Auto-Update: 2024-10-10T20:00:17.856967+00:00

This commit is contained in:
cad-safe-bot 2024-10-10 20:03:17 +00:00
parent bdc74a7bb4
commit 3137bd899e
38 changed files with 3224 additions and 204 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-1000487",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-01-03T20:29:00.703",
"lastModified": "2023-11-07T02:37:57.687",
"lastModified": "2024-10-10T19:55:20.253",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:plexus-utils_project:plexus-utils:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:codehaus-plexus:plexus-utils:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.16",
"matchCriteriaId": "32FC40BD-9DA1-480F-A13E-1A4C14776DB4"
"matchCriteriaId": "7214D6BD-75D5-4F16-905C-98F8890BD888"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-22969",
"sourceIdentifier": "security@vmware.com",
"published": "2022-04-21T19:15:08.903",
"lastModified": "2023-08-08T14:22:24.967",
"lastModified": "2024-10-10T19:13:58.310",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -83,6 +83,13 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal:spring_security_oauth:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.4.0",
"versionEndExcluding": "2.4.2",
"matchCriteriaId": "A137BE31-252D-4B38-8C9C-E4CA2030FDB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal:spring_security_oauth:*:*:*:*:*:*:*:*",

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-20091",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.583",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:06:38.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1701."
},
{
"lang": "es",
"value": "En vdec, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09028313; ID de problema: MSV-1701."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security@mediatek.com",
"type": "Secondary",
@ -24,10 +61,117 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-20093",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.757",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:06:57.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1699."
},
{
"lang": "es",
"value": "En vdec, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09028313; ID de problema: MSV-1699."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security@mediatek.com",
"type": "Secondary",
@ -24,10 +61,117 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-20095",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.910",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:07:22.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996894; Issue ID: MSV-1636."
},
{
"lang": "es",
"value": "En m4u, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08996894; ID de problema: MSV-1636."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security@mediatek.com",
"type": "Secondary",
@ -24,10 +61,182 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-20096",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.987",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:07:38.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996900; Issue ID: MSV-1635."
},
{
"lang": "es",
"value": "En m4u, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08996900; ID de problema: MSV-1635."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security@mediatek.com",
"type": "Secondary",
@ -24,10 +61,182 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-20097",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.057",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:07:52.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1630."
},
{
"lang": "es",
"value": "En vdec, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09028313; ID de problema: MSV-1630."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security@mediatek.com",
"type": "Secondary",
@ -24,10 +61,102 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-20102",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.427",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:20:31.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601."
},
{
"lang": "es",
"value": "En el controlador WLAN, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08998892; ID de problema: MSV-1601."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security@mediatek.com",
"type": "Secondary",
@ -24,10 +61,82 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F897E19-008E-4DC8-B4CB-BF27044B9F5C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05525018-AFE0-415C-A71C-A77922C7D637"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30118",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-10-09T20:15:07.570",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:50:54.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
},
{
"source": "psirt@hcl.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@hcl.com",
"type": "Secondary",
@ -51,10 +81,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:connections:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD4BF4C3-3D45-41A8-886F-521E095CBBF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D55E0F2F-7C8D-4334-8B8D-CCF88431F6DF"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0114302",
"source": "psirt@hcl.com"
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44954",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T19:15:30.353",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:02:42.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,168 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: line6: Fix racy access to midibuf Puede haber accesos concurrentes a midibuf de line6 tanto desde la devoluci\u00f3n de llamada de finalizaci\u00f3n de URB como desde el acceso a la API rawmidi. Esto podr\u00eda ser la causa de la advertencia KMSAN activada por syzkaller a continuaci\u00f3n (as\u00ed que se indica aqu\u00ed). Este parche protege la llamada midibuf de la ruta de c\u00f3digo anterior con un spinlock para evitar las posibles ejecuciones."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.320",
"matchCriteriaId": "0B4EF915-550B-45E5-B2CA-648FEACD60FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "4.20",
"versionEndExcluding": "5.4.282",
"matchCriteriaId": "21D0A18B-9B7E-4C59-A2A6-8A94BBA4E0FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.224",
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "5.11",
"versionEndExcluding": "5.15.165",
"matchCriteriaId": "87C7E3B8-B82C-459E-AE23-FFE2D952481F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.105",
"matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.46",
"matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.5",
"matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/15b7a03205b31bc5623378c190d22b7ff60026f1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/40f3d5cb0e0cbf7fa697913a27d5d361373bdcf5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/51d87f11dd199bbc6a85982b088ff27bde53b48a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/535df7f896a568a8a1564114eaea49d002cb1747",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/643293b68fbb6c03f5e907736498da17d43f0d81",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a54da4b787dcac60b598da69c9c0072812b8282d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c80f454a805443c274394b1db0d1ebf477abd94e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e7e7d2b180d8f297cea6db43ea72402fd33e1a29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-46300",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T17:15:15.610",
"lastModified": "2024-10-07T20:35:11.433",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-10T18:52:42.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "itsourcecode Placement Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the Full Name field in registration.php."
},
{
"lang": "es",
"value": "itsourcecode Placement Management System 1.0 es vulnerable a cross-site scripting (XSS) a trav\u00e9s del campo Nombre completo en registration.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F16A2F97-B41C-433C-B6F1-B14880A5F029"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/riya98241/CVE/blob/main/CVE-2024-46300",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://portswigger.net/web-security/cross-site-scripting/stored",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47354",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-10T19:15:16.837",
"lastModified": "2024-10-10T19:15:16.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in smp7, wp.Insider Simple Membership After Login Redirection.This issue affects Simple Membership After Login Redirection: from n/a through 1.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-membership-after-login-redirection/wordpress-simple-membership-after-login-redirection-plugin-1-6-open-redirection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47410",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:04.540",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:26:44.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,8 +41,18 @@
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +61,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47411",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:04.793",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:26:54.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47412",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:05.017",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:27:02.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47413",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:05.210",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:27:08.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47414",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:05.417",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:27:17.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47415",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:05.627",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:27:30.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +61,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47416",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:05.830",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:27:39.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47417",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:06.060",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:27:46.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +61,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47418",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:06.277",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:28:04.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47419",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:06.480",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:28:19.330",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +71,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47420",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:06.660",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:28:26.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.8",
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.5",
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47636",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-10T18:15:07.920",
"lastModified": "2024-10-10T18:15:07.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-wp-jobsearch-plugin-2-5-9-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47648",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-10T19:15:17.067",
"lastModified": "2024-10-10T19:15:17.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in EventPrime Events EventPrime.This issue affects EventPrime: from n/a through 4.0.4.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-4-0-4-5-open-redirection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-47962",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-10-10T18:15:08.183",
"lastModified": "2024-10-10T18:15:08.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-47963",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-10-10T18:15:08.330",
"lastModified": "2024-10-10T18:15:08.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-47964",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-10-10T18:15:08.470",
"lastModified": "2024-10-10T18:15:08.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-47965",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-10-10T18:15:08.587",
"lastModified": "2024-10-10T18:15:08.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-47966",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-10-10T18:15:08.710",
"lastModified": "2024-10-10T18:15:08.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7801",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-10-04T20:15:07.440",
"lastModified": "2024-10-07T17:48:28.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:48:37.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
@ -73,14 +105,52 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microchip:timeprovider_4100_grandmaster_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0",
"versionEndExcluding": "2.4.7",
"matchCriteriaId": "C2B755C3-0A88-49A4-AA98-8FF7160E7C91"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:microchip:timeprovider_4100_grandmaster:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6987284-9FEC-493F-AD20-7B173D82AD82"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-unathenticated-sql-injection",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9054",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-10-04T20:15:07.587",
"lastModified": "2024-10-07T17:48:28.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T18:46:08.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
@ -77,14 +109,52 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microchip:timeprovider_4100_grandmaster_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0",
"versionEndExcluding": "2.4.7",
"matchCriteriaId": "C2B755C3-0A88-49A4-AA98-8FF7160E7C91"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:microchip:timeprovider_4100_grandmaster:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6987284-9FEC-493F-AD20-7B173D82AD82"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-rce-through-configuration-file",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-9804",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T18:15:09.150",
"lastModified": "2024-10-10T18:15:09.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/campsdetails.php. The manipulation of the argument hospital leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/sternstundes/cve/blob/main/sql5-campdetails.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279952",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279952",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.418618",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-9805",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T18:15:09.440",
"lastModified": "2024-10-10T18:15:09.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/campsdetails.php. The manipulation of the argument hospital/address/city/contact leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"hospital\"."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/sternstundes/cve/blob/main/xss5.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279953",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279953",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.418619",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-9806",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T19:15:17.520",
"lastModified": "2024-10-10T19:15:17.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Craig Rodway Classroombookings up to 2.8.6 and classified as problematic. This vulnerability affects unknown code of the file /rooms/fields of the component Room Page. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.7 is able to address this issue. It is recommended to upgrade the affected component. The project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/JunMing27/CVE/blob/main/CVE%20-%20classroombookings%20Cross%20Site%20Scripting%20(XSS)%20at%20custom%20field.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279958",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279958",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.418715",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-9807",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T19:15:17.797",
"lastModified": "2024-10-10T19:15:17.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Craig Rodway Classroombookings 2.8.7 and classified as problematic. This issue affects some unknown processing of the file /sessions of the component Session Page. The manipulation of the argument Name leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.8.8 is able to address this issue. It is recommended to upgrade the affected component. The project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/JunMing27/CVE/blob/main/CVE%20-%20classroombookings%20Cross%20Site%20Scripting%20(XSS)%20at%20create%20and%20edit%20session%20page%20via%20Administrator%20Dashboard.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279959",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279959",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.419262",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-10T18:00:18.882198+00:00
2024-10-10T20:00:17.856967+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-10T17:57:00.267000+00:00
2024-10-10T19:55:20.253000+00:00
```
### Last Data Feed Release
@ -33,50 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265250
265262
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `12`
- [CVE-2023-25581](CVE-2023/CVE-2023-255xx/CVE-2023-25581.json) (`2024-10-10T16:15:04.923`)
- [CVE-2024-9793](CVE-2024/CVE-2024-97xx/CVE-2024-9793.json) (`2024-10-10T16:15:09.080`)
- [CVE-2024-9794](CVE-2024/CVE-2024-97xx/CVE-2024-9794.json) (`2024-10-10T16:15:09.350`)
- [CVE-2024-9797](CVE-2024/CVE-2024-97xx/CVE-2024-9797.json) (`2024-10-10T17:15:16.063`)
- [CVE-2024-9799](CVE-2024/CVE-2024-97xx/CVE-2024-9799.json) (`2024-10-10T17:15:16.390`)
- [CVE-2024-9803](CVE-2024/CVE-2024-98xx/CVE-2024-9803.json) (`2024-10-10T17:15:16.730`)
- [CVE-2024-47354](CVE-2024/CVE-2024-473xx/CVE-2024-47354.json) (`2024-10-10T19:15:16.837`)
- [CVE-2024-47636](CVE-2024/CVE-2024-476xx/CVE-2024-47636.json) (`2024-10-10T18:15:07.920`)
- [CVE-2024-47648](CVE-2024/CVE-2024-476xx/CVE-2024-47648.json) (`2024-10-10T19:15:17.067`)
- [CVE-2024-47962](CVE-2024/CVE-2024-479xx/CVE-2024-47962.json) (`2024-10-10T18:15:08.183`)
- [CVE-2024-47963](CVE-2024/CVE-2024-479xx/CVE-2024-47963.json) (`2024-10-10T18:15:08.330`)
- [CVE-2024-47964](CVE-2024/CVE-2024-479xx/CVE-2024-47964.json) (`2024-10-10T18:15:08.470`)
- [CVE-2024-47965](CVE-2024/CVE-2024-479xx/CVE-2024-47965.json) (`2024-10-10T18:15:08.587`)
- [CVE-2024-47966](CVE-2024/CVE-2024-479xx/CVE-2024-47966.json) (`2024-10-10T18:15:08.710`)
- [CVE-2024-9804](CVE-2024/CVE-2024-98xx/CVE-2024-9804.json) (`2024-10-10T18:15:09.150`)
- [CVE-2024-9805](CVE-2024/CVE-2024-98xx/CVE-2024-9805.json) (`2024-10-10T18:15:09.440`)
- [CVE-2024-9806](CVE-2024/CVE-2024-98xx/CVE-2024-9806.json) (`2024-10-10T19:15:17.520`)
- [CVE-2024-9807](CVE-2024/CVE-2024-98xx/CVE-2024-9807.json) (`2024-10-10T19:15:17.797`)
### CVEs modified in the last Commit
Recently modified CVEs: `50`
Recently modified CVEs: `24`
- [CVE-2023-49262](CVE-2023/CVE-2023-492xx/CVE-2023-49262.json) (`2024-10-10T16:15:06.893`)
- [CVE-2023-5378](CVE-2023/CVE-2023-53xx/CVE-2023-5378.json) (`2024-10-10T16:15:07.540`)
- [CVE-2023-6551](CVE-2023/CVE-2023-65xx/CVE-2023-6551.json) (`2024-10-10T16:15:07.720`)
- [CVE-2023-6998](CVE-2023/CVE-2023-69xx/CVE-2023-6998.json) (`2024-10-10T16:15:07.850`)
- [CVE-2024-0864](CVE-2024/CVE-2024-08xx/CVE-2024-0864.json) (`2024-10-10T16:15:07.990`)
- [CVE-2024-1604](CVE-2024/CVE-2024-16xx/CVE-2024-1604.json) (`2024-10-10T16:15:08.103`)
- [CVE-2024-1605](CVE-2024/CVE-2024-16xx/CVE-2024-1605.json) (`2024-10-10T16:15:08.220`)
- [CVE-2024-2759](CVE-2024/CVE-2024-27xx/CVE-2024-2759.json) (`2024-10-10T16:15:08.360`)
- [CVE-2024-3462](CVE-2024/CVE-2024-34xx/CVE-2024-3462.json) (`2024-10-10T16:15:08.497`)
- [CVE-2024-35202](CVE-2024/CVE-2024-352xx/CVE-2024-35202.json) (`2024-10-10T16:35:11.390`)
- [CVE-2024-35687](CVE-2024/CVE-2024-356xx/CVE-2024-35687.json) (`2024-10-10T16:59:04.827`)
- [CVE-2024-41817](CVE-2024/CVE-2024-418xx/CVE-2024-41817.json) (`2024-10-10T17:25:47.637`)
- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2024-10-10T17:57:00.267`)
- [CVE-2024-44958](CVE-2024/CVE-2024-449xx/CVE-2024-44958.json) (`2024-10-10T17:56:24.467`)
- [CVE-2024-44959](CVE-2024/CVE-2024-449xx/CVE-2024-44959.json) (`2024-10-10T17:54:07.960`)
- [CVE-2024-44976](CVE-2024/CVE-2024-449xx/CVE-2024-44976.json) (`2024-10-10T17:50:14.863`)
- [CVE-2024-44977](CVE-2024/CVE-2024-449xx/CVE-2024-44977.json) (`2024-10-10T17:47:59.593`)
- [CVE-2024-44979](CVE-2024/CVE-2024-449xx/CVE-2024-44979.json) (`2024-10-10T17:44:36.417`)
- [CVE-2024-44980](CVE-2024/CVE-2024-449xx/CVE-2024-44980.json) (`2024-10-10T17:42:53.433`)
- [CVE-2024-44982](CVE-2024/CVE-2024-449xx/CVE-2024-44982.json) (`2024-10-10T17:09:54.350`)
- [CVE-2024-44984](CVE-2024/CVE-2024-449xx/CVE-2024-44984.json) (`2024-10-10T16:48:56.167`)
- [CVE-2024-44988](CVE-2024/CVE-2024-449xx/CVE-2024-44988.json) (`2024-10-10T16:44:14.767`)
- [CVE-2024-4748](CVE-2024/CVE-2024-47xx/CVE-2024-4748.json) (`2024-10-10T16:15:08.630`)
- [CVE-2024-7265](CVE-2024/CVE-2024-72xx/CVE-2024-7265.json) (`2024-10-10T16:15:08.763`)
- [CVE-2024-7266](CVE-2024/CVE-2024-72xx/CVE-2024-7266.json) (`2024-10-10T16:15:08.910`)
- [CVE-2017-1000487](CVE-2017/CVE-2017-10004xx/CVE-2017-1000487.json) (`2024-10-10T19:55:20.253`)
- [CVE-2022-22969](CVE-2022/CVE-2022-229xx/CVE-2022-22969.json) (`2024-10-10T19:13:58.310`)
- [CVE-2024-20091](CVE-2024/CVE-2024-200xx/CVE-2024-20091.json) (`2024-10-10T18:06:38.370`)
- [CVE-2024-20093](CVE-2024/CVE-2024-200xx/CVE-2024-20093.json) (`2024-10-10T18:06:57.333`)
- [CVE-2024-20095](CVE-2024/CVE-2024-200xx/CVE-2024-20095.json) (`2024-10-10T18:07:22.267`)
- [CVE-2024-20096](CVE-2024/CVE-2024-200xx/CVE-2024-20096.json) (`2024-10-10T18:07:38.557`)
- [CVE-2024-20097](CVE-2024/CVE-2024-200xx/CVE-2024-20097.json) (`2024-10-10T18:07:52.507`)
- [CVE-2024-20102](CVE-2024/CVE-2024-201xx/CVE-2024-20102.json) (`2024-10-10T18:20:31.820`)
- [CVE-2024-30118](CVE-2024/CVE-2024-301xx/CVE-2024-30118.json) (`2024-10-10T18:50:54.383`)
- [CVE-2024-44954](CVE-2024/CVE-2024-449xx/CVE-2024-44954.json) (`2024-10-10T18:02:42.307`)
- [CVE-2024-46300](CVE-2024/CVE-2024-463xx/CVE-2024-46300.json) (`2024-10-10T18:52:42.790`)
- [CVE-2024-47410](CVE-2024/CVE-2024-474xx/CVE-2024-47410.json) (`2024-10-10T18:26:44.857`)
- [CVE-2024-47411](CVE-2024/CVE-2024-474xx/CVE-2024-47411.json) (`2024-10-10T18:26:54.153`)
- [CVE-2024-47412](CVE-2024/CVE-2024-474xx/CVE-2024-47412.json) (`2024-10-10T18:27:02.867`)
- [CVE-2024-47413](CVE-2024/CVE-2024-474xx/CVE-2024-47413.json) (`2024-10-10T18:27:08.210`)
- [CVE-2024-47414](CVE-2024/CVE-2024-474xx/CVE-2024-47414.json) (`2024-10-10T18:27:17.123`)
- [CVE-2024-47415](CVE-2024/CVE-2024-474xx/CVE-2024-47415.json) (`2024-10-10T18:27:30.467`)
- [CVE-2024-47416](CVE-2024/CVE-2024-474xx/CVE-2024-47416.json) (`2024-10-10T18:27:39.187`)
- [CVE-2024-47417](CVE-2024/CVE-2024-474xx/CVE-2024-47417.json) (`2024-10-10T18:27:46.470`)
- [CVE-2024-47418](CVE-2024/CVE-2024-474xx/CVE-2024-47418.json) (`2024-10-10T18:28:04.387`)
- [CVE-2024-47419](CVE-2024/CVE-2024-474xx/CVE-2024-47419.json) (`2024-10-10T18:28:19.330`)
- [CVE-2024-47420](CVE-2024/CVE-2024-474xx/CVE-2024-47420.json) (`2024-10-10T18:28:26.860`)
- [CVE-2024-7801](CVE-2024/CVE-2024-78xx/CVE-2024-7801.json) (`2024-10-10T18:48:37.270`)
- [CVE-2024-9054](CVE-2024/CVE-2024-90xx/CVE-2024-9054.json) (`2024-10-10T18:46:08.743`)
## Download and Usage

View File

@ -94063,7 +94063,7 @@ CVE-2017-1000483,0,0,2c782e716e646464be3ff1c28e8962cef86475bfaafb3e5b53340fee0d5
CVE-2017-1000484,0,0,dca237d697eeaf1adf4df9dc3fe43bba4871b23225ab8d5ea64d75a83c91b7c7,2018-01-18T22:39:31.510000
CVE-2017-1000485,0,0,9712b765c25719d687e98f07dbc6c374e8514510a8409ec752de40b515fcd95a,2019-10-03T00:03:26.223000
CVE-2017-1000486,0,0,e1b0bf8479f211a6c6c4b3e7c0ee2cac4c56bbddcbe5cf37242188c85895a04f,2018-01-24T14:05:05.860000
CVE-2017-1000487,0,0,4729907ee0b177103f48a95d1f8d5daf8dcbec0d92e0cbc66a472c6df9cecea3,2023-11-07T02:37:57.687000
CVE-2017-1000487,0,1,fe2a151eaded6eb7758df45258122f096dcee65ffe680c74a0a383861f8cbd30,2024-10-10T19:55:20.253000
CVE-2017-1000488,0,0,259d9550f380c60535f60918d3312a959d6ffda0c46bc64ece9306a6bf27a222,2021-01-25T16:51:54.423000
CVE-2017-1000489,0,0,be1903f47143d543c423ca8dcfc5ba1434d844fb3f1a7cb442e985e1df4e4331,2021-01-25T16:51:54.423000
CVE-2017-1000490,0,0,e8418584a1c0602ae01cefc26bb42542d505599f78913768c7bdde7f81f021ec,2021-01-25T16:51:54.423000
@ -170947,9 +170947,9 @@ CVE-2021-25087,0,0,19e5de177e018eddf6d5a6875036f53b78d429deae8efad633fa9b91298bb
CVE-2021-25088,0,0,bee661c44eb6e65b60a9fe52fbaf1b4775a92328a5411f570fc6063c67f7c58f,2022-06-30T14:24:30.540000
CVE-2021-25089,0,0,05895cbf1b9443f106297e5a92634828df29f4af7bea5d81a44de2796a1dcd7d,2022-02-04T18:01:22.500000
CVE-2021-25090,0,0,26860aa3f36d9e491890e7d184049cf51fe3e428cd51d8077cad8e49275b8957,2022-04-15T17:47:52.203000
CVE-2021-25091,0,1,8f745090ccc214dd2d75ed946d82ed1b8ab0a89279191b5a9c71a893e0773959,2024-10-10T16:59:04.827000
CVE-2021-25092,0,1,7208f7393a679602468fe51538ce3b460fd0f12c45d7cc136ad2af27660acbff,2024-10-10T16:59:04.827000
CVE-2021-25093,0,1,c497c0cbefa1ee70d7e5d10f8442a98df74e697472aa9c3039a2ca06c18921f7,2024-10-10T16:59:04.827000
CVE-2021-25091,0,0,8f745090ccc214dd2d75ed946d82ed1b8ab0a89279191b5a9c71a893e0773959,2024-10-10T16:59:04.827000
CVE-2021-25092,0,0,7208f7393a679602468fe51538ce3b460fd0f12c45d7cc136ad2af27660acbff,2024-10-10T16:59:04.827000
CVE-2021-25093,0,0,c497c0cbefa1ee70d7e5d10f8442a98df74e697472aa9c3039a2ca06c18921f7,2024-10-10T16:59:04.827000
CVE-2021-25094,0,0,dd533dc3cc92acef1f59bb6a4350acbdf9cca7aaabbf023b4f276daed6440190,2022-11-09T21:26:14.653000
CVE-2021-25095,0,0,8c78162e663a846060fb12d9533a13fc81591ecca36fca2f037661d2c2237d5e,2022-12-09T18:55:26.423000
CVE-2021-25096,0,0,fd5053d87489fe09b1d48cb8e7c1b0f4ca149e5e22ee43ef2fa1caa855f416a6,2022-02-10T22:07:50.717000
@ -181126,12 +181126,12 @@ CVE-2021-39114,0,0,91bb300b928a2e7c1d42863cf149e080ec34fb17bb3f12f372376e10a70a3
CVE-2021-39115,0,0,3edadea3bb79510465312b5ed43b357dd9837c0ef0dbf8d050d2cfbe35d4b421,2022-04-25T18:16:18.227000
CVE-2021-39116,0,0,a42315d93d2fd10c554b2c15934daf6b946942b74ba2ba4fbf662199cd5b29b6,2022-03-28T16:18:14.047000
CVE-2021-39117,0,0,0f5bdd3a21f39c9eaa09674f49f313b346bf46d979c65d077a542c986dc638e1,2021-09-02T02:41:23.137000
CVE-2021-39118,0,1,1dca3fcc868d73a6830344f61fc34a24f260e3fea15472c3de321b7e44e97c44,2024-10-10T16:35:00.827000
CVE-2021-39118,0,0,1dca3fcc868d73a6830344f61fc34a24f260e3fea15472c3de321b7e44e97c44,2024-10-10T16:35:00.827000
CVE-2021-39119,0,0,19d82c9ad15e2315e337669b0ea8aa57ac063c6e8f2ab13ad8070419810cfcfb,2022-07-12T17:42:04.277000
CVE-2021-3912,0,0,e8c5a6132b4c804f3ef396cb77b6bb9032c86570b20db73e367107d41f114ccb,2022-08-09T14:39:02.117000
CVE-2021-39121,0,0,633d5656fffda0e45c49d4bc8d151e90cce078ce60d3d369ea3f30579930e1fe,2022-03-30T13:29:49.280000
CVE-2021-39122,0,1,26149ef002d4e9a7fb45aff5028aefd1ed4c77fde5f79f78add3a2655fb29488,2024-10-10T16:35:01.610000
CVE-2021-39123,0,1,d8ded4795afd17038afe886f1f3897d474faab2d00d931d0d440eecea5b8aa41,2024-10-10T16:35:02.213000
CVE-2021-39122,0,0,26149ef002d4e9a7fb45aff5028aefd1ed4c77fde5f79f78add3a2655fb29488,2024-10-10T16:35:01.610000
CVE-2021-39123,0,0,d8ded4795afd17038afe886f1f3897d474faab2d00d931d0d440eecea5b8aa41,2024-10-10T16:35:02.213000
CVE-2021-39124,0,0,2b58fd447d3cafa91334dabd9357b993b27ae7c16f1985b8ba8afc2558c4088b,2022-02-24T20:18:49.327000
CVE-2021-39125,0,0,4c8f1895e82d1bcd913a7b42e9a1b5d82429da426af796f023bfb884e96ba7ec,2024-10-09T17:35:02.380000
CVE-2021-39126,0,0,c5fcfc69aba84d73b9f8c74c936a36d81151cadeddc7fa2ff49085a699b83f32,2022-04-15T15:29:12.737000
@ -192195,7 +192195,7 @@ CVE-2022-22965,0,0,2f519047b5be7b5c3f740bb5079cac81215716a27fbb5a4a7014ed00bba97
CVE-2022-22966,0,0,cbd6dd93b6a16428418469cc7e7df48ccddd4621e61eb17f42baa53a218153a5,2022-04-22T15:54:21.460000
CVE-2022-22967,0,0,5d3cbaf95f637bfc190cb5e394da4e7c5b2b3716a498c6a0bccb9201ece5f423,2023-12-21T18:44:00.137000
CVE-2022-22968,0,0,76d2d0e04e7a2561ee37c3b7751375bfc36c7f92b02395c774552bc434e32869,2022-10-19T15:15:02.103000
CVE-2022-22969,0,0,73d67e70fab7f7178c157bb0b6b0b030bd964048ff40d5e3dc8b300936044056,2023-08-08T14:22:24.967000
CVE-2022-22969,0,1,abbb62a9ae0a4ff9429cdf938c758920e7b6f332d1fce63b31d08e57e955cdbc,2024-10-10T19:13:58.310000
CVE-2022-2297,0,0,4ef9b306875b455f4c7b78b1739f984226e0ad348ea6f2264c92121001a18d12,2024-09-07T12:56:42.300000
CVE-2022-22970,0,0,d980c314d1c11d3685960089d98db960d9c321630b3b200ca331bc9f8185909b,2022-10-07T13:17:11.233000
CVE-2022-22971,0,0,496751d18943e5335d8ad064b55f3d5280912afd4eb0d251bf18e253a42fb0b5,2022-10-05T16:54:41.663000
@ -207577,7 +207577,7 @@ CVE-2022-41986,0,0,ee6e9ef066ba8c5459920520ed62fd3d1ecc23c4fd518353f99769eb13ab0
CVE-2022-41987,0,0,973b71f1dab2e2d56c71d687723d5c44031c8553347583b75d1661405fd6e442,2023-05-31T22:47:06.207000
CVE-2022-41988,0,0,d84d73f7ebcefc94a40d46de0942ff010bc2553936ab9fef99b206cfa4aec137,2023-05-30T06:15:24.370000
CVE-2022-41989,0,0,3ac83e6f430f25af669f4a1c5f38227f6c1e7b17a93a5ca5588faf3f237ae764,2023-11-07T03:53:11.200000
CVE-2022-4199,0,1,e8ddc903285ebf1515513113098cbd32df397061ee6caf54c2302be597b7fb65,2024-10-10T16:59:04.827000
CVE-2022-4199,0,0,e8ddc903285ebf1515513113098cbd32df397061ee6caf54c2302be597b7fb65,2024-10-10T16:59:04.827000
CVE-2022-41990,0,0,9034b3c666ccb8516dcb1cb446205c1217b17de23ff758726eeef9b5ab2a0cb9,2024-01-24T18:44:19.600000
CVE-2022-41991,0,0,59d444d31b0a538de290798d8cadedf1819a417ebd6154c3e1e4a9a386d6b539,2023-02-06T17:28:53.793000
CVE-2022-41992,0,0,baf225fe84f3f52e61816c353969d1e421b989ba6be07e7177d1f64b7bd91e9f,2022-12-22T13:08:10.897000
@ -215083,12 +215083,12 @@ CVE-2023-20823,0,0,e5030abbdc1b76a1fdf724e78a79e9447430af00d8598a10a707b12f48ab9
CVE-2023-20824,0,0,6caacf9d3f8a58027c0dab9caf4b9b264fdfa1d70dcd710a95edcc7d198dbed4,2023-09-07T19:06:55.563000
CVE-2023-20825,0,0,3b7e714e9925156ab37c943a82248f5bb6cc462ec9ffd9479518f0eaa72d4ea8,2023-09-07T19:14:16.880000
CVE-2023-20826,0,0,f19cc9ee6c42e884beea40f74b7dd27c757677880dca33965287532349a24c24,2023-09-07T19:13:15.787000
CVE-2023-20827,0,1,83bbd7748b521833d1c4e47e1d930c6efc13da73425f93940cd5870a89858ab8,2024-10-10T16:35:03.543000
CVE-2023-20828,0,1,f7fc852afc53227ebfac9ed12d8d9bf27249e792c863286dbe616fd7f942976d,2024-10-10T16:35:04.517000
CVE-2023-20829,0,1,dfa93302be3736a2d42f62642d511aa3a1c70f4594e227fe1b2a98e2c69bf4d9,2024-10-10T16:35:05.527000
CVE-2023-20827,0,0,83bbd7748b521833d1c4e47e1d930c6efc13da73425f93940cd5870a89858ab8,2024-10-10T16:35:03.543000
CVE-2023-20828,0,0,f7fc852afc53227ebfac9ed12d8d9bf27249e792c863286dbe616fd7f942976d,2024-10-10T16:35:04.517000
CVE-2023-20829,0,0,dfa93302be3736a2d42f62642d511aa3a1c70f4594e227fe1b2a98e2c69bf4d9,2024-10-10T16:35:05.527000
CVE-2023-2083,0,0,cee4396e30e25258287b1e489d3bf3b3f1eef2f0033a51dfea6bffe2ec1286c2,2023-11-07T04:11:54.640000
CVE-2023-20830,0,1,6a02392b6a6fe91a83233632455d7b661d82c5d0733c61d40940a5da6781c68c,2024-10-10T16:35:07.153000
CVE-2023-20831,0,1,a7bd9cc2fd769f7a7f78cbf92dbd0df138f255abd6200025975d1d20633911f3,2024-10-10T16:35:08.083000
CVE-2023-20830,0,0,6a02392b6a6fe91a83233632455d7b661d82c5d0733c61d40940a5da6781c68c,2024-10-10T16:35:07.153000
CVE-2023-20831,0,0,a7bd9cc2fd769f7a7f78cbf92dbd0df138f255abd6200025975d1d20633911f3,2024-10-10T16:35:08.083000
CVE-2023-20832,0,0,05c466968e672a55e813b676aa2e07e30bcd43922fbe2ea39969f9ca4c1ecc0c,2024-10-04T15:35:02.997000
CVE-2023-20833,0,0,0d4fbfbfcfca4b8d072b58089465cf19c7295168fffc28d5689dd850a4e87f39,2023-09-07T19:08:21.983000
CVE-2023-20834,0,0,2fa6eb5f722248d938b7f55db6fa9eb5c85a7a23b1dd1c297a61b4fbff51fb9d,2023-09-07T19:08:44.343000
@ -219117,7 +219117,7 @@ CVE-2023-25577,0,0,5ee92e0558fbce9bd773a8afe897565bfdaa982c0f4ad7e71e954409a79ac
CVE-2023-25578,0,0,a34c5a3bd74c9feff4c9c3173b48f4aebcbdb41926b496db508268725eb1d80a,2023-11-07T04:09:01.430000
CVE-2023-25579,0,0,a6c9e68a845dd568c2130b08183545a22df0a4df1e1473c0c5450b50e5f8d3f7,2023-03-03T15:09:20.680000
CVE-2023-2558,0,0,b36d9018fbad440af935b7a05f8181b9f5920728ee39953642c99c7cad89beda,2023-11-07T04:12:52.760000
CVE-2023-25581,1,1,579c0aad7d867cae9a73ee2c9d8422836a716e4fd5e18a78c07bdbbb7a948afa,2024-10-10T16:15:04.923000
CVE-2023-25581,0,0,579c0aad7d867cae9a73ee2c9d8422836a716e4fd5e18a78c07bdbbb7a948afa,2024-10-10T16:15:04.923000
CVE-2023-25582,0,0,232d943891f8f503b5ec3e85110e47e18b7fb6075027f0a7fcc0c9807f79fac9,2023-07-12T15:05:19.617000
CVE-2023-25583,0,0,90cb5ae4facc7427ba0ec7a3aba488de3ea49316450585c3a592993efe3ec3d7,2023-07-12T15:18:34.447000
CVE-2023-25584,0,0,28b5e4e1071105b09a7a0fe37c814dcf7b81d264417fa64df5b4f0851185a205,2024-02-23T18:51:09.787000
@ -219297,7 +219297,7 @@ CVE-2023-25769,0,0,198ca9c61d051c8c694de7cff750ffa8d39aeb715958a8ab2b3e781df2601
CVE-2023-25770,0,0,c196f3f59a9ed379f3033392f5332da695ce96226441cec597553d40d2c90803,2024-04-22T16:15:12.870000
CVE-2023-25771,0,0,0a40ade9e4b633e2e25c64b41412f6cf20b10475ee3b92ce849eec7e304b725e,2023-11-07T04:09:10.947000
CVE-2023-25772,0,0,a0a863d580e53f497e70eeff0d4bd28ff51b949ec7490c2b052c7aaa57fffae7,2023-11-07T04:09:11.190000
CVE-2023-25773,0,1,c8a4a4c116ed5d896279b6cb93fadbf0a6a145a41b80291e643b9b92633bb181,2024-10-10T16:35:09.100000
CVE-2023-25773,0,0,c8a4a4c116ed5d896279b6cb93fadbf0a6a145a41b80291e643b9b92633bb181,2024-10-10T16:35:09.100000
CVE-2023-25774,0,0,50f00eb85c9a6f3939ad3ac3d2f8701f08cab7d7ec6691ef9981e83d63419194,2023-10-18T17:53:08.367000
CVE-2023-25775,0,0,9e0931d7bb83de9c26f9ad076dcda45420d6c5a1e995b56352243c3259380610,2024-01-11T21:15:10.030000
CVE-2023-25776,0,0,a5c9a6507e4e8061236842380ca8385e80281fc571d20401f84423392270b8fa,2023-11-07T04:09:11.693000
@ -219525,7 +219525,7 @@ CVE-2023-26022,0,0,e0cd395060def6af839f53ca17359e6fe07ff5b74e3efa90c2588e10aba9c
CVE-2023-26023,0,0,bf7f45eb43f656e5a2c0034397287ee8bde96ac526309a673ae112ef759ff9a6,2023-07-28T14:02:42.573000
CVE-2023-26024,0,0,db59bc89cdf9d3cbfb06338ac5b62513dd0547a1a4f051c439caafcace4d191b,2023-12-06T18:51:10.323000
CVE-2023-26026,0,0,9d4fc8ae77db69c6c04dc4dd3fae29dc591b099947fecb438ca71d1c94800582,2023-07-28T16:36:20.187000
CVE-2023-2603,0,1,4a60df169eea5dff83ba6df411dcf1103a34959027fdc74feb414d60c9098ed0,2024-10-10T16:32:56.777000
CVE-2023-2603,0,0,4a60df169eea5dff83ba6df411dcf1103a34959027fdc74feb414d60c9098ed0,2024-10-10T16:32:56.777000
CVE-2023-26031,0,0,3c1225c9f1cc3a824a50548b415ab5a795739af789c2ff216b590967c4819438,2024-08-01T13:43:31.307000
CVE-2023-26032,0,0,73f981053207ef66bd42c47f91689994979ec8c8290fe7f9acad2a7d7aba765e,2023-11-07T04:09:17.300000
CVE-2023-26033,0,0,e9bef52edabfb15f3fd145610458b9c83a92e0d7fa6697fbaccc32ad54c639c0,2023-03-06T18:54:30.003000
@ -231957,9 +231957,9 @@ CVE-2023-42130,0,0,0241b38800c234ec8e4a2ff16f40e83d68c56ec86a9b4257cd78b46e40a43
CVE-2023-42131,0,0,4e0f01a335565af1d2caffbcb3515b0a5bc3abdb5520eb1e67adabde374601fe,2024-09-18T19:15:36.553000
CVE-2023-42132,0,0,b3614605e58c2ad6bb3381e3dd9a9ae21953bc0309c61010e3af35ddfe93114f,2023-10-03T20:56:24.067000
CVE-2023-42134,0,0,4ee57071d16fbebb2fd73b2c73a537f320f9d80ad77a4c87162327571d527be7,2024-01-19T16:14:39.460000
CVE-2023-42135,0,1,afc51742bb55c141f44e3c071a949b928f7fc168a8f3df1a2cc739282f45f1b6,2024-10-10T16:15:05.690000
CVE-2023-42136,0,1,3cb425be70508b6a679f0aab3db264515ab3c51689b6da64cb1007c415646915,2024-10-10T16:15:05.880000
CVE-2023-42137,0,1,c966cfe4f9f72b0b343b6e5bc55f130bed0f505de6f9e1585674a3d65dbc321f,2024-10-10T16:15:06.090000
CVE-2023-42135,0,0,afc51742bb55c141f44e3c071a949b928f7fc168a8f3df1a2cc739282f45f1b6,2024-10-10T16:15:05.690000
CVE-2023-42136,0,0,3cb425be70508b6a679f0aab3db264515ab3c51689b6da64cb1007c415646915,2024-10-10T16:15:05.880000
CVE-2023-42137,0,0,c966cfe4f9f72b0b343b6e5bc55f130bed0f505de6f9e1585674a3d65dbc321f,2024-10-10T16:15:06.090000
CVE-2023-42138,0,0,229b19fe75a25194eeeceeed8dd7d2cb66ba39737de630ef3ead70362964246b,2023-10-18T19:57:05.243000
CVE-2023-4214,0,0,819da04ab354ee39aabca649e2dd617af7bc8556f065736471274ad51ec00604,2023-11-25T02:12:54.557000
CVE-2023-42143,0,0,6c09d38ca58ec27b89dd2edb91a7d385bfff81e0d5504c4d608be4afbef841ea,2024-01-31T16:57:18.603000
@ -234032,7 +234032,7 @@ CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694
CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000
CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000
CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000
CVE-2023-4537,0,1,eea3b8def9553f8b072fdf468cb4f4f9b040c5e8850ac6668a829484a8fdd935,2024-10-10T16:15:06.990000
CVE-2023-4537,0,0,eea3b8def9553f8b072fdf468cb4f4f9b040c5e8850ac6668a829484a8fdd935,2024-10-10T16:15:06.990000
CVE-2023-45370,0,0,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000
CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000
CVE-2023-45372,0,0,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000
@ -234057,7 +234057,7 @@ CVE-2023-45391,0,0,9c0fd5516832886de6f7034699893261e3bea437e0ea5d4edc791da17fd46
CVE-2023-45393,0,0,c1fb02f3a6040b11d75e76a87aac1d917a2141d0d313b00964f7b7e953d37259,2023-10-20T17:09:10.553000
CVE-2023-45394,0,0,a4b4f063ff375dd7ab74a1a8d1c641e98ad0cb4a4cc340067fe632ab3db64424,2023-10-30T15:29:24.470000
CVE-2023-45396,0,0,a9c3245ef3981c277f6e35bb37ce5839a8934f2abfbc3e4742e599437dabb487,2023-11-07T04:21:45.490000
CVE-2023-4540,0,1,454dcfbbb42131d02ef2de39e6b50d769b0e902beec03a837e810055e3fa53c4,2024-10-10T16:15:07.110000
CVE-2023-4540,0,0,454dcfbbb42131d02ef2de39e6b50d769b0e902beec03a837e810055e3fa53c4,2024-10-10T16:15:07.110000
CVE-2023-4541,0,0,e6c5b595e1802a5ff24ab31b4fe094c0626b7d35f33552e6362bd8cefaa24697,2024-01-08T18:49:41.183000
CVE-2023-4542,0,0,08b69d675d8a1c1e0ff7f35c28444e73725292dffb22cba8268ef60d8afdb0cd,2024-05-17T02:31:38.280000
CVE-2023-4543,0,0,dc1ba3a33cff31b8fca78e8cb21ccb021964ab63d67083a56dc6088e7b3319cb,2024-05-17T02:31:38.390000
@ -234537,7 +234537,7 @@ CVE-2023-46116,0,0,32b4d7ad1ade33016b0db1435d5658983da94db4596e866b4681196d84a04
CVE-2023-46117,0,0,121f23ec03c8bfaf7add309657ccc2b1ffeb80e620568dd23fbae288673558b3,2023-10-28T03:48:19.117000
CVE-2023-46118,0,0,2aa54fb6f1645b23b925b0febacb85bd2e2906b6fd47ae5d3d57a7dea4fa70d4,2023-12-14T01:15:08.103000
CVE-2023-46119,0,0,188517dc1713ce67d106802c5ad12899f4256143eda10dbeb48b8cf0d28ac511,2023-11-01T17:09:01.520000
CVE-2023-4612,0,1,01d7a15f58bf2babc855c5767a299377da4c90f0f3df23aa6271c6ffec670599,2024-10-10T16:15:07.260000
CVE-2023-4612,0,0,01d7a15f58bf2babc855c5767a299377da4c90f0f3df23aa6271c6ffec670599,2024-10-10T16:15:07.260000
CVE-2023-46120,0,0,6e468d84efc420bb6523b981da81618dcba67cf9ae9e183627575d464dc63c85,2023-11-01T16:42:03.003000
CVE-2023-46121,0,0,b7e0c927c4dcd3e846e6bd7603e2bace09835d7b7a24801aa9322bb54baaa1f8,2023-11-22T15:05:37.027000
CVE-2023-46122,0,0,77ece346cd29f8df5fbc9b6dc7a110d1754062db3ff45e353933b3597d9c5458,2023-10-31T14:52:24.573000
@ -235948,7 +235948,7 @@ CVE-2023-4817,0,0,66b9317b8b341b3c6f85e7870e90748e4d6a86dfea30b64fc5b4019933f60d
CVE-2023-48171,0,0,6326cb8d81d428a9f4381270fc2ce963d0ad0058312b77c3d694b3258e3a7cbb,2024-09-18T18:54:08.080000
CVE-2023-48172,0,0,0e78c6c737f4aa94c295f39e3b2f6c04b05dd97deb3b6a7475ffc20424f8ee86,2023-12-09T04:46:27.490000
CVE-2023-48176,0,0,5229479ea70d793012d98b28f5832b18c29ca0585926ac2e2e1991c088531620,2023-11-30T20:21:54.850000
CVE-2023-4818,0,1,c9f685e7feb9907c1838dc5c22479dcdaf800947aa0e477285b5b32cee6e423c,2024-10-10T16:15:07.403000
CVE-2023-4818,0,0,c9f685e7feb9907c1838dc5c22479dcdaf800947aa0e477285b5b32cee6e423c,2024-10-10T16:15:07.403000
CVE-2023-48183,0,0,e30177454f59bb0f06584d26feaa9f110fa0ec2af3bd7711cda6932b65226702,2024-07-03T01:42:18.010000
CVE-2023-48184,0,0,2a3c5af64fd53e932537ccff83557b108ba1700dbb22cbbe968d9532a829a3fb,2024-07-03T01:42:18.813000
CVE-2023-48185,0,0,fb1a8a21d098ed36db5f2ffae494f226b32c201c926520d79e5da8af6f3638dd,2023-12-02T00:21:40.093000
@ -236868,14 +236868,14 @@ CVE-2023-49252,0,0,6696676ea138bbbe3898a0462d8349d55e4aa53c82758205c6683cad9207a
CVE-2023-49253,0,0,39190be26437367f0cb128dcd19588699a00c78d11d0cabd94b801e94a74f9b6,2024-01-18T21:14:22.820000
CVE-2023-49254,0,0,f34419f08bdce6ccb5f0124295abfdffd452c9485f4a1c06bc7fd8b241598e11,2024-01-18T21:14:11.877000
CVE-2023-49255,0,0,bc83c3f00ff6ea1845ee64d5acf6a80c765b032e9814e7dcd665e4aa5a04acbc,2024-01-19T02:11:57.800000
CVE-2023-49256,0,1,1fe21d50c5e8b0fde1b1aeab802f4db220d1674b9d434fbf5d6ee24127c69ec7,2024-10-10T16:15:06.313000
CVE-2023-49257,0,1,c31f878e5552c04f8a82115b35872a15a6ed05c684d69a1210e2832df83e342b,2024-10-10T16:15:06.553000
CVE-2023-49256,0,0,1fe21d50c5e8b0fde1b1aeab802f4db220d1674b9d434fbf5d6ee24127c69ec7,2024-10-10T16:15:06.313000
CVE-2023-49257,0,0,c31f878e5552c04f8a82115b35872a15a6ed05c684d69a1210e2832df83e342b,2024-10-10T16:15:06.553000
CVE-2023-49258,0,0,a15e9f4b25aa211e384ddcd9096065a9180748cd045a91be89f41ec1efaa7319,2024-01-18T20:38:29.220000
CVE-2023-49259,0,1,ec3adc3a7840a7661f1b002dec4a07aa624dd034829c5b4ec8b6632211624a03,2024-10-10T16:15:06.680000
CVE-2023-49259,0,0,ec3adc3a7840a7661f1b002dec4a07aa624dd034829c5b4ec8b6632211624a03,2024-10-10T16:15:06.680000
CVE-2023-4926,0,0,f04445011a7b61f0239196a2a3d2a11a7cfa48d9f67d70f794613b5affd23cb6,2023-11-07T04:23:10.633000
CVE-2023-49260,0,0,eacaa360b74b478231fd0a67d27793e1aa2a71bc28ed6337e23a0f3affc2630c,2024-01-18T20:22:01.957000
CVE-2023-49261,0,1,ab12768ceb84db446d13551e51716c39b487b5e822d367a966090eb33f0ba06c,2024-10-10T16:15:06.787000
CVE-2023-49262,0,1,274063e158f489d41be2d722570f9ed9c17604ee5dffa76726e2ba1ea7a07b0e,2024-10-10T16:15:06.893000
CVE-2023-49261,0,0,ab12768ceb84db446d13551e51716c39b487b5e822d367a966090eb33f0ba06c,2024-10-10T16:15:06.787000
CVE-2023-49262,0,0,274063e158f489d41be2d722570f9ed9c17604ee5dffa76726e2ba1ea7a07b0e,2024-10-10T16:15:06.893000
CVE-2023-49269,0,0,028a4e58082cf4ef8da9a9e284540f563d62594be00f2afffe30cf24bc0b64ca,2023-12-27T17:17:44.617000
CVE-2023-49270,0,0,b9649fb168337300fb031c39ff29926d549e641e684c52d7e7ff666ecb63d06e,2023-12-26T21:41:07.910000
CVE-2023-49271,0,0,b7b5bb763871877cb1dd0f84ec6ac0e1261e6246273abfbaba9879bbf625ed6c,2023-12-26T21:40:42.173000
@ -239557,7 +239557,7 @@ CVE-2023-5374,0,0,bbad172aa30166f85ca2e7d3ff515943900e68e6abf27c8173e4afc98be416
CVE-2023-5375,0,0,a64347362803998112e7738c159b01f9d4276db052cc0c20b8aec7e6633c0c07,2023-10-05T18:26:45.907000
CVE-2023-5376,0,0,990cd494edefb2d9c83b147909f1f06cb068f2eb4ba15f46e74b335e88c7a2b7,2024-01-17T17:46:40.297000
CVE-2023-5377,0,0,beec2be658ee2abf7a8172d160c87ff77ea1bb8ccb609f8c80ff98d55729625c,2023-10-05T17:07:40.813000
CVE-2023-5378,0,1,609da6346e4b2cfb0c1b7e2a7e8f2a984ad4f64785ebe1bf6922b24e0ab439b8,2024-10-10T16:15:07.540000
CVE-2023-5378,0,0,609da6346e4b2cfb0c1b7e2a7e8f2a984ad4f64785ebe1bf6922b24e0ab439b8,2024-10-10T16:15:07.540000
CVE-2023-5379,0,0,2931e08b2d2958f825098c38b4e9fee27840063393b70d1f9dc8921e6c5fef26,2023-12-20T18:39:19.120000
CVE-2023-5380,0,0,cb08b877665112ae720bd7aafeb8d644ec13fe741b6b7e105c2ccf85e625dbc3,2024-09-16T16:15:08.980000
CVE-2023-5381,0,0,f4159bdba728827531b2d68c527e85df9c54a93da715a2ba38d9642e5e4ffa3f,2023-11-21T02:45:00.847000
@ -240617,7 +240617,7 @@ CVE-2023-6546,0,0,4f4e46a35eb2a1cbc8c494030b87e8c4a5413a7fdef4268737b564917a093f
CVE-2023-6547,0,0,4de5784377e5f9787f8338a046ec4c275ae6d29b8fb06be598377dd3ea6b3a4e,2023-12-14T19:31:10.497000
CVE-2023-6548,0,0,a93a0604081016c50f51b204cce97858e584569f5bc0432075c5fb69824b24a8,2024-01-25T16:45:58.287000
CVE-2023-6549,0,0,850161f4c77aa0f06b12ed2562bc348193320e4386ca4ea0ef325dd56db8dedc,2024-06-10T16:27:52.507000
CVE-2023-6551,0,1,bf9ad9148b141f0ca977f2e13f6eef6a0137ca2b6186a2363f040e09df113981,2024-10-10T16:15:07.720000
CVE-2023-6551,0,0,bf9ad9148b141f0ca977f2e13f6eef6a0137ca2b6186a2363f040e09df113981,2024-10-10T16:15:07.720000
CVE-2023-6552,0,0,280e58e9ed2dc80c0c0a43f67c21eed670b513dd1014a470571d49cccf0fc6ac,2024-01-11T21:13:09.007000
CVE-2023-6553,0,0,b5146d631beb06b07e5ca8b91ef438e8f5760824aa0920387c6fefb74ea914c5,2024-01-18T17:15:14.300000
CVE-2023-6554,0,0,2feb5ba088ff3e9dd4cf7fbd58c1eecc82f5eb18efcc3326d89df15d295f81d8,2024-01-18T17:35:46.637000
@ -241006,7 +241006,7 @@ CVE-2023-6993,0,0,58824562ab00139fd1065f90d459866d58a79c75a4afe1ed988bda594a97b5
CVE-2023-6994,0,0,98369af104a5f616fad5110292c6d21a84f6de7cb99223c15d3db3d8af92686a,2024-01-17T22:13:52.143000
CVE-2023-6996,0,0,fccc2168deda8e9a325faec73794d5557356b0d09dbb916af246ca96a67db2d3,2024-02-13T16:11:03.577000
CVE-2023-6997,0,0,6e27e5b63f0a87af454d1261575dc30b0f4ff5f301848e086587a6cca0abb399,2024-06-07T19:15:23.410000
CVE-2023-6998,0,1,d47af9cb9500ce4c322dbabda800a0d285b36e94645b23c9df839f36c73319f9,2024-10-10T16:15:07.850000
CVE-2023-6998,0,0,d47af9cb9500ce4c322dbabda800a0d285b36e94645b23c9df839f36c73319f9,2024-10-10T16:15:07.850000
CVE-2023-6999,0,0,105a70829f6eff53ac15a557cd0bd3f06555e4d64cccad8e6bdc880dc85be3d9,2024-04-10T13:24:00.070000
CVE-2023-7002,0,0,1f48f06eff9246f8921966d36b30d4b155872d4efce169cac69a0e04e201ed5d,2023-12-29T06:21:43.197000
CVE-2023-7003,0,0,e9402f475914886887087bf2c3bb459f6ae259bd32832a137b61739af9c3ed22,2024-09-25T01:15:39.957000
@ -242016,7 +242016,7 @@ CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
CVE-2024-0861,0,0,86ecba68491b7b81822881feb2da55a3f32a47f2022c25fb159df017410c6f17,2024-10-03T07:15:28.390000
CVE-2024-0862,0,0,cd566c8abfba0ca515f734ef4070df65c5856e9bf9b981d35c91f199e6054347,2024-05-14T19:17:55.627000
CVE-2024-0864,0,1,5df0a42cefa6ce6ca871e243da3f4a295df398ecbf312afeac42b693671796d2,2024-10-10T16:15:07.990000
CVE-2024-0864,0,0,5df0a42cefa6ce6ca871e243da3f4a295df398ecbf312afeac42b693671796d2,2024-10-10T16:15:07.990000
CVE-2024-0865,0,0,92ed612466d8a4d7183523d7500a321a95aa9e27cc826fa3fd89f2bb9954809a,2024-07-19T20:43:36.043000
CVE-2024-0866,0,0,fc759d49c9e441a8b12ab4ad1a997904eb8eb9894ecca01f95e8cb0572eecb6c,2024-03-26T12:55:05.010000
CVE-2024-0867,0,0,e359b89be2d490f4a35e658519a1716eaafc027d44d059518f42f8274899e25d,2024-05-24T13:03:11.993000
@ -242714,8 +242714,8 @@ CVE-2024-1600,0,0,361b3dac683b3a5ac546d616c21e4dc0f349290759dbe747906d2ebdb44b8f
CVE-2024-1601,0,0,83cf4a8caabcc81e351705b7638f02b9b11f8845346f643cabf4d0eb108d61fe,2024-04-16T13:24:07.103000
CVE-2024-1602,0,0,424c7946b86609c0593c4ee4eb3ca817d37faadfd2bd290c5bce24c66955d72e,2024-04-10T19:49:51.183000
CVE-2024-1603,0,0,7560f4eb0fe2f104ec0cc7868f6032f1be714ae3fffcb6babc4d2b97acd948b5,2024-03-25T01:51:01.223000
CVE-2024-1604,0,1,277105b8ea788ca74c9aed2acbcd50868e1b158a625c260553e18f1e3fc00dac,2024-10-10T16:15:08.103000
CVE-2024-1605,0,1,1303820adefb05fc627f5a7ece6f248c68b2369966e9fc4c3087c505496a74aa,2024-10-10T16:15:08.220000
CVE-2024-1604,0,0,277105b8ea788ca74c9aed2acbcd50868e1b158a625c260553e18f1e3fc00dac,2024-10-10T16:15:08.103000
CVE-2024-1605,0,0,1303820adefb05fc627f5a7ece6f248c68b2369966e9fc4c3087c505496a74aa,2024-10-10T16:15:08.220000
CVE-2024-1606,0,0,15a17e447d99df7418714d7ef94e3798f3d5d0e7ef6ca0dc3b7b341bddda711a,2024-03-18T12:38:25.490000
CVE-2024-1608,0,0,44224eee05265f6f7b8c8729d57dee56f28fe5925bde16e1c91e799aa3c2bf41,2024-07-03T01:45:25.227000
CVE-2024-1618,0,0,3886085aa0e530a3cd7ca87e86ea29f5f9d41baf4dd8dca3226a1b22f221980f,2024-03-12T16:02:33.900000
@ -243174,19 +243174,19 @@ CVE-2024-20088,0,0,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac94
CVE-2024-20089,0,0,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000
CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000
CVE-2024-20090,0,0,1cc27d2d83ce003b6470b40682a3b5da8b80eb4fa000f5267f5143b72241b340,2024-10-07T19:36:41.627000
CVE-2024-20091,0,0,fd45810d9aee6040d217a3937d43dd5f8802d66444422a9c5a1878bbe9948f64,2024-10-07T17:47:48.410000
CVE-2024-20091,0,1,95c1cc97fac75de79c119111dadc5f8d3a906b145632a8e99c237ca3d2d7644f,2024-10-10T18:06:38.370000
CVE-2024-20092,0,0,65830fa876d29f654e9b40a795649bd4c4172565bc9f95b5dcdf288a40258ca8,2024-10-07T19:36:41.920000
CVE-2024-20093,0,0,6b85b2af41f87789a911efc1464bf3d97201349f5e8ee337e4b206be9879b8cd,2024-10-07T17:47:48.410000
CVE-2024-20093,0,1,c7a8ea33b5c13e2cfd81c4913c1b2b72f026361290108826cf239c320fb41376,2024-10-10T18:06:57.333000
CVE-2024-20094,0,0,641953c4feffbce745824ec3b9a68aa2647d59084bfd49f0a36c52974ebad7a5,2024-10-07T19:36:42.200000
CVE-2024-20095,0,0,c87243ba660fecd88127b7dd085f3bb2b1ceefb7ee222f0d9dafc609f51271a2,2024-10-07T17:47:48.410000
CVE-2024-20096,0,0,9bab41ba3ae00524734fb2d3da1534064ae87b4f27691d9dbbc0a50dd5ae3e1d,2024-10-07T17:47:48.410000
CVE-2024-20097,0,0,8b726df278ab0147d5c79378847c893689036afb5f6e5d33fa23d78e16ccf31b,2024-10-07T17:47:48.410000
CVE-2024-20095,0,1,d6b4f4b5ca0d1c0ca9fa6a164ccd3e736674879d2a4e467b2ce89e3ecdfc36f1,2024-10-10T18:07:22.267000
CVE-2024-20096,0,1,45d32d93a320f4f6a2e9db75ef5f199b17687f055d814228fc82875df2d4036b,2024-10-10T18:07:38.557000
CVE-2024-20097,0,1,3c6ef07555d661f8c358576e6e89719e982983707258f6bd5a4a5f4d4bf6603e,2024-10-10T18:07:52.507000
CVE-2024-20098,0,0,ebf7f236d13e88b2602c1ec20190e8c7c5c76c45a773e147ba2db1178f899ee9,2024-10-07T19:36:42.660000
CVE-2024-20099,0,0,8778aa965d312369cd80f285a091e79f4ec3ef9269eaa2482f6c232a39c7df59,2024-10-07T19:36:42.860000
CVE-2024-2010,0,0,b3d54c217418fe6eaac723aeeab2da7590ea8caf84d69dd0f5d6f2f7fff7952b,2024-10-02T13:52:09.270000
CVE-2024-20100,0,0,00e7a4eaba0bfed9181372c6367bfb391a030c7a1acbb9963f83a3c62045a172,2024-10-07T19:36:43.050000
CVE-2024-20101,0,0,ced475548a5bfbc53f04a0c2a5712a0c8bc4d7f836b6e8c5ac4a95d33c15bd60,2024-10-07T19:36:43.247000
CVE-2024-20102,0,0,b4615e87decf60a8e85da63e8bfe5c34d6f63676225acf731bf036484b2d278b,2024-10-07T17:47:48.410000
CVE-2024-20102,0,1,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000
CVE-2024-20103,0,0,ff6d2294295d0dd22c31cf32176b100a255e6abd1ceb31b42b3a8764be05646b,2024-10-07T19:36:43.530000
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
@ -248610,7 +248610,7 @@ CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
CVE-2024-2758,0,0,ec71169b8e8ae96bf24d772237af9a9c33e20fd447b06805225d467e622ae7a6,2024-05-01T18:15:19.300000
CVE-2024-2759,0,1,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000
CVE-2024-2759,0,0,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000
CVE-2024-27592,0,0,d1ab0f4f443cdfc3ef1bdb598e0eca6a6dd41bceb98b2d42145b4b52d872d5f3,2024-04-16T23:15:08.690000
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
@ -250331,7 +250331,7 @@ CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf548246
CVE-2024-30110,0,0,a07e687d8cc25234136155156054fc7c4d3e910119afb02b600c596b9dc2e496,2024-06-28T10:27:00.920000
CVE-2024-30111,0,0,2d23b069061a9f03f5bbdc50f3bb24e02ba7cc17cb7c96642572c4ddb7c10c61,2024-06-28T10:27:00.920000
CVE-2024-30112,0,0,b1be3742a46d695d3f82f4d182e1b02e2a0a297ddb2b6a4bf1d69911e3eb1b94,2024-06-26T12:44:29.693000
CVE-2024-30118,0,0,d75f0d74d06c8e3868a6471e6d2e944efbd02635e86e9265337e7bf5cb305cb6,2024-10-10T12:51:56.987000
CVE-2024-30118,0,1,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68377,2024-10-10T18:50:54.383000
CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
@ -253616,7 +253616,7 @@ CVE-2024-34616,0,0,c301260c315697c954fb2feafb31403c37229c06fbc1763a645c0b780c7d6
CVE-2024-34617,0,0,b1ee984b0fa2dc691ebab6e8249f2a4d4bb83e2ded6eba30678b4026e2d801bc,2024-08-12T18:40:21.090000
CVE-2024-34618,0,0,d83244a9f175d49a5d846a23c6fe10dd7ec1bbbbc81b439f7092f16730defc87,2024-08-12T18:40:38.963000
CVE-2024-34619,0,0,91b7e2ba5c8ef39243e26b3218dbb54a69ef40dbc6e2ee1a6dfc7635d1e06db4,2024-08-12T18:41:03.467000
CVE-2024-3462,0,1,cde69c32d1cfdddf84aad9bf072c1ff8f90df5fe6471a02399ac91c4d7da2bbd,2024-10-10T16:15:08.497000
CVE-2024-3462,0,0,cde69c32d1cfdddf84aad9bf072c1ff8f90df5fe6471a02399ac91c4d7da2bbd,2024-10-10T16:15:08.497000
CVE-2024-34620,0,0,18af99a16c151d48117fe4a9d6b46c84a917ab3823f5ed3fce7acc26205bcfe1,2024-08-12T18:41:21.593000
CVE-2024-34621,0,0,fbb4f55b8bb52c900dd8b6fb5e30a72cb1ea07a01b1c400b8d7287789fe61e97,2024-08-09T20:43:21.560000
CVE-2024-34622,0,0,aeda50f8bab0ac7ef960dd7444278eb4fda7645ea46e11099531591011c5f504,2024-08-09T20:15:32.807000
@ -253975,7 +253975,7 @@ CVE-2024-35198,0,0,7592c428e1bf061ba03a09a77c9fc676ecc19ee3535a3f1dd84fdd07d6a08
CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c48ea,2024-08-07T16:15:44.737000
CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000
CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000
CVE-2024-35202,0,1,307eeb0ba3a894c1f24169242df5b7772be5729599a16b2a6aaeb88e865b1b41,2024-10-10T16:35:11.390000
CVE-2024-35202,0,0,307eeb0ba3a894c1f24169242df5b7772be5729599a16b2a6aaeb88e865b1b41,2024-10-10T16:35:11.390000
CVE-2024-35204,0,0,2ea5b7f3f64c9f31f0a98ec693d23952b0be3ff72b74340b9fa74f103be148a8,2024-09-26T16:15:07.840000
CVE-2024-35205,0,0,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000
CVE-2024-35206,0,0,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000
@ -254257,7 +254257,7 @@ CVE-2024-35683,0,0,35d7e7c403c9e1a0af5b15ee529f21dfe95dd77d68bca956781c650575c54
CVE-2024-35684,0,0,73ceea3685cab6d12bcc00b1be64bf260bc52647423fb13caa461de77b765285,2024-07-18T19:15:49.853000
CVE-2024-35685,0,0,139851b07c410dda78a8d072ad9e34deae44fbd00bd025834cea54049b4e0532,2024-06-11T13:54:12.057000
CVE-2024-35686,0,0,32ff2e600a9d8926049897296d1d6fe8809b6a2e4221afcb5a5a74815a856c9b,2024-08-19T12:59:59.177000
CVE-2024-35687,0,1,b379fb6562e3ac3f0754d3c341db6054c4dc0eed9ed63187d866802f459ed76a,2024-10-10T16:59:04.827000
CVE-2024-35687,0,0,b379fb6562e3ac3f0754d3c341db6054c4dc0eed9ed63187d866802f459ed76a,2024-10-10T16:59:04.827000
CVE-2024-35688,0,0,3002fd4b3fe5cc02b7654ca7bf43c572c5d7c5d95678447c325fe6a4dfea431c,2024-07-18T19:11:38.683000
CVE-2024-35689,0,0,a84697d9194d9eaca216c47abe16f4656da4cd35d0aca0020ad4375947ea31e4,2024-07-18T19:11:09.873000
CVE-2024-3569,0,0,9b80b9a87217b369759c7140d80dbd6082319d66e422964bf6b9aefb97f43369,2024-04-10T19:49:51.183000
@ -258328,7 +258328,7 @@ CVE-2024-41812,0,0,77d77d75e12a46a4096a7ded13c0631df5e5cdfd100a1bda9b1f75a9011ec
CVE-2024-41813,0,0,91e03e36b9e87581405a8dd69398040d61a14fc0a45ce589d6f6ebdb2f6cab48,2024-09-30T20:02:25.837000
CVE-2024-41815,0,0,fa3c6b5fdaad718b40db16c805a164fa7a9b4ae5ba2f85a17caaeb17fb76200d,2024-09-19T14:36:12.677000
CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000
CVE-2024-41817,0,1,55d2f9b0a2075c2da5349f298b0dd31b3b48148f233e37649ddc262d2d2d446f,2024-10-10T17:25:47.637000
CVE-2024-41817,0,0,55d2f9b0a2075c2da5349f298b0dd31b3b48148f233e37649ddc262d2d2d446f,2024-10-10T17:25:47.637000
CVE-2024-41818,0,0,34e8576dcb1a1bd2ef0841435c6e4eb9b22f044d76175d55bfedd30532739326,2024-09-11T16:09:46.303000
CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
@ -260184,12 +260184,12 @@ CVE-2024-44950,0,0,5e42ef2a98099750242b4bcce4d058e90a98782e0666750e9b6b801f3fbcf
CVE-2024-44951,0,0,d4df6b53659b4bf2ca95c9e72ed9fbab6343da2558ed206d0ca74ab61429319e,2024-10-09T14:27:43.973000
CVE-2024-44952,0,0,6abe9435eb01f0417ea6e45511928e929f498aad7a413484748a480c46e0c4ce,2024-09-06T16:37:38.370000
CVE-2024-44953,0,0,f2ec50e0309c43f7cf9bb2e776118a51e77c29a5f9b8c0285a1645b3f3d10a0b,2024-09-06T16:37:33.650000
CVE-2024-44954,0,0,31b5dfbb887da799bd2bd3ced4c927fc2ecea3232fc0eafa678eaf39c7e755f6,2024-09-05T12:53:21.110000
CVE-2024-44955,0,1,7ecd6df0a7fc728e9f1b78b619a80458c35c83df938799fdd53ee40a270e647d,2024-10-10T17:57:00.267000
CVE-2024-44954,0,1,917c2285a10b8a4c9f2cbeefe4b18ea2f038a0ed9d2b06168fbf3620c40fe5dd,2024-10-10T18:02:42.307000
CVE-2024-44955,0,0,7ecd6df0a7fc728e9f1b78b619a80458c35c83df938799fdd53ee40a270e647d,2024-10-10T17:57:00.267000
CVE-2024-44956,0,0,6af1a87a6f61cb2e54a20c3401cc5debba4744f6ee0ebb8ac5c756a545a18cee,2024-09-06T16:37:11.777000
CVE-2024-44957,0,0,e09ae721dc946241eec9f81a8aaa6dbc034c414b1c1b70d35ec2e90777c333a8,2024-09-06T16:37:00.077000
CVE-2024-44958,0,1,e4d3f1ed246cde0567507bcc647e05aeb172deedd04cdd90b68c843294cc3a64,2024-10-10T17:56:24.467000
CVE-2024-44959,0,1,cdc6d6e75361aea84c95ea1414f5cfe7ea6483c758f03a0ec301cc000a1016f2,2024-10-10T17:54:07.960000
CVE-2024-44958,0,0,e4d3f1ed246cde0567507bcc647e05aeb172deedd04cdd90b68c843294cc3a64,2024-10-10T17:56:24.467000
CVE-2024-44959,0,0,cdc6d6e75361aea84c95ea1414f5cfe7ea6483c758f03a0ec301cc000a1016f2,2024-10-10T17:54:07.960000
CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000
CVE-2024-44960,0,0,68277b730b7485e374cc6a581bba8cf7b2d42cf68316fea6befff6e677f25010,2024-10-04T16:44:05.497000
CVE-2024-44961,0,0,f953df8f16221e9fd81f9cf7e7b0f2354703b12926c99e78c21e8910d16a893b,2024-10-04T16:39:39.300000
@ -260208,20 +260208,20 @@ CVE-2024-44972,0,0,9b4a601abf868742cc56845740bd2af5dc67b7e9f76c5e2e3815a329e7373
CVE-2024-44973,0,0,6da77340a818d4254bbf05ca91b8c65562f8d826d87a4df556d42cceb3d012ba,2024-10-03T14:23:09.147000
CVE-2024-44974,0,0,fd141e065f0472f9c20f0e926fb616aa814fa8f29c09362dbf81fd47c4c1b225,2024-09-12T12:15:51.397000
CVE-2024-44975,0,0,259cddaa128c9efb6ec303816aae245e7b8378b15a62da050b41a2aa6ef90c6f,2024-10-03T14:32:31.677000
CVE-2024-44976,0,1,bc18e50085e0996c22bd3875fde1d8b8546c02856815a998cf979827e572374f,2024-10-10T17:50:14.863000
CVE-2024-44977,0,1,03172ad45dab614d5712c6aa7ef1d5d1de28df5518c80831856ede17b98f6602,2024-10-10T17:47:59.593000
CVE-2024-44976,0,0,bc18e50085e0996c22bd3875fde1d8b8546c02856815a998cf979827e572374f,2024-10-10T17:50:14.863000
CVE-2024-44977,0,0,03172ad45dab614d5712c6aa7ef1d5d1de28df5518c80831856ede17b98f6602,2024-10-10T17:47:59.593000
CVE-2024-44978,0,0,86121d29302acc1da31190cefab002b1ff26f43dfa1aaefb7afb57e51681158d,2024-09-10T16:51:19.813000
CVE-2024-44979,0,1,cecac389382680ea39a2d45161307db74c62b644cb6a1947cc1848191426c503,2024-10-10T17:44:36.417000
CVE-2024-44979,0,0,cecac389382680ea39a2d45161307db74c62b644cb6a1947cc1848191426c503,2024-10-10T17:44:36.417000
CVE-2024-4498,0,0,237405bb434f57b5ee3d93725ee504cc093cf6521d831301400a29eebde53ae2,2024-06-26T12:44:29.693000
CVE-2024-44980,0,1,dea397cd74419967eeeec31ac4bb73b2fcd8298d78221f7ff8b71c505344cc1e,2024-10-10T17:42:53.433000
CVE-2024-44980,0,0,dea397cd74419967eeeec31ac4bb73b2fcd8298d78221f7ff8b71c505344cc1e,2024-10-10T17:42:53.433000
CVE-2024-44981,0,0,bc3bb172f7a0023a22356964618a5541429c999634289482e09bbe39c56b8053,2024-09-05T17:54:19.377000
CVE-2024-44982,0,1,a05c0c5e6b282a95ebe731908435bbb3ecaa688dda76ce2904340585b7afa275,2024-10-10T17:09:54.350000
CVE-2024-44982,0,0,a05c0c5e6b282a95ebe731908435bbb3ecaa688dda76ce2904340585b7afa275,2024-10-10T17:09:54.350000
CVE-2024-44983,0,0,6dcccaf315345579e49205f3bdea80f9b0827330855785bb5774834968a11f76,2024-09-10T16:57:55.110000
CVE-2024-44984,0,1,9f87dbbca170f6f4d252c6919ea7b3f286e8ff7024a06a22635aff0d47c02da1,2024-10-10T16:48:56.167000
CVE-2024-44984,0,0,9f87dbbca170f6f4d252c6919ea7b3f286e8ff7024a06a22635aff0d47c02da1,2024-10-10T16:48:56.167000
CVE-2024-44985,0,0,89614f0dc5a1bc1e42d274d3ec6531500905f54e1226dc3d0cfa558fdaf45e82,2024-09-05T17:54:11.313000
CVE-2024-44986,0,0,7b1b7f962a5dde2e3112c86530d9327efd0060e0a73a92ec7225981af2f022b4,2024-09-05T17:54:04.127000
CVE-2024-44987,0,0,80c7ee92eb0c64e1bc51cb1cea659b21d515983723260d3a4a67be7790dea749,2024-09-05T17:53:54.687000
CVE-2024-44988,0,1,6a50a64461dde71a529e9e83bb0f9a6735ab909803f408460e79c8c9f655c334,2024-10-10T16:44:14.767000
CVE-2024-44988,0,0,6a50a64461dde71a529e9e83bb0f9a6735ab909803f408460e79c8c9f655c334,2024-10-10T16:44:14.767000
CVE-2024-44989,0,0,f232cbe2cf85d26edc47089ff1f523369ffa3f6479342bd09b010a8ff52ddbe8,2024-09-06T16:31:22.253000
CVE-2024-4499,0,0,76c471af3c85399c41d057a036d2a12d52d3dc17ec6cbd4660af6d2299ed90b8,2024-09-13T16:01:19.483000
CVE-2024-44990,0,0,87bc0c256d1ef863849319b5a4078ee77f85507d6091a25f9ed554ccb2e112e7,2024-09-06T16:31:12.870000
@ -260836,7 +260836,7 @@ CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494
CVE-2024-46292,0,0,16657deaed202158307b9cd348b1ae5a658eccdd4341dd38e21d8ab9f2e1a265,2024-10-10T12:51:56.987000
CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a658f3,2024-10-04T13:51:25.567000
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
CVE-2024-46300,0,0,d1242a191b8ea8c2a0e9fbab7765f3d208830dd828d323e4edc4853d2473356e,2024-10-07T20:35:11.433000
CVE-2024-46300,0,1,ac737436c281f2a0090533929879a33c37be3bd6f7970fe4b452f2dd4b8cf935,2024-10-10T18:52:42.790000
CVE-2024-46304,0,0,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000
CVE-2024-46307,0,0,2f96c5e3d4f564d8b625e24ebef4044cea9f555c588f949b1c248bfd9bde51be,2024-10-10T12:51:56.987000
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
@ -261406,6 +261406,7 @@ CVE-2024-47349,0,0,e6c8290f3997da4ca5815c85f88c430fa697e63af208e1750b560fe37e4f7
CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000
CVE-2024-47350,0,0,09067a079935a016b58f07623b3d09d0a14ce68a8d0e97bc64a38c36b79a09f5,2024-10-07T17:47:48.410000
CVE-2024-47352,0,0,594028d39b78ff520b0396c6a3ce285d2e384a0ebe8a52208931d1ced0ad3b29,2024-10-07T17:47:48.410000
CVE-2024-47354,1,1,d139da9360db9ab0b7a0ad752058da69c1005c00d22b020d554561160c2bccbe,2024-10-10T19:15:16.837000
CVE-2024-47355,0,0,cf08585fe7cb6bc0c9335afe55d15aa081a8746842ce9e96d34e20bb3b2de71f,2024-10-07T17:47:48.410000
CVE-2024-47356,0,0,cfe95239cc4248246cd874a2cb2d77c8e851cdbbe7ac1a464fc0eb4a3c757f5f,2024-10-07T17:47:48.410000
CVE-2024-47357,0,0,149fcf46e7f27075eeb3f705ac9a4ebeb96a867a52767d71262e20ba7a053432,2024-10-07T17:47:48.410000
@ -261447,18 +261448,18 @@ CVE-2024-47393,0,0,58cf853d8f2d02cbccb461c82596ff01f0cdfcc3c36878d036a5e6eb40f01
CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f7e9,2024-10-07T17:47:48.410000
CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000
CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000
CVE-2024-47410,0,0,2b85065b3cc816e2e6894f4ae6f931ef6472a4a9b302dce9c53bfb573efb0017,2024-10-10T12:51:56.987000
CVE-2024-47411,0,0,1d6e4d3969d08861473d57c5b16554b86f8a81f0484d410008e00804e5251930,2024-10-10T12:51:56.987000
CVE-2024-47412,0,0,d79a02d1f4644268c1c69c3071d6d3ce53192d43f8632419aaa8746cc964ddf0,2024-10-10T12:51:56.987000
CVE-2024-47413,0,0,bb02e382dd56e1508620412f0b964df099870bc38f898fec21d0ecb2225633fd,2024-10-10T12:51:56.987000
CVE-2024-47414,0,0,b09b81cd598b82d2a9f212c2fdacf7e3739fbf5c004de4fd1c2e706bbd81b600,2024-10-10T12:51:56.987000
CVE-2024-47415,0,0,327ea81d47c3c36536acf07bb1213820f9087ea124ee47313ac98538463d0fbd,2024-10-10T12:51:56.987000
CVE-2024-47416,0,0,3616058ebfbbdf7abbde901ae18937d623c3700cc1dc8ef67948efac664217c7,2024-10-10T12:51:56.987000
CVE-2024-47417,0,0,c089aa4778ac152ed305d4215c2a8f60791877b22e2d0ab62b0d5b692b7501a3,2024-10-10T12:51:56.987000
CVE-2024-47418,0,0,24aafbb08a4cabfc7223ae23ef2abd05c864bf283f001c0cb5602a278270228c,2024-10-10T12:51:56.987000
CVE-2024-47419,0,0,1fbe0741bc25a4665f681ec0731d85fac68fc75c4da90f369b7a56d7b0a2f152,2024-10-10T12:51:56.987000
CVE-2024-47410,0,1,42b59896d371aa29c83e01a1ce08752b8288a889a8db3630a5c6ba7966f3731c,2024-10-10T18:26:44.857000
CVE-2024-47411,0,1,5875ac529772763bf76adfec6337ced119d16dc7bedac06df0488c853721b19e,2024-10-10T18:26:54.153000
CVE-2024-47412,0,1,391d79d5da558802eae8e86cf3dd3b740642f9484cd58363cf9ca936b2f15d9d,2024-10-10T18:27:02.867000
CVE-2024-47413,0,1,efffb7f4f524842c3da4f8e4f47d682ca3f5022b22ee31bdd64350ada5d174d7,2024-10-10T18:27:08.210000
CVE-2024-47414,0,1,b99ef98ddddc4fe3a2ce97930aec3a4f54c382fcd7fa966d806bfcc3b3a29f17,2024-10-10T18:27:17.123000
CVE-2024-47415,0,1,242c4905864565326853c5e25cbd1c250260c0bd4a96116024e1f67e79438df0,2024-10-10T18:27:30.467000
CVE-2024-47416,0,1,0c7f43b25401c6f57308fc4d12ca4043b36b0b76fb92542ee8608f2b89376b6f,2024-10-10T18:27:39.187000
CVE-2024-47417,0,1,34adb3875f984010ac1ec6bb1f4ecdfba3c04b2381129bff62f8abb8615e1a50,2024-10-10T18:27:46.470000
CVE-2024-47418,0,1,1d09a601d50b55fb35b7d4fc7e118d1a06dd238f3708db9ef993b303806cc748,2024-10-10T18:28:04.387000
CVE-2024-47419,0,1,8fd66d9bf61c8353ab141ddd3435e43b693fb94a6a4d1ca08ad07bf05b83025e,2024-10-10T18:28:19.330000
CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000
CVE-2024-47420,0,0,7eaf2743e4253484617ee7cfdb1fd7edab0aa7aa062fd268430e44e44517e0bb,2024-10-10T12:51:56.987000
CVE-2024-47420,0,1,67ad7f7dd5cb664c9d8d7ab9101e8bdaff33af0ff65a5f148b23df17a4f95602,2024-10-10T18:28:26.860000
CVE-2024-47421,0,0,102f8e332a29bbf3c4d5fb03ab9810391e67a628a1a147f11476861b16d4b605,2024-10-10T12:51:56.987000
CVE-2024-47422,0,0,3952ccb617f0de75e022164e02292c15f6e11ca918ca4295a5ace8ee97dd98ab,2024-10-10T12:51:56.987000
CVE-2024-47423,0,0,f17caf37955ec4ecc572648540e4cfbee61ac432f2927a7322d8623e06a593fd,2024-10-10T12:51:56.987000
@ -261469,7 +261470,7 @@ CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef
CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000
CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
CVE-2024-4748,0,1,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000
CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000
CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000
@ -261533,6 +261534,7 @@ CVE-2024-47631,0,0,01fc100dd08a1360f7c125c78507402e09d2b1c2d847226a5af87eb0733a2
CVE-2024-47632,0,0,f0965ad8a98839b57c8efa58e92981fb5169721d554ccd74aa7f6384bc6276d7,2024-10-07T17:47:48.410000
CVE-2024-47633,0,0,83d0f903f83dd379c31137a99d53fc1c554d901d5d9bc74c2d6bef68bc5c82b4,2024-10-07T17:47:48.410000
CVE-2024-47635,0,0,b72deea70e905bb748839730e330b907a08dfe276b949c1628ef45ac3c08976b,2024-10-07T17:47:48.410000
CVE-2024-47636,1,1,ec69ee24cf2cc4e35a0d87e9bc4dc38df2ef5d9589ff0aa5f365e729ec78649f,2024-10-10T18:15:07.920000
CVE-2024-47638,0,0,b3cbfd223fe1cc94aab3e88ad41656f2b84c9afb1b07b461655fed70a6186be3,2024-10-07T17:47:48.410000
CVE-2024-47639,0,0,0dbdca40ed3a65834d3c291ae2785dd80dbc26b9e69a0dc2156d5c47067029d8,2024-10-07T17:47:48.410000
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
@ -261542,6 +261544,7 @@ CVE-2024-47643,0,0,76324b383f26178af320ff117ac2bc824c9739123bf10b44dfde01cdcda70
CVE-2024-47644,0,0,e673aed60238f9b5abec2b17d0b773fd574cc4aee068cf599e12a758154a364b,2024-10-07T17:47:48.410000
CVE-2024-47646,0,0,10b5a56791d1f80011760e4ddb4fabbf6b562e5ec54c7774cd5b5f1d927a2684,2024-10-07T17:47:48.410000
CVE-2024-47647,0,0,7716a0ae18142ae56901b805b3add32c3ed7fb51591ce35c85552affb5dedd67,2024-10-07T17:47:48.410000
CVE-2024-47648,1,1,38ca133ebdd26d7310fc58b771105a72f4adf8394bf849f97ad77530c58416a6,2024-10-10T19:15:17.067000
CVE-2024-4765,0,0,2cc9c7bf1e2c28194496aab966e3be262d91c35cfd4edb32adc2df596a464b78,2024-08-29T21:35:11.807000
CVE-2024-47650,0,0,9afef3be3c031099cbe7cbfa5812d4fd5a6f96ce9539e691bb6d557c122e6c41,2024-10-07T17:47:48.410000
CVE-2024-47651,0,0,a5c70d4582bbdb3780ac3463bdf31076b74c5748ebb37496a5c0ac719743777c,2024-10-04T13:50:43.727000
@ -261645,6 +261648,11 @@ CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e2
CVE-2024-47950,0,0,051b7d62708c153f7aefabbe7d8cbca3b760e43438404853bb4e254aa1c32f1d,2024-10-10T12:56:30.817000
CVE-2024-47951,0,0,dd0e5081c613ef6331152cf5f5a93ee02293e5a5a930e15d75080ba702abfea6,2024-10-10T12:56:30.817000
CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000
CVE-2024-47962,1,1,1c993031245b9205a9445c920e9186968a00d85e81c957a316576d409863e918,2024-10-10T18:15:08.183000
CVE-2024-47963,1,1,e68b7121a7e0333c01b2d777a44d55fa8978f9459daf9609f2c28c44e3cd7b30,2024-10-10T18:15:08.330000
CVE-2024-47964,1,1,8708b1223f13c984225d5ff9a93e6643d31a9da9d412e571b444e93d6ab07c8d,2024-10-10T18:15:08.470000
CVE-2024-47965,1,1,2326a0f43bbda417b7328f4bcf140455310111b0a6b80eb67cbda48f4f017f48,2024-10-10T18:15:08.587000
CVE-2024-47966,1,1,2e5feecff0fa14f89d0ed8ddc60e7023397935bd4a2b23667d2d59536ef817ba,2024-10-10T18:15:08.710000
CVE-2024-47967,0,0,a1330cc114fe2e48a56c50da9857d953b86ef030556f660ace8207b5a6ff6caf,2024-10-10T12:57:21.987000
CVE-2024-47968,0,0,4fff8938b14b264b8114ea788e4702165e516bca6198626b64c35403b2d1f728,2024-10-10T12:57:21.987000
CVE-2024-47969,0,0,cca9607f354104b423066ece0dc4ef5cb988716d253447be49d5f3344fccc48a,2024-10-10T12:57:21.987000
@ -263734,8 +263742,8 @@ CVE-2024-7261,0,0,f672393d607443ec498009a9b040ef410e3a579843a04e18027fe16c96a4fd
CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000
CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000
CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000
CVE-2024-7265,0,1,f8d550c674039cce8f324746def751c860d87bd4ce8e1c453bd0781310abcf46,2024-10-10T16:15:08.763000
CVE-2024-7266,0,1,e5f7907376447dca655b663fd7a74a213d7d563471c1ec60c07889df6ae132cf,2024-10-10T16:15:08.910000
CVE-2024-7265,0,0,f8d550c674039cce8f324746def751c860d87bd4ce8e1c453bd0781310abcf46,2024-10-10T16:15:08.763000
CVE-2024-7266,0,0,e5f7907376447dca655b663fd7a74a213d7d563471c1ec60c07889df6ae132cf,2024-10-10T16:15:08.910000
CVE-2024-7267,0,0,d99f3d8b6ba6fe3542d0e70da6abdfbfdfd1dfb75ac1c1edca9979fafd8e77bc,2024-08-23T15:12:23.453000
CVE-2024-7269,0,0,7c73ca02cf2298b160a9951524082c8dd50257198d6ed0e474a4c364b69ef80a,2024-09-19T14:37:26.380000
CVE-2024-7272,0,0,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000
@ -264169,7 +264177,7 @@ CVE-2024-7797,0,0,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5
CVE-2024-7798,0,0,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000
CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000
CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000
CVE-2024-7801,0,0,1164f794da4fee808f8e2273f992a67f819ac5e607d06fa4a43a71cfadbb2486,2024-10-07T17:48:28.117000
CVE-2024-7801,0,1,a8939d42b45f5ccec85b43ab25a1d0d5c294724ddfec239c933d015a4f9ab704,2024-10-10T18:48:37.270000
CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000
CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000
CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000
@ -264970,7 +264978,7 @@ CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b
CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000
CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000
CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000
CVE-2024-9054,0,0,0d14c343d616ebc19e493649349714efeb90a8268a2c04aa86a752fc9f9af719,2024-10-07T17:48:28.117000
CVE-2024-9054,0,1,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000
CVE-2024-9057,0,0,8f186945e14f31b85c7dab0f889179203746f07361926bd0e395e83df78388b0,2024-10-10T12:51:56.987000
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
@ -265241,11 +265249,15 @@ CVE-2024-9788,0,0,d0cba3dcf7be8cbc54f9f640901b56842d2e022c0155404c088882514bb98e
CVE-2024-9789,0,0,2b4090b026a79f14a56152956a62ce7d4cd34e80782abc00813a239529bb2e8c,2024-10-10T14:15:06.803000
CVE-2024-9790,0,0,062baa88691ce911608565afafee861bca229a67c8372d75785d3a77a80a0dfa,2024-10-10T15:15:15.457000
CVE-2024-9792,0,0,2514dd90a5e918a09429c2c7607165e2b577a21ba08399597bfb6d38390f9c80,2024-10-10T15:15:15.710000
CVE-2024-9793,1,1,f88fa106bba1c40a4cd6d3772f7b83c7e4ea94d13bbc61f765d745f4584ffc72,2024-10-10T16:15:09.080000
CVE-2024-9794,1,1,24440d82ae69b0af74e9c151f82c9b1061e13043eae6ee1de39cb7f149ea4452,2024-10-10T16:15:09.350000
CVE-2024-9793,0,0,f88fa106bba1c40a4cd6d3772f7b83c7e4ea94d13bbc61f765d745f4584ffc72,2024-10-10T16:15:09.080000
CVE-2024-9794,0,0,24440d82ae69b0af74e9c151f82c9b1061e13043eae6ee1de39cb7f149ea4452,2024-10-10T16:15:09.350000
CVE-2024-9796,0,0,c4f0b98e58e202300ac3c27bc57acd8a82992c6087c6cae3816d6e3a584fcf99,2024-10-10T15:35:16.310000
CVE-2024-9797,1,1,32d50d64a6d23aa1ecf9c20299adc2043371b388c20eb741bc94c3c31f2a5a2e,2024-10-10T17:15:16.063000
CVE-2024-9797,0,0,32d50d64a6d23aa1ecf9c20299adc2043371b388c20eb741bc94c3c31f2a5a2e,2024-10-10T17:15:16.063000
CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000
CVE-2024-9799,1,1,6b0daee96efc9c55ed5a6bedc4b2ff5a19553b40d712b021752975c98c07aece,2024-10-10T17:15:16.390000
CVE-2024-9799,0,0,6b0daee96efc9c55ed5a6bedc4b2ff5a19553b40d712b021752975c98c07aece,2024-10-10T17:15:16.390000
CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000
CVE-2024-9803,1,1,9753e92ef86676706bd9b60be2e4fcc44350789fc597aebc41f29a89827c9ac1,2024-10-10T17:15:16.730000
CVE-2024-9803,0,0,9753e92ef86676706bd9b60be2e4fcc44350789fc597aebc41f29a89827c9ac1,2024-10-10T17:15:16.730000
CVE-2024-9804,1,1,89f8ea72d25f0eddbb8b5a3baea4833631254612ffe4917b0c6293a590d52dbf,2024-10-10T18:15:09.150000
CVE-2024-9805,1,1,f93447fea5a871d2a236223dab8ba6d5f2748eefc9e1e41bc80a3cf4d5d96eb7,2024-10-10T18:15:09.440000
CVE-2024-9806,1,1,fab3cf780899402ed265861f091b2b5c5a2f3a65753dc88a57c329dcdda36189,2024-10-10T19:15:17.520000
CVE-2024-9807,1,1,f5649b59fd8fb32d2f9e11414708f6df3b7dcdb3d251afc4ade1b8999c66290b,2024-10-10T19:15:17.797000

Can't render this file because it is too large.