
CVE-2024-47745,0,1,c7b92baa4d45cc2fb4fb2eb6cde3f0f6e977a7a8941cf2bba229f794ae1dde12,2024-10-23T17:25:19.657000
CVE-2024-47745,0,0,c7b92baa4d45cc2fb4fb2eb6cde3f0f6e977a7a8941cf2bba229f794ae1dde12,2024-10-23T17:25:19.657000
CVE-2024-47746,0,0,bd1d3998772b7b97367eddbd4c0f1f3e8c206783f1078083a98d6f055ddbde21,2024-10-22T16:00:35.703000
CVE-2024-47747,0,0,bf426d12e6fede872474432e7d03578fd050f7aed12c854ab7dc6720315913fd,2024-10-22T16:11:40.627000
CVE-2024-47748,0,1,065bb81a1af9cae33c8bbb049306a2511d1bd3c734e3a21bbb094fdde6daea3a,2024-10-23T17:28:00.460000
CVE-2024-47748,0,0,065bb81a1af9cae33c8bbb049306a2511d1bd3c734e3a21bbb094fdde6daea3a,2024-10-23T17:28:00.460000
CVE-2024-47749,0,0,6fb6c09686d727b440ebbd021d0a7a92d2bb1c2a12c6f5547a255465abc8b3b4,2024-10-22T16:08:31.637000
CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000
CVE-2024-47750,0,1,fa7a14e74b9f1e80df8f1d89d43346c3a6cf2cfe42e44d3f1a6e0969f54d1af8,2024-10-23T17:29:01.330000
CVE-2024-47751,0,1,2d23262a1d1ea4d966272387ed728208ab7be5eeef12fc5f93786009ecea54bc,2024-10-23T17:33:52.440000
CVE-2024-47750,0,0,fa7a14e74b9f1e80df8f1d89d43346c3a6cf2cfe42e44d3f1a6e0969f54d1af8,2024-10-23T17:29:01.330000
CVE-2024-47751,0,0,2d23262a1d1ea4d966272387ed728208ab7be5eeef12fc5f93786009ecea54bc,2024-10-23T17:33:52.440000
CVE-2024-47752,0,0,65039c78bb19b3ece8928a956e9db0ee7719b3f114bcfd57c0c3ced74f237a1e,2024-10-22T16:11:09.037000
CVE-2024-47753,0,0,b4bdc9a1d337353d37d865ac5f0c508d5e95f57a71156b3e1f6703729b56c2ad,2024-10-22T16:10:40.380000
CVE-2024-47754,0,0,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdcd47,2024-10-22T16:10:21.907000
@ -262480,7 +262516,7 @@ CVE-2024-48043,0,0,d7022e96ce1ce67c4f59e004a095bf6b87f052300567a30fb9f9fb2d5938d
CVE-2024-48046,0,0,423091e4b5e8d6a105e8bdc778f5cf951b1df2d4a2635710b325a5130f1d15ea,2024-10-18T12:52:33.507000
CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c081f8,2024-10-18T12:52:33.507000
CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000
CVE-2024-48049,0,1,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000
CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
@ -262531,7 +262567,7 @@ CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e
CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000
CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000
CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000
CVE-2024-48415,0,1,f0924ee00bd27af7c2e3b4df709006fd2e622c007a3785ddb6461472428a80bb,2024-10-23T16:35:09.317000
CVE-2024-48415,0,0,f0924ee00bd27af7c2e3b4df709006fd2e622c007a3785ddb6461472428a80bb,2024-10-23T16:35:09.317000
CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000
CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000
CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000
@ -262568,12 +262604,12 @@ CVE-2024-48635,0,0,70acc62db2773972323caa582098c14d2ba0630ccd28542fd3671e2f06f9a
CVE-2024-48636,0,0,a1b3046a0d6b06507f3010f4369f5a0d6853a8c7798cca6c53bc4bbbc77e9757,2024-10-18T12:52:33.507000
CVE-2024-48637,0,0,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07e4e,2024-10-18T12:52:33.507000
CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000
CVE-2024-48644,0,0,714259621a93750b61183872589245a3305e917af92df87963fd7418c19665a3,2024-10-23T15:12:34.673000
CVE-2024-48644,0,1,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000
CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000
CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000
CVE-2024-48652,0,1,49154ba7497ef192453221e4060c2b6cb066a0169e9fec9edb64b7bf9a759b2f,2024-10-23T16:35:10.103000
CVE-2024-48656,0,1,06911636ae175250e7eba9c033b0f62399c743c3b4db83015eb8e3feed388fa8,2024-10-23T16:35:12.613000
CVE-2024-48657,0,1,afc12b03b1c15f2615796b8fbdf85df41d5ecd218f5d5af67be92a52fc07a084,2024-10-23T16:35:13.890000
CVE-2024-48652,0,0,49154ba7497ef192453221e4060c2b6cb066a0169e9fec9edb64b7bf9a759b2f,2024-10-23T16:35:10.103000
CVE-2024-48656,0,0,06911636ae175250e7eba9c033b0f62399c743c3b4db83015eb8e3feed388fa8,2024-10-23T16:35:12.613000
CVE-2024-48657,0,0,afc12b03b1c15f2615796b8fbdf85df41d5ecd218f5d5af67be92a52fc07a084,2024-10-23T16:35:13.890000
CVE-2024-48659,0,0,74eba10fd7e373cc2157a8c68b69a750c73226aa0e75d8a35ccb512ee7fa62b0,2024-10-23T15:12:34.673000
CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000
CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000
@ -262673,6 +262709,8 @@ CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20c
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
CVE-2024-48963,1,1,a80eb473adddad3c7e25a46f2cb5ec9ff71f6a8e537f2b9fe0c636994cb676ca,2024-10-23T19:15:19.607000
CVE-2024-48964,1,1,43e47a7beb9bb42e759d82f399879b4d270263761d98bba5d56af008ca3b4ad0,2024-10-23T19:15:19.833000
CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000
CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000
CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000
@ -262781,7 +262819,7 @@ CVE-2024-49282,0,0,3a6f5cd82ec68a1bfbe1f4f156ef6268706ea2c2772c6f37ca60ccaad2879
CVE-2024-49283,0,0,261a1f8cfe011441b757e2549150d49caf0cbd82863bcb1702fead1f8711ada8,2024-10-18T12:52:33.507000
CVE-2024-49284,0,0,bec1f0da1bcb0850e4841345e95550bca16d99530b59e5207d183ff1f4e1c3e0,2024-10-18T12:52:33.507000
CVE-2024-49285,0,0,6f46c329c3d1526d526943e0333d6d72992c68afd2913a4ef362b73e606f2e17,2024-10-18T12:52:33.507000
CVE-2024-49286,0,1,8c28a82bd9391036ea30ce185d824d073b6f340cb9bbf2f8121b077632895379,2024-10-23T16:13:37.823000
CVE-2024-49286,0,0,8c28a82bd9391036ea30ce185d824d073b6f340cb9bbf2f8121b077632895379,2024-10-23T16:13:37.823000
CVE-2024-49287,0,0,0066d2fce1ed85532c90a9906dc911278ca46d873038b8dcfb2d0c4b3b95c685,2024-10-18T12:52:33.507000
CVE-2024-49288,0,0,9794858fdab905561c3b5d43269f1d3f1bacba7fba1bb0436d9d456534b0053f,2024-10-18T12:52:33.507000
CVE-2024-49289,0,0,1007ec713acd15fdb5c2262f73a22207aad725968297cd9b79b0f4fcd3d741cb,2024-10-18T12:52:33.507000
@ -262819,18 +262857,18 @@ CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b
CVE-2024-49320,0,0,f646a0aed9b94f9c2a4b6085270ae6d0667dce332670da7784078783e12bfcb6,2024-10-18T12:52:33.507000
CVE-2024-49321,0,0,6ce68241db10c7838e4a51d2227fb9952bea2f4d972829a40692939256bd9db9,2024-10-21T17:09:45.417000
CVE-2024-49322,0,0,541e4efebd0d76588052862000e37b2e98e8b9ac15619c2b0422f26ed3288fd3,2024-10-18T12:52:33.507000
CVE-2024-49323,0,1,2f124cdc22e81391d598884667e36f6fa2d8c8661fccd4b5b6bdeb72951248d2,2024-10-23T16:05:49.617000
CVE-2024-49323,0,0,2f124cdc22e81391d598884667e36f6fa2d8c8661fccd4b5b6bdeb72951248d2,2024-10-23T16:05:49.617000
CVE-2024-49324,0,0,6a0da56f8b241aa139bafdc8a7cea36b225bb8abdef936740223bb227ab67ca9,2024-10-21T17:09:45.417000
CVE-2024-49325,0,0,6361ff0a5fd3247f3dfc42142e1769d0dcf00cbc296a4736c789a8d3defd83f8,2024-10-22T18:33:59.793000
CVE-2024-49326,0,0,fda910b2c7a76bbf2c72386ba089c287f84555f7530f28eb58f294531de1ce7e,2024-10-21T17:09:45.417000
CVE-2024-49327,0,0,8b6c9aef8923e1de12a4d100640ad37448b7c34f1bbdc4fa10821a94ae1473e5,2024-10-21T17:09:45.417000
CVE-2024-49328,0,1,e330b5e89660f19abf213bec586eeaebe3d605cff140381953fa50ab8b0d1168,2024-10-23T17:08:31.910000
CVE-2024-49328,0,0,e330b5e89660f19abf213bec586eeaebe3d605cff140381953fa50ab8b0d1168,2024-10-23T17:08:31.910000
CVE-2024-49329,0,0,f70bf73589c931aa9ccbd5a8a6c329a32fe219888977f917a6e7137433e9c5b9,2024-10-21T17:09:45.417000
CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d17,2024-06-04T19:20:54.643000
CVE-2024-49330,0,0,7accf1e781f0aa61906365473fdf4af87b4754ed339a7ad495b0c4ebeff22d13,2024-10-21T17:09:45.417000
CVE-2024-49331,0,0,9ec402693291c894424e66eebc985f7e7ba3ce5bb7349cf58ad68284e18ecc68,2024-10-21T17:09:45.417000
CVE-2024-49332,0,0,a9ab39a4ab9de09d13501701addd6e3ccdaf63be93c7bf933ca946939905c6cb,2024-10-21T17:09:45.417000
CVE-2024-49334,0,1,bcc2db18f40dffe6c4f8472b0ef26870ffad9612f58222d9017252998c6947e3,2024-10-23T16:08:01.277000
CVE-2024-49334,0,0,bcc2db18f40dffe6c4f8472b0ef26870ffad9612f58222d9017252998c6947e3,2024-10-23T16:08:01.277000
CVE-2024-49335,0,0,e0582084d760a7c1b5edb6582a5c201af75fdc2362c78425525e3f7ed66f6ebc,2024-10-21T17:09:45.417000
CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000
CVE-2024-49340,0,0,37285f025630fd9eb79c4269f84ef859e190bfac2e34728b5f3d3dbad2273eb0,2024-10-16T16:38:14.557000
@ -262909,30 +262947,30 @@ CVE-2024-49630,0,0,fc02361dbe836b234c4f2baea1ce95c4f8783a553a50fe9d797af011750ca
CVE-2024-49631,0,0,90e84d249ffc88bac8ba7984e2725c172d8e09dd6e795888b9ed719f758a8be8,2024-10-21T17:09:45.417000
CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000
CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000
CVE-2024-49652,1,1,63a1a77d9344722b7ce84f9fce0c71bf466cdf71caf35501c4157d9f95e6cfbf,2024-10-23T16:15:06.027000
CVE-2024-49653,1,1,cabe94aabbc3a6e987c199051f500173dd52ffdb4dbbdef8a887fba79c58778b,2024-10-23T16:15:06.243000
CVE-2024-49657,1,1,3feb892112d8785b4c19043c1227d7402f03b3f28a246c01acca5e2956c4e377,2024-10-23T16:15:06.450000
CVE-2024-49658,1,1,90534555efd21189e17c22b880e2e99c65c75f0f31d240c0ff09a4123d7d78d3,2024-10-23T16:15:06.660000
CVE-2024-49652,0,0,63a1a77d9344722b7ce84f9fce0c71bf466cdf71caf35501c4157d9f95e6cfbf,2024-10-23T16:15:06.027000
CVE-2024-49653,0,0,cabe94aabbc3a6e987c199051f500173dd52ffdb4dbbdef8a887fba79c58778b,2024-10-23T16:15:06.243000
CVE-2024-49657,0,0,3feb892112d8785b4c19043c1227d7402f03b3f28a246c01acca5e2956c4e377,2024-10-23T16:15:06.450000
CVE-2024-49658,0,0,90534555efd21189e17c22b880e2e99c65c75f0f31d240c0ff09a4123d7d78d3,2024-10-23T16:15:06.660000
CVE-2024-4966,0,0,ca96dc16e6a41cb4de3af3c10d7787996b0688fd8eb0522e09efb3ad5052b418,2024-05-17T02:40:44.507000
CVE-2024-49668,1,1,e7710d4d8726731abeedb04cd2c8fa120d9516d436d26fdf07c9c7b29dfa653b,2024-10-23T16:15:06.970000
CVE-2024-49669,1,1,4278a1e99ad7b1ff3b1103fc15d0864ba47dbf49f079ddc29464646c7c69caeb,2024-10-23T16:15:07.330000
CVE-2024-49668,0,0,e7710d4d8726731abeedb04cd2c8fa120d9516d436d26fdf07c9c7b29dfa653b,2024-10-23T16:15:06.970000
CVE-2024-49669,0,0,4278a1e99ad7b1ff3b1103fc15d0864ba47dbf49f079ddc29464646c7c69caeb,2024-10-23T16:15:07.330000
CVE-2024-4967,0,0,8025a234fc289bdab04f9acbdc2478b7155048b60320bc8b6b7a0758b314e3b9,2024-06-04T19:20:55.777000
CVE-2024-49671,1,1,30b08b28f4cc7c0157ee303caff1fae3d001b3a4c48216094155b6a394653137,2024-10-23T16:15:08.260000
CVE-2024-49671,0,0,30b08b28f4cc7c0157ee303caff1fae3d001b3a4c48216094155b6a394653137,2024-10-23T16:15:08.260000
CVE-2024-49675,0,0,d445661173420aa7e4b075685c6d095d96fc1d203415958069ae9105144d20f8,2024-10-23T15:15:32.120000
CVE-2024-49676,1,1,adf778c2fd477e7e5057e7ea2756d44a60f9c4d6de9942b4e924dd314069dd4a,2024-10-23T16:15:09.040000
CVE-2024-49676,0,0,adf778c2fd477e7e5057e7ea2756d44a60f9c4d6de9942b4e924dd314069dd4a,2024-10-23T16:15:09.040000
CVE-2024-4968,0,0,e5876599ebc72fb366518fd24786abd136bd58674cfc6b7ffb1fde29b7dfc2f8,2024-06-04T19:20:55.910000
CVE-2024-49684,1,1,0df1aa091650d29739ebe68aedddc0d10b21c75ea4cfcefd1bc46ae636e494bc,2024-10-23T16:15:09.620000
CVE-2024-49684,0,0,0df1aa091650d29739ebe68aedddc0d10b21c75ea4cfcefd1bc46ae636e494bc,2024-10-23T16:15:09.620000
CVE-2024-4969,0,0,ab0804889b5a888b9b65e9fe2bbd8691478393df4e0fc992e2c82c7a1daa3f54,2024-07-08T14:19:14.173000
CVE-2024-49690,1,1,44993f6e8c674969fbf7136b33117e24dfafbe9c462e5988b6e20da9e8be1fcd,2024-10-23T16:15:09.867000
CVE-2024-49690,0,0,44993f6e8c674969fbf7136b33117e24dfafbe9c462e5988b6e20da9e8be1fcd,2024-10-23T16:15:09.867000
CVE-2024-4970,0,0,57238e39937dd97cbba063724432adc0a3a93bd80ba7688359158539986e4d98,2024-06-24T19:30:39.397000
CVE-2024-49701,1,1,0b801911bc5bb1d26c90e4cce5c7fd481c7a0370220cb9fd23885463c1ee1cf1,2024-10-23T16:15:10.097000
CVE-2024-49701,0,0,0b801911bc5bb1d26c90e4cce5c7fd481c7a0370220cb9fd23885463c1ee1cf1,2024-10-23T16:15:10.097000
CVE-2024-4971,0,0,e1212bde7e83cc3c65186cf7cb8fd594e3ac7122768fa3e856e479fe91aac874,2024-05-22T12:46:53.887000
CVE-2024-4972,0,0,aca3b401df5f0f8efa87796dd64789aa2cecbea8af4c356f93adc161f1e5b552,2024-06-04T19:20:56.040000
CVE-2024-4973,0,0,c8cb9b832f42f8b36963a1241c53cb5d648196ebedc5ede632c88d17792d2e61,2024-06-04T19:20:56.140000
CVE-2024-4974,0,0,29381f582adec4042105cf6b841ea7b6d4575f99995b9ea6ba695d777207b6ba,2024-06-04T19:20:56.237000
CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c152070c,2024-06-04T19:20:56.337000
CVE-2024-49751,1,1,f0da03eaf0fa0fe5013cf4c58e8a204e1366d4d59799530ff958dfe564a83247,2024-10-23T16:15:10.310000
CVE-2024-49756,1,1,b5655066b00149d769468b534f1e69f5727939d90ec20aa7133e99682c961f40,2024-10-23T17:15:19.250000
CVE-2024-49751,0,0,f0da03eaf0fa0fe5013cf4c58e8a204e1366d4d59799530ff958dfe564a83247,2024-10-23T16:15:10.310000
CVE-2024-49756,0,0,b5655066b00149d769468b534f1e69f5727939d90ec20aa7133e99682c961f40,2024-10-23T17:15:19.250000
CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000
CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000
CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000
@ -262941,18 +262979,18 @@ CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec5
CVE-2024-4984,0,0,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000
CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000
CVE-2024-49850,0,0,2b33649e908446d8844acedbede0997555f012b73f46f17eddbc04e11a5ff156,2024-10-22T16:12:14.193000
CVE-2024-49851,0,1,fcbc0505724ce298c5cfc13db02dd0293eea0e5cdca10e81e7b2a1c3986ebf99,2024-10-23T16:00:52.597000
CVE-2024-49852,0,1,baf4b17f13640a7cf91950497a6b1fb74fa9a8d9c08705e407866e197e0d2023,2024-10-23T16:14:01.857000
CVE-2024-49853,0,1,0026350dbad28ce8ce15e61671659dd8168eb5ed41060a25109bce22f2cd20c8,2024-10-23T16:14:30.750000
CVE-2024-49854,0,1,064537b2a77087bfea8dde0af1eed478f7eb8b6368bfcaef369e42fd6ea7a842,2024-10-23T16:29:32.857000
CVE-2024-49851,0,0,fcbc0505724ce298c5cfc13db02dd0293eea0e5cdca10e81e7b2a1c3986ebf99,2024-10-23T16:00:52.597000
CVE-2024-49852,0,0,baf4b17f13640a7cf91950497a6b1fb74fa9a8d9c08705e407866e197e0d2023,2024-10-23T16:14:01.857000
CVE-2024-49853,0,0,0026350dbad28ce8ce15e61671659dd8168eb5ed41060a25109bce22f2cd20c8,2024-10-23T16:14:30.750000
CVE-2024-49854,0,0,064537b2a77087bfea8dde0af1eed478f7eb8b6368bfcaef369e42fd6ea7a842,2024-10-23T16:29:32.857000
CVE-2024-49855,0,0,1c10554d37ca1638fe05ddaa09d6ac939fe9e21d5da77a220a4fa3ba8205886d,2024-10-22T16:12:27.030000
CVE-2024-49856,0,1,e0709b06032173417a793b4a49a19eb6d6f50234f60b695d882b6319e269d48f,2024-10-23T16:33:20.857000
CVE-2024-49856,0,0,e0709b06032173417a793b4a49a19eb6d6f50234f60b695d882b6319e269d48f,2024-10-23T16:33:20.857000
CVE-2024-49857,0,0,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000
CVE-2024-49858,0,1,d9505cdd63109929bf980b473026fdbc1d1592f1f84cad909d28ca3de57c6cff,2024-10-23T16:35:10.097000
CVE-2024-49858,0,0,d9505cdd63109929bf980b473026fdbc1d1592f1f84cad909d28ca3de57c6cff,2024-10-23T16:35:10.097000
CVE-2024-49859,0,0,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99aaa1,2024-10-22T16:13:03.267000
CVE-2024-49860,0,1,58465836429dbe2e6aaf835a73a59e39240a71d370ac212d7b09986db7503b3c,2024-10-23T16:44:58.473000
CVE-2024-49861,0,1,1653e7df85a45b515fcdc441f9cb9f122cb6f11d500f6cbca9f4d9d62723f07c,2024-10-23T16:48:47.573000
CVE-2024-49862,0,1,e0b25be7c75d96f390f553fe793605e2691bfb34c1e389879a3cd9200ce6c511,2024-10-23T16:53:51.050000
CVE-2024-49860,0,0,58465836429dbe2e6aaf835a73a59e39240a71d370ac212d7b09986db7503b3c,2024-10-23T16:44:58.473000
CVE-2024-49861,0,0,1653e7df85a45b515fcdc441f9cb9f122cb6f11d500f6cbca9f4d9d62723f07c,2024-10-23T16:48:47.573000
CVE-2024-49862,0,0,e0b25be7c75d96f390f553fe793605e2691bfb34c1e389879a3cd9200ce6c511,2024-10-23T16:53:51.050000
CVE-2024-49863,0,0,6b95c286ba526eda8fe740b407a6bfc7f237461b3b2da1ccf712f97bca3266df,2024-10-23T15:13:58.783000
CVE-2024-49864,0,0,11ee8b000b9a62890a75dd63920e4a33890ab9d058f73a94a2fe3382caeb81d2,2024-10-23T15:13:58.783000
CVE-2024-49865,0,0,7d0d3bc3b58e3a73b342518618670e0b0da74132af9460999190836dd7383f64,2024-10-23T15:13:58.783000
@ -263195,8 +263233,8 @@ CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a8
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
CVE-2024-50382,1,1,ef507e79e3a47cb5db46886c833025ed9d096f55ed6dede99fee1d7a588181b0,2024-10-23T17:15:19.453000
CVE-2024-50383,1,1,b31f839fb6680eaf55759b6413c371459ae54edfc8f56e29ccc0f46b2b3bc113,2024-10-23T17:15:19.540000
CVE-2024-50382,0,0,ef507e79e3a47cb5db46886c833025ed9d096f55ed6dede99fee1d7a588181b0,2024-10-23T17:15:19.453000
CVE-2024-50383,0,0,b31f839fb6680eaf55759b6413c371459ae54edfc8f56e29ccc0f46b2b3bc113,2024-10-23T17:15:19.540000
CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000
CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000
CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000
@ -264055,7 +264093,7 @@ CVE-2024-6006,0,0,da8e313e14db96255e115f081c2f199aa734bf4f3a245ddcbe0fc940a6272d
CVE-2024-6007,0,0,168f29713bfc3d324900731ff252d7ac39dc3f3059397dc39713b17d5dee00d3,2024-06-17T12:42:04.623000
CVE-2024-6008,0,0,e339bd5f37f67074a3982bb584c73bf8dda0cb7cd7304fe99aa6ea6d9b2ef2e4,2024-07-19T14:52:08.110000
CVE-2024-6009,0,0,e0a24374cca31358971f963f7084d5ca791c42b65310b9cca023d09b825a9a06,2024-07-19T14:24:41.657000
CVE-2024-6010,0,1,f082d782a73125c90d5c3919967d1d860f24e2a0398351b6dc15b1f6cc88a3c4,2024-10-23T16:15:10.483000
CVE-2024-6010,0,0,f082d782a73125c90d5c3919967d1d860f24e2a0398351b6dc15b1f6cc88a3c4,2024-10-23T16:15:10.483000
CVE-2024-6011,0,0,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000
CVE-2024-6012,0,0,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000
CVE-2024-6013,0,0,dd5aadcad9485c7b63e2c76668a62eba788e1248615fab9fd06bf5aaf41af2a9,2024-07-19T14:20:07.337000
@ -266805,6 +266843,7 @@ CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d3
CVE-2024-9940,0,0,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000
CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000
CVE-2024-9947,0,0,6d7ad994cc9a7fac36825c8cc7c424fb9dcf9e1f8fd3a9311a9b488ef62fd2d0,2024-10-23T15:12:34.673000
CVE-2024-9949,1,1,809d1c3ab15f5e798ce5cb068f046ea68c92b35fa3cdf8747557251b5a8ea50c,2024-10-23T18:15:13.763000
CVE-2024-9951,0,0,5d941c75af8c4072e469beaa1d6ae2855b0ca23ecdce87314ecd326f6a54014a,2024-10-18T12:52:33.507000
CVE-2024-9952,0,0,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000
CVE-2024-9953,0,0,d45e8bc6b31e34e84fbff0a12af100dea5cf3de9adda836e3ebc3a7410262455,2024-10-17T20:59:01.940000

Can't render this file because it is too large.