From 326efc1ab36a49cde5a095aaf4578f413dc00a38 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 27 Sep 2024 22:03:17 +0000 Subject: [PATCH] Auto-Update: 2024-09-27T22:00:17.509719+00:00 --- CVE-2022/CVE-2022-467xx/CVE-2022-46751.json | 22 ++- CVE-2023/CVE-2023-311xx/CVE-2023-31188.json | 34 +++- CVE-2023/CVE-2023-346xx/CVE-2023-34637.json | 34 +++- CVE-2023/CVE-2023-392xx/CVE-2023-39213.json | 8 +- CVE-2023/CVE-2023-392xx/CVE-2023-39214.json | 8 +- CVE-2023/CVE-2023-392xx/CVE-2023-39215.json | 6 +- CVE-2023/CVE-2023-392xx/CVE-2023-39216.json | 6 +- CVE-2023/CVE-2023-392xx/CVE-2023-39217.json | 6 +- CVE-2023/CVE-2023-402xx/CVE-2023-40273.json | 24 ++- CVE-2023/CVE-2023-403xx/CVE-2023-40357.json | 34 +++- CVE-2023/CVE-2023-435xx/CVE-2023-43585.json | 6 +- CVE-2023/CVE-2023-435xx/CVE-2023-43591.json | 6 +- CVE-2024/CVE-2024-246xx/CVE-2024-24698.json | 6 +- CVE-2024/CVE-2024-254xx/CVE-2024-25411.json | 39 ++++- CVE-2024/CVE-2024-388xx/CVE-2024-38809.json | 14 +- CVE-2024/CVE-2024-405xx/CVE-2024-40508.json | 43 ++++- CVE-2024/CVE-2024-460xx/CVE-2024-46097.json | 39 ++++- CVE-2024/CVE-2024-463xx/CVE-2024-46366.json | 39 ++++- CVE-2024/CVE-2024-463xx/CVE-2024-46367.json | 39 ++++- CVE-2024/CVE-2024-464xx/CVE-2024-46453.json | 21 +++ CVE-2024/CVE-2024-471xx/CVE-2024-47186.json | 64 +++++++ CVE-2024/CVE-2024-64xx/CVE-2024-6436.json | 78 +++++++++ CVE-2024/CVE-2024-64xx/CVE-2024-6493.json | 60 ++++++- CVE-2024/CVE-2024-66xx/CVE-2024-6617.json | 60 ++++++- CVE-2024/CVE-2024-71xx/CVE-2024-7133.json | 60 ++++++- CVE-2024/CVE-2024-78xx/CVE-2024-7860.json | 58 ++++++- CVE-2024/CVE-2024-78xx/CVE-2024-7861.json | 58 ++++++- CVE-2024/CVE-2024-78xx/CVE-2024-7863.json | 60 ++++++- CVE-2024/CVE-2024-78xx/CVE-2024-7864.json | 58 ++++++- CVE-2024/CVE-2024-80xx/CVE-2024-8047.json | 60 ++++++- CVE-2024/CVE-2024-80xx/CVE-2024-8054.json | 58 ++++++- CVE-2024/CVE-2024-80xx/CVE-2024-8056.json | 60 ++++++- CVE-2024/CVE-2024-92xx/CVE-2024-9291.json | 141 ++++++++++++++++ CVE-2024/CVE-2024-92xx/CVE-2024-9293.json | 137 +++++++++++++++ README.md | 80 ++++----- _state.csv | 175 ++++++++++---------- 36 files changed, 1495 insertions(+), 206 deletions(-) create mode 100644 CVE-2024/CVE-2024-464xx/CVE-2024-46453.json create mode 100644 CVE-2024/CVE-2024-471xx/CVE-2024-47186.json create mode 100644 CVE-2024/CVE-2024-64xx/CVE-2024-6436.json create mode 100644 CVE-2024/CVE-2024-92xx/CVE-2024-9291.json create mode 100644 CVE-2024/CVE-2024-92xx/CVE-2024-9293.json diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46751.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46751.json index e02a28a946b..804084390e7 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46751.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46751.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46751", "sourceIdentifier": "security@apache.org", "published": "2023-08-21T07:15:33.740", - "lastModified": "2023-09-06T15:15:15.913", + "lastModified": "2024-09-27T21:35:01.657", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31188.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31188.json index f4253be68d3..3002cfa2fc4 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31188.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31188.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31188", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-06T10:15:13.183", - "lastModified": "2023-09-11T13:33:19.063", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T21:35:01.930", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34637.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34637.json index 38206a5c64f..b69acd51bf5 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34637.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34637.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34637", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-05T22:15:08.577", - "lastModified": "2023-09-11T16:54:19.023", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T20:35:06.733", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39213.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39213.json index da160f63a7c..afb72f92c9b 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39213.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39213.json @@ -2,13 +2,13 @@ "id": "CVE-2023-39213", "sourceIdentifier": "security@zoom.us", "published": "2023-08-08T22:15:10.657", - "lastModified": "2023-08-15T15:30:15.040", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T20:15:04.733", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nImproper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access.\n\n" + "value": "Improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-74" + "value": "CWE-176" } ] } diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39214.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39214.json index 5db8c4a9c99..3035d96f406 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39214.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39214.json @@ -2,13 +2,13 @@ "id": "CVE-2023-39214", "sourceIdentifier": "security@zoom.us", "published": "2023-08-08T22:15:10.737", - "lastModified": "2023-12-14T16:48:23.877", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T20:15:04.847", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nExposure of sensitive information in Zoom Client SDK's before 5.15.5 may allow an authenticated user to enable a denial of service via network access.\n\n" + "value": "Exposure of sensitive information in Zoom Client SDK's before 5.15.5 may allow an authenticated user to enable a denial of service via network access." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-749" } ] } diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39215.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39215.json index bf3801b21b1..8022fa83a9b 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39215.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39215.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39215", "sourceIdentifier": "security@zoom.us", "published": "2023-09-12T20:15:09.203", - "lastModified": "2023-09-15T19:11:10.497", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T20:15:04.970", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-449" } ] } diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39216.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39216.json index e5580e81bc3..13c95d73f3f 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39216.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39216.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39216", "sourceIdentifier": "security@zoom.us", "published": "2023-08-08T18:15:23.657", - "lastModified": "2023-08-11T16:20:34.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T20:15:05.103", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-80" } ] } diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39217.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39217.json index 8be379be6f9..23655e73ec4 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39217.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39217.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39217", "sourceIdentifier": "security@zoom.us", "published": "2023-08-08T18:15:23.843", - "lastModified": "2023-08-11T16:24:49.660", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T20:15:05.223", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-80" } ] } diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40273.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40273.json index 40600b54fca..5c3f5f14218 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40273.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40273.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40273", "sourceIdentifier": "security@apache.org", "published": "2023-08-23T16:15:09.803", - "lastModified": "2023-08-29T16:14:08.630", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T21:35:03.083", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40357.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40357.json index 14eeaeccdb3..541ec2b9fbc 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40357.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40357.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40357", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-06T10:15:14.820", - "lastModified": "2023-09-11T13:42:13.197", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T20:35:08.133", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json index 9d31b6dcc07..21222ee9e81 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43585", "sourceIdentifier": "security@zoom.us", "published": "2023-12-13T23:15:07.463", - "lastModified": "2023-12-19T02:32:59.880", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T20:15:05.407", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-449" } ] } diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43591.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43591.json index 503adce1dce..2e1db55883d 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43591.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43591.json @@ -2,13 +2,13 @@ "id": "CVE-2023-43591", "sourceIdentifier": "security@zoom.us", "published": "2023-11-15T00:15:09.237", - "lastModified": "2024-08-29T20:35:23.297", + "lastModified": "2024-09-27T20:15:05.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper privilege management in Zoom Rooms for macOS before version 5.16.0 may allow an authenticated user to conduct an escalation of privilege via local access.\n" + "value": "Improper privilege management in Zoom Rooms for macOS before version 5.16.0 may allow an authenticated user to conduct an escalation of privilege via local access." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-280" } ] }, diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24698.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24698.json index 39b4b503565..943f112accc 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24698.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24698.json @@ -2,13 +2,13 @@ "id": "CVE-2024-24698", "sourceIdentifier": "security@zoom.us", "published": "2024-02-14T00:15:47.967", - "lastModified": "2024-02-14T13:59:35.580", + "lastModified": "2024-09-27T20:15:05.683", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.\n" + "value": "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-449" } ] } diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25411.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25411.json index 113600d7840..98a69f7f3f9 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25411.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25411.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25411", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-27T18:15:04.000", - "lastModified": "2024-09-27T18:15:04.000", + "lastModified": "2024-09-27T20:35:09.620", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter in setup.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1GBL-iY5ZRaxRqLVqpBe1w6dVgEfywAG7/view?usp=sharing", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38809.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38809.json index 073dfa14c08..c85761aed04 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38809.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38809.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38809", "sourceIdentifier": "security@vmware.com", "published": "2024-09-27T17:15:12.393", - "lastModified": "2024-09-27T17:15:12.393", + "lastModified": "2024-09-27T20:35:10.383", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://spring.io/security/cve-2024-38809", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40508.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40508.json index 046c8b5c754..960c1e8fede 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40508.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40508.json @@ -2,16 +2,55 @@ "id": "CVE-2024-40508", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-26T22:15:03.963", - "lastModified": "2024-09-26T22:15:03.963", + "lastModified": "2024-09-27T20:35:11.070", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMConference.asmx function." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Scripting en openPetra v.2023.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n serverMConference.asmx." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Jansen-C-Moreira/CVE-2024-40508", diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46097.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46097.json index 3b34f8ce053..4ca916b87f7 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46097.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46097.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46097", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-27T18:15:05.687", - "lastModified": "2024-09-27T18:15:05.687", + "lastModified": "2024-09-27T20:35:12.027", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-46097.md", diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46366.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46366.json index b4417e22d50..685de69e0f5 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46366.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46366.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46366", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-27T17:15:13.400", - "lastModified": "2024-09-27T17:15:13.400", + "lastModified": "2024-09-27T20:35:12.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Tommywarren/89cef7f876ee897a4ff40a8b71b6208e", diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46367.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46367.json index 3622fe990f2..740e6b45c21 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46367.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46367.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46367", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-27T17:15:13.487", - "lastModified": "2024-09-27T17:15:13.487", + "lastModified": "2024-09-27T20:35:13.517", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross-Site Scripting (XSS) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to inject arbitrary JavaScript code by submitting a malicious payload within the username field. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Tommywarren/4ac0c8f6e5d8584accd31b8277e55749", diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json new file mode 100644 index 00000000000..e93e6d3ee6b --- /dev/null +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46453", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T21:15:03.350", + "lastModified": "2024-09-27T21:15:03.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in the component /test/ of iq3xcite v2.31 to v3.05 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nosmo-gla/iq3xcite-XSS-2.31-3.05/tree/main", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json new file mode 100644 index 00000000000..f86cee8569e --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-47186", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-27T21:15:03.443", + "lastModified": "2024-09-27T21:15:03.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Filament is a collection of full-stack components for Laravel development. Versions of Filament from v3.0.0 through v3.2.114 are affected by a cross-site scripting (XSS) vulnerability. If values passed to a `ColorColumn` or `ColumnEntry` are not valid and contain a specific set of characters, applications are vulnerable to XSS attack against a user who opens a page on which a color column or entry is rendered. Filament v3.2.115 fixes this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/filamentphp/filament/commit/df7989352464d08eda5837ef50f9997fad902316", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/filamentphp/filament/releases/tag/v3.2.115", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/filamentphp/filament/security/advisories/GHSA-9h9q-qhxg-89xr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6436.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6436.json new file mode 100644 index 00000000000..ebe6ef2bb2a --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6436.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-6436", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-09-27T20:15:06.043", + "lastModified": "2024-09-27T20:15:06.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An input validation vulnerability exists in the Rockwell Automation Sequence Manager\u2122 which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1679.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6493.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6493.json index b323b3fbd65..38348e0ab43 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6493.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6493.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6493", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-13T06:15:15.200", - "lastModified": "2024-09-13T16:35:18.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T21:28:49.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2", + "matchCriteriaId": "2602A188-0596-4FC0-95E5-8F03F2BE9B13" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/0e3128ef-901a-42aa-9d74-c69d3241dc07/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6617.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6617.json index 22d37e7cd1f..eb5e9b6ea3c 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6617.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6617.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6617", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-13T06:15:15.290", - "lastModified": "2024-09-13T16:35:18.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T21:28:35.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2", + "matchCriteriaId": "2602A188-0596-4FC0-95E5-8F03F2BE9B13" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/9c5efe3c-95a8-4647-86c0-20aa7dd92b66/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7133.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7133.json index 3c5f3501ac3..37b1aeaf75d 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7133.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7133", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-13T06:15:15.580", - "lastModified": "2024-09-13T16:35:19.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T21:27:50.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:premio:my_sticky_bar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.3", + "matchCriteriaId": "B3BA279A-E35B-4C35-8B2C-DE4089E05D66" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/c81c1622-33d1-41f2-ba63-f06bd4c125ab/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7860.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7860.json index 0af5d01c935..af74b26ad22 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7860.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7860", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.853", - "lastModified": "2024-09-12T14:35:19.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T20:56:24.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:outtolunchproductions:simple_headline_rotator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "D1C887B1-C997-4C43-A3AF-E95CFB62FFAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/584156d7-928e-48c9-8b81-539ccb06f3f5/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7861.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7861.json index 406c124338c..bdf9f362bc4 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7861.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7861", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.933", - "lastModified": "2024-09-12T14:35:20.767", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T20:52:11.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:michalaugustyniak:misiek_paypal:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.20090324", + "matchCriteriaId": "FFEDB0F2-EF6D-4EFF-8E95-621BFC8BC2ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/df9aa795-ba16-4806-b01a-311f80aa52c0/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7863.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7863.json index 6ca01e4375e..ab2bb57e1c3 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7863.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7863.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7863", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-13T06:15:15.650", - "lastModified": "2024-09-13T15:35:12.780", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T21:27:07.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixeljar:favicon_generator:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "AD25634F-DF77-4192-AFC0-70242B138177" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/5e814b02-3870-4742-905d-ec03b0d31add/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7864.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7864.json index 447ef0ab63a..8f28035a8bf 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7864.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7864.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7864", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-13T06:15:15.720", - "lastModified": "2024-09-13T15:35:12.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T21:26:50.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixeljar:favicon_generator:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "AD25634F-DF77-4192-AFC0-70242B138177" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/6ce62e78-04a4-46b2-b97f-c4ef8f3258c3/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8047.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8047.json index 2969710f1a9..e6de7f3faa2 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8047.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8047.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8047", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-17T06:15:02.617", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T21:25:08.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gowildchild:visual_sound:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.06", + "matchCriteriaId": "7B79C3C5-6130-487E-9993-2D8E4AE2D537" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/0ae1474c-9193-48ee-8cf6-d19900ad95f4/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8054.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8054.json index a2f0014b317..f1af9f98f52 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8054.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8054", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:25.077", - "lastModified": "2024-09-12T14:35:22.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T21:29:57.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mm-breaking_news_project:mm-breaking_news:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.7.9", + "matchCriteriaId": "C4392D67-C78E-47DD-9197-A928543DF88F" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/f27deffc-9555-44bf-8dee-1891c210ecfd/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8056.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8056.json index 800760bfbd4..4f9d1274a0b 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8056.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8056", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:25.140", - "lastModified": "2024-09-12T13:35:23.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T21:29:42.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mm-breaking_news_project:mm-breaking_news:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.7.9", + "matchCriteriaId": "C4392D67-C78E-47DD-9197-A928543DF88F" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/203b8122-f1e5-4e9e-ba83-f5cd59d8a289/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9291.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9291.json new file mode 100644 index 00000000000..7d1ed7a95ad --- /dev/null +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9291.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9291", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-27T21:15:03.667", + "lastModified": "2024-09-27T21:15:03.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in kalvinGit kvf-admin up to f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff. Affected is an unknown function of the file /ueditor/upload?configPath=ueditor/config.json&action=uploadfile of the component XML File Handler. The manipulation of the argument upfile leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The GitHub repository of the project did not receive an update for more than two years." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/daxiangya/kvf-admin/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/user-attachments/files/17058501/kvf-admin_xss.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278784", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278784", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.411202", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9293.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9293.json new file mode 100644 index 00000000000..b74ce5dc54a --- /dev/null +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9293.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-9293", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-27T21:15:03.937", + "lastModified": "2024-09-27T21:15:03.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in skyselang yylAdmin up to 3.0. Affected by this vulnerability is the function list of the file /app/admin/controller/file/File.php of the component Backend. The manipulation of the argument is_disable leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/A0kooo/cve_article/blob/master/yyladmin/yyladmin%20file%20list%20have%20SQL%20injection.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278785", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278785", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.411499", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 171f42740dd..91b9fa4d7c8 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-27T20:00:17.700902+00:00 +2024-09-27T22:00:17.509719+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-27T19:39:43.350000+00:00 +2024-09-27T21:35:03.083000+00:00 ``` ### Last Data Feed Release @@ -33,59 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264063 +264068 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `5` -- [CVE-2024-25411](CVE-2024/CVE-2024-254xx/CVE-2024-25411.json) (`2024-09-27T18:15:04.000`) -- [CVE-2024-25412](CVE-2024/CVE-2024-254xx/CVE-2024-25412.json) (`2024-09-27T18:15:04.100`) -- [CVE-2024-28948](CVE-2024/CVE-2024-289xx/CVE-2024-28948.json) (`2024-09-27T18:15:04.197`) -- [CVE-2024-33368](CVE-2024/CVE-2024-333xx/CVE-2024-33368.json) (`2024-09-27T19:15:09.830`) -- [CVE-2024-33369](CVE-2024/CVE-2024-333xx/CVE-2024-33369.json) (`2024-09-27T19:15:10.040`) -- [CVE-2024-34542](CVE-2024/CVE-2024-345xx/CVE-2024-34542.json) (`2024-09-27T18:15:04.453`) -- [CVE-2024-37187](CVE-2024/CVE-2024-371xx/CVE-2024-37187.json) (`2024-09-27T18:15:04.690`) -- [CVE-2024-38308](CVE-2024/CVE-2024-383xx/CVE-2024-38308.json) (`2024-09-27T18:15:04.933`) -- [CVE-2024-39275](CVE-2024/CVE-2024-392xx/CVE-2024-39275.json) (`2024-09-27T18:15:05.173`) -- [CVE-2024-39364](CVE-2024/CVE-2024-393xx/CVE-2024-39364.json) (`2024-09-27T18:15:05.417`) -- [CVE-2024-46097](CVE-2024/CVE-2024-460xx/CVE-2024-46097.json) (`2024-09-27T18:15:05.687`) -- [CVE-2024-46256](CVE-2024/CVE-2024-462xx/CVE-2024-46256.json) (`2024-09-27T18:15:05.787`) -- [CVE-2024-46257](CVE-2024/CVE-2024-462xx/CVE-2024-46257.json) (`2024-09-27T18:15:05.870`) -- [CVE-2024-9160](CVE-2024/CVE-2024-91xx/CVE-2024-9160.json) (`2024-09-27T19:15:10.733`) -- [CVE-2024-9301](CVE-2024/CVE-2024-93xx/CVE-2024-9301.json) (`2024-09-27T18:15:06.163`) +- [CVE-2024-46453](CVE-2024/CVE-2024-464xx/CVE-2024-46453.json) (`2024-09-27T21:15:03.350`) +- [CVE-2024-47186](CVE-2024/CVE-2024-471xx/CVE-2024-47186.json) (`2024-09-27T21:15:03.443`) +- [CVE-2024-6436](CVE-2024/CVE-2024-64xx/CVE-2024-6436.json) (`2024-09-27T20:15:06.043`) +- [CVE-2024-9291](CVE-2024/CVE-2024-92xx/CVE-2024-9291.json) (`2024-09-27T21:15:03.667`) +- [CVE-2024-9293](CVE-2024/CVE-2024-92xx/CVE-2024-9293.json) (`2024-09-27T21:15:03.937`) ### CVEs modified in the last Commit -Recently modified CVEs: `43` +Recently modified CVEs: `29` -- [CVE-2024-43391](CVE-2024/CVE-2024-433xx/CVE-2024-43391.json) (`2024-09-27T19:38:10.193`) -- [CVE-2024-43392](CVE-2024/CVE-2024-433xx/CVE-2024-43392.json) (`2024-09-27T19:04:26.060`) -- [CVE-2024-43393](CVE-2024/CVE-2024-433xx/CVE-2024-43393.json) (`2024-09-27T19:36:03.473`) -- [CVE-2024-45682](CVE-2024/CVE-2024-456xx/CVE-2024-45682.json) (`2024-09-27T18:54:51.820`) -- [CVE-2024-5170](CVE-2024/CVE-2024-51xx/CVE-2024-5170.json) (`2024-09-27T18:23:43.833`) -- [CVE-2024-6723](CVE-2024/CVE-2024-67xx/CVE-2024-6723.json) (`2024-09-27T18:50:00.913`) -- [CVE-2024-6785](CVE-2024/CVE-2024-67xx/CVE-2024-6785.json) (`2024-09-27T18:59:25.253`) -- [CVE-2024-6850](CVE-2024/CVE-2024-68xx/CVE-2024-6850.json) (`2024-09-27T18:30:30.930`) -- [CVE-2024-7129](CVE-2024/CVE-2024-71xx/CVE-2024-7129.json) (`2024-09-27T18:26:27.560`) -- [CVE-2024-7698](CVE-2024/CVE-2024-76xx/CVE-2024-7698.json) (`2024-09-27T19:39:43.350`) -- [CVE-2024-7699](CVE-2024/CVE-2024-76xx/CVE-2024-7699.json) (`2024-09-27T18:59:31.277`) -- [CVE-2024-7711](CVE-2024/CVE-2024-77xx/CVE-2024-7711.json) (`2024-09-27T18:17:05.577`) -- [CVE-2024-7817](CVE-2024/CVE-2024-78xx/CVE-2024-7817.json) (`2024-09-27T18:26:21.653`) -- [CVE-2024-7818](CVE-2024/CVE-2024-78xx/CVE-2024-7818.json) (`2024-09-27T18:18:55.510`) -- [CVE-2024-7820](CVE-2024/CVE-2024-78xx/CVE-2024-7820.json) (`2024-09-27T18:08:48.757`) -- [CVE-2024-7822](CVE-2024/CVE-2024-78xx/CVE-2024-7822.json) (`2024-09-27T18:06:41.287`) -- [CVE-2024-7859](CVE-2024/CVE-2024-78xx/CVE-2024-7859.json) (`2024-09-27T18:00:53.567`) -- [CVE-2024-8043](CVE-2024/CVE-2024-80xx/CVE-2024-8043.json) (`2024-09-27T18:22:43.967`) -- [CVE-2024-8051](CVE-2024/CVE-2024-80xx/CVE-2024-8051.json) (`2024-09-27T18:19:41.863`) -- [CVE-2024-8091](CVE-2024/CVE-2024-80xx/CVE-2024-8091.json) (`2024-09-27T18:17:59.267`) -- [CVE-2024-8092](CVE-2024/CVE-2024-80xx/CVE-2024-8092.json) (`2024-09-27T18:17:24.387`) -- [CVE-2024-8093](CVE-2024/CVE-2024-80xx/CVE-2024-8093.json) (`2024-09-27T18:16:01.683`) -- [CVE-2024-8258](CVE-2024/CVE-2024-82xx/CVE-2024-8258.json) (`2024-09-27T18:56:41.140`) -- [CVE-2024-8490](CVE-2024/CVE-2024-84xx/CVE-2024-8490.json) (`2024-09-27T18:36:00.053`) -- [CVE-2024-8761](CVE-2024/CVE-2024-87xx/CVE-2024-8761.json) (`2024-09-27T18:41:43.043`) +- [CVE-2023-39214](CVE-2023/CVE-2023-392xx/CVE-2023-39214.json) (`2024-09-27T20:15:04.847`) +- [CVE-2023-39215](CVE-2023/CVE-2023-392xx/CVE-2023-39215.json) (`2024-09-27T20:15:04.970`) +- [CVE-2023-39216](CVE-2023/CVE-2023-392xx/CVE-2023-39216.json) (`2024-09-27T20:15:05.103`) +- [CVE-2023-39217](CVE-2023/CVE-2023-392xx/CVE-2023-39217.json) (`2024-09-27T20:15:05.223`) +- [CVE-2023-40273](CVE-2023/CVE-2023-402xx/CVE-2023-40273.json) (`2024-09-27T21:35:03.083`) +- [CVE-2023-40357](CVE-2023/CVE-2023-403xx/CVE-2023-40357.json) (`2024-09-27T20:35:08.133`) +- [CVE-2023-43585](CVE-2023/CVE-2023-435xx/CVE-2023-43585.json) (`2024-09-27T20:15:05.407`) +- [CVE-2023-43591](CVE-2023/CVE-2023-435xx/CVE-2023-43591.json) (`2024-09-27T20:15:05.543`) +- [CVE-2024-24698](CVE-2024/CVE-2024-246xx/CVE-2024-24698.json) (`2024-09-27T20:15:05.683`) +- [CVE-2024-25411](CVE-2024/CVE-2024-254xx/CVE-2024-25411.json) (`2024-09-27T20:35:09.620`) +- [CVE-2024-38809](CVE-2024/CVE-2024-388xx/CVE-2024-38809.json) (`2024-09-27T20:35:10.383`) +- [CVE-2024-40508](CVE-2024/CVE-2024-405xx/CVE-2024-40508.json) (`2024-09-27T20:35:11.070`) +- [CVE-2024-46097](CVE-2024/CVE-2024-460xx/CVE-2024-46097.json) (`2024-09-27T20:35:12.027`) +- [CVE-2024-46366](CVE-2024/CVE-2024-463xx/CVE-2024-46366.json) (`2024-09-27T20:35:12.770`) +- [CVE-2024-46367](CVE-2024/CVE-2024-463xx/CVE-2024-46367.json) (`2024-09-27T20:35:13.517`) +- [CVE-2024-6493](CVE-2024/CVE-2024-64xx/CVE-2024-6493.json) (`2024-09-27T21:28:49.020`) +- [CVE-2024-6617](CVE-2024/CVE-2024-66xx/CVE-2024-6617.json) (`2024-09-27T21:28:35.543`) +- [CVE-2024-7133](CVE-2024/CVE-2024-71xx/CVE-2024-7133.json) (`2024-09-27T21:27:50.053`) +- [CVE-2024-7860](CVE-2024/CVE-2024-78xx/CVE-2024-7860.json) (`2024-09-27T20:56:24.493`) +- [CVE-2024-7861](CVE-2024/CVE-2024-78xx/CVE-2024-7861.json) (`2024-09-27T20:52:11.350`) +- [CVE-2024-7863](CVE-2024/CVE-2024-78xx/CVE-2024-7863.json) (`2024-09-27T21:27:07.640`) +- [CVE-2024-7864](CVE-2024/CVE-2024-78xx/CVE-2024-7864.json) (`2024-09-27T21:26:50.067`) +- [CVE-2024-8047](CVE-2024/CVE-2024-80xx/CVE-2024-8047.json) (`2024-09-27T21:25:08.523`) +- [CVE-2024-8054](CVE-2024/CVE-2024-80xx/CVE-2024-8054.json) (`2024-09-27T21:29:57.607`) +- [CVE-2024-8056](CVE-2024/CVE-2024-80xx/CVE-2024-8056.json) (`2024-09-27T21:29:42.600`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 600077fdf99..200d652db4e 100644 --- a/_state.csv +++ b/_state.csv @@ -210952,7 +210952,7 @@ CVE-2022-46748,0,0,4c2e21a14ba33566a7be61e31263ee4cc8b7653c68ffd46b295e8fdd2f246 CVE-2022-46749,0,0,8eced24a204d2dfd35c8f14f41e67be84c653f97ec21524ff9aaa314a954adbd,2023-11-07T03:55:55.760000 CVE-2022-4675,0,0,0a4f7b627bc6434760c0883534a109dc15ee876572a1b6d5017d6966ec63aa0f,2023-11-07T03:58:34.037000 CVE-2022-46750,0,0,8b412e791e00e7afcf83308b57dfe5dcbe9dbaa4de1d1f05732d28e3ad84ae29,2023-11-07T03:55:56.127000 -CVE-2022-46751,0,0,96465bb37f13318995d6fb0af9ccaabfb81654da3d480f3e9a2e0352d5f49218,2023-09-06T15:15:15.913000 +CVE-2022-46751,0,1,22d33a4a3ce20a007b15161b561a705161ea3560e579cc68e869e0ce766c2268,2024-09-27T21:35:01.657000 CVE-2022-46752,0,0,0348ad9f59a3d8669abb8de5f5566687ccb3ebe89505a2ac5158e0a2b55f8247,2023-11-07T03:55:56.533000 CVE-2022-46753,0,0,073de35915d8b1b4ec67415794f25133a55745e1a42b8bfaca43b6128f8f9d7e,2023-11-07T03:55:56.790000 CVE-2022-46754,0,0,47baa30b391b95c99e42a5c33dcc6a389766b7f35895b262b549d6e18f0470e7,2023-11-07T03:55:57.300000 @@ -220714,7 +220714,7 @@ CVE-2023-27600,0,0,87e67c606dcb11cbbd6ceba8eb248743b1a9a333ff1372c202bb946110f83 CVE-2023-27601,0,0,3159e0a53214d6adf345915c747947d8090757989992077eaa4e4c5257b56321,2023-11-07T04:10:01.887000 CVE-2023-27602,0,0,a80eb5b45c9f4866e932d81fc2716a823c094986ad855f7d67ed615e5137a95d,2023-04-19T12:15:08.170000 CVE-2023-27603,0,0,377363bd944721b07ea3da5dcb27d355b62defd8ba2523bcd4d0bea48c169f2a,2023-04-14T19:45:47.010000 -CVE-2023-27604,0,1,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000 +CVE-2023-27604,0,0,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000 CVE-2023-27605,0,0,3c9bd67e7bbc5a970176fa36f2ef3e0bf73a6762632ef035cc42d3a510e378f7,2023-11-10T04:20:00.893000 CVE-2023-27606,0,0,df5a64e8dccf8b9593928c54f55b0be768a1ad798eb4d0e828b503915ddf62a6,2023-07-26T01:18:52.087000 CVE-2023-27607,0,0,e059482f5e66445b3b6dfa901c43f1665d8e6eb57a74d73e31d4f554c8f501e3,2024-04-11T12:47:44.137000 @@ -223585,7 +223585,7 @@ CVE-2023-31184,0,0,bf7fd49253cf418bc6c217e04862a6a172a183347a2b7b0f3ae63131d8bcd CVE-2023-31185,0,0,15bcbaf0a4b18c3b8f965430971fb710b6d279a3a966243be5c05c092c0128db,2023-06-06T16:24:33.907000 CVE-2023-31186,0,0,bfc1be04dfc45537d743ea4fbfc37fec3c45fc3d75262d0675ff60480f45c2be,2023-06-02T18:46:36.920000 CVE-2023-31187,0,0,9120964a617800df40a561d28aef4421ea58f12b7831765de520291a758484b1,2023-06-02T18:46:06.023000 -CVE-2023-31188,0,0,935fbfcb38ea4105c85585dc72c1beff5ef631edf0ffeb00c1b10995c37e587c,2023-09-11T13:33:19.063000 +CVE-2023-31188,0,1,ab08094190ebd5e06eae2728b47847bbf9237182044faa7cd3983124759b56a3,2024-09-27T21:35:01.930000 CVE-2023-31189,0,0,1dea22b62ceaee823e009b380c145b1c71852130112dc3e45787ad81bcc99fd7,2024-02-14T15:01:51.137000 CVE-2023-3119,0,0,4d4d466efa1cc13b8b7f79afe2286017dd41d562bed4f2f063b6d1fcb19e87e7,2024-05-17T02:27:17.113000 CVE-2023-31190,0,0,0f90a65456251ed0a3a75458f8129eacc58e91918274a53c4b9a042b2a4bc8ba,2023-07-20T02:04:56.910000 @@ -226270,7 +226270,7 @@ CVE-2023-34626,0,0,dc51177eea4c955212be8d3498fe2058ca8a8a271833f24b2b3aef59847aa CVE-2023-3463,0,0,6d57f2f4d3e4c521e21e8c3d461319aaee3827d3447ab1d36c16e62be8bf2074,2023-07-28T13:47:16.150000 CVE-2023-34634,0,0,829bb2e8ee0195e8d7efabb5a58e991c8d419f23c2454371473ef41a5977c329,2023-08-17T19:15:12.443000 CVE-2023-34635,0,0,d044079a80c669b935d63f0b410d32ae6ce9ecfb53739138072f49285022a188,2023-08-04T18:52:54.603000 -CVE-2023-34637,0,0,c0f43c1aa3f32fc76cae8ddc1847ea5c4d3d8a9408e98421baf0b92d0a82ed8b,2023-09-11T16:54:19.023000 +CVE-2023-34637,0,1,b2de970242ba118dfb1ca3171fe3e58895d82f60c4f91e5afefddba7bbe56be9,2024-09-27T20:35:06.733000 CVE-2023-3464,0,0,b18bc52934d86656df7813d5dc75486f736c9bc906a5c18236e0a6f6e4481151,2024-05-17T02:27:30.660000 CVE-2023-34641,0,0,d9b46481d84c107bbe26dac016a94f590b03854fbe28a514e8d95a902c395d62,2023-06-30T01:15:08.693000 CVE-2023-34642,0,0,c3d99543f35a986165524c26beaafd81482a4293de5b476ba1dc5f611d418f78,2023-06-30T14:15:09.480000 @@ -227452,7 +227452,7 @@ CVE-2023-36530,0,0,39b6e7f1f65c17d756a12a67ff7ab49bb930555b16f3c7f0c3a9a9b08631f CVE-2023-36532,0,0,346de183093708445d572201d1b91beba125a9edfa821a742e9c84556edc5810,2023-08-11T13:51:15.367000 CVE-2023-36533,0,0,7a3aa9a0281f92da6ec858b130bc8c49aff9e43e106a9e5252f45615815adb18,2024-09-19T20:15:05.733000 CVE-2023-36534,0,0,6cbc71eb840a2042045eac9a1bed117b4c7c1b6f49d16fba7e1aef9691ba09df,2023-08-11T13:55:20.393000 -CVE-2023-36535,0,1,cd09745af0e826e75dff130b90aa767c8b56c74aa677bae7dfe79bb50dc3089b,2024-09-27T19:15:08.747000 +CVE-2023-36535,0,0,cd09745af0e826e75dff130b90aa767c8b56c74aa677bae7dfe79bb50dc3089b,2024-09-27T19:15:08.747000 CVE-2023-36536,0,0,0ee1547dcb523dc14ed9ebc847b60fd04a4995159e536e4c1d07969953d80c80,2023-07-19T00:27:45.237000 CVE-2023-36537,0,0,394843175e0ad188622ad56ec5745a099e29bc47411e8a302f9292eb043883c1,2024-09-19T20:15:05.913000 CVE-2023-36538,0,0,b1971037704c1983129273d695aaa947b2c9ac7e5959308db7e26dd28cd25646,2024-09-20T14:15:11.530000 @@ -229606,20 +229606,20 @@ CVE-2023-39199,0,0,3e8a082b2dd162b2ac05fe4edce56092a0758dead6f488c6360a451ae93da CVE-2023-3920,0,0,1f9f72a3bd9c37be24e0dea36a1658cf630b3ff4aab5704130fc3282b0cd5e1f,2023-10-03T15:30:56.607000 CVE-2023-39201,0,0,995881803a821ad39954737de99fb7ca3c826593aae69f660739b193ed06fb75,2023-09-16T03:30:00.390000 CVE-2023-39202,0,0,d4a579f8db9ad04cff2e4ef93d9f1e8720c97b926a12d5500bdafe35323a16f2,2023-11-21T00:56:45.663000 -CVE-2023-39203,0,1,a06dab058cba203b24011e3aa872b96a152a5e6567e21a5b4486d6dcd28a9e51,2024-09-27T19:15:08.977000 +CVE-2023-39203,0,0,a06dab058cba203b24011e3aa872b96a152a5e6567e21a5b4486d6dcd28a9e51,2024-09-27T19:15:08.977000 CVE-2023-39204,0,0,c8d09ec7350a3f76af462b805e5a6565ed8832c18c7e06d46c30284639ad5db3,2023-11-21T00:47:04.810000 CVE-2023-39205,0,0,fc8a247514204b686ea06b6e69f09b4837631de9ab06c362c325fc076faa9298,2023-11-21T00:46:21.403000 CVE-2023-39206,0,0,cdf8d53f81a764d6980bc2226a8f1e25b0050b8318c9020e0d15d156f379d2ac,2023-11-21T00:46:02.800000 -CVE-2023-39208,0,1,5b1e8be08469cf8d154214f7b569e47ded95901e036a16258bfdbcfc0bd23d01,2024-09-27T19:15:09.143000 -CVE-2023-39209,0,1,864d3cb1d84e301b176edde462a70357090fb8fd191e46d02fa5b6d87863dc40,2024-09-27T19:15:09.267000 +CVE-2023-39208,0,0,5b1e8be08469cf8d154214f7b569e47ded95901e036a16258bfdbcfc0bd23d01,2024-09-27T19:15:09.143000 +CVE-2023-39209,0,0,864d3cb1d84e301b176edde462a70357090fb8fd191e46d02fa5b6d87863dc40,2024-09-27T19:15:09.267000 CVE-2023-39210,0,0,c6ab589e9d628bc1a2fe813bf005cf32e4719139f61279ea1902fa8f6ab1d647,2023-08-15T13:51:04.393000 -CVE-2023-39211,0,1,24b18e10c6ff2beac445a15948d6c81adfa8546a2d6217a39abaefb59ed450b7,2024-09-27T19:15:09.387000 +CVE-2023-39211,0,0,24b18e10c6ff2beac445a15948d6c81adfa8546a2d6217a39abaefb59ed450b7,2024-09-27T19:15:09.387000 CVE-2023-39212,0,0,d6550b94a6602f89228a733e0a67b15cc207049f2c634a000f3ede01c5ff1907,2023-08-15T15:24:10.840000 -CVE-2023-39213,0,0,540b0d5a1d6a82e33f18cb8e49a5af4ac8938b983c4e6b3a9d5f085f5c23a939,2023-08-15T15:30:15.040000 -CVE-2023-39214,0,0,a7ededc2e23b13e6373dda97aa0084d008ece1af9a7db43614f3e747766a0ef3,2023-12-14T16:48:23.877000 -CVE-2023-39215,0,0,bc4537fef4eca4da847b0e894f1c8b809a406d59b0e1a5677499b41e34be5265,2023-09-15T19:11:10.497000 -CVE-2023-39216,0,0,e827986d3d53deef9859667c05622b1e36160967a5686f9ff67935863f60ae20,2023-08-11T16:20:34.047000 -CVE-2023-39217,0,0,695e1ad1be50e10c101099a04426472bd5c3cb97aeabcda22813e0109872b898,2023-08-11T16:24:49.660000 +CVE-2023-39213,0,1,96d6941252b3a0856695eccdad22644bb8d05bcaf8204e70602cd225c9b6764c,2024-09-27T20:15:04.733000 +CVE-2023-39214,0,1,13118ab4856688337fdaf7ae2e298bb4fdb9c1b147d64d538ffccc31f8c44158,2024-09-27T20:15:04.847000 +CVE-2023-39215,0,1,edc0745713a3f4d56515c5562b6321248dd18e6c30fbfa3348eb76e0cfb7216d,2024-09-27T20:15:04.970000 +CVE-2023-39216,0,1,b398cd221b460ee1bf609d4964918d9fec6c07e4d3da07d2842556bf09e0c9ce,2024-09-27T20:15:05.103000 +CVE-2023-39217,0,1,18a8e8aeb31bfc166b0e1c7f235acc8262ab9c1383c9c78cb2066d42a3851e21,2024-09-27T20:15:05.223000 CVE-2023-39218,0,0,63f3e5343538510230ae31b13b2ef6a6f656ed6b46b767782d1b5a5856ee2cee,2023-08-11T17:03:39.237000 CVE-2023-39219,0,0,9abfaea4b4a306247b8bd9d803ced9e012fd03b255d184c952ba3829b31a5f8f,2024-02-01T13:57:07.213000 CVE-2023-3922,0,0,433c16059a7500521ca4939da249b1052bd05c8ace82b48a01432349fb9e26bf,2023-10-03T19:46:15.090000 @@ -230441,7 +230441,7 @@ CVE-2023-4027,0,0,48dd689c0965b18792f4cfccdc2c7158758924f1ef3e29f58ca27c4d96ee89 CVE-2023-40270,0,0,bfe775aa3824e231981669c54daa4b3626fdef3730529a7294f128db1bc3f6b9,2023-11-07T04:20:11.150000 CVE-2023-40271,0,0,6b7cac9f3aa7106de89543b184fd87ed595daa98acee7e01c87cb1a2e5f2240d,2023-09-13T02:27:16.427000 CVE-2023-40272,0,0,dc2163a711fa92f8bca2bd6cb8aeefb8d5caede053b4827a4026ffd948affedb,2023-08-24T17:00:07.203000 -CVE-2023-40273,0,0,d1efd309979d86acc3f5a21eda89b107ca70fabd17da2ac82c7c1040e68168d3,2023-08-29T16:14:08.630000 +CVE-2023-40273,0,1,1aeff0c64e332d86a913527db0cb88631ccab3f1706bf0fb35ec4fc41927c1a7,2024-09-27T21:35:03.083000 CVE-2023-40274,0,0,f20f5b1641662d852a3d92ec12b3069f4904a342ddf85c169c1d25358b0bc60a,2023-08-22T17:47:49.207000 CVE-2023-40275,0,0,bb235e4d61f5beda262b4c42a88b68d3e4b0c5cc4d47ebabd44e56511d114a27,2024-08-01T13:44:29.067000 CVE-2023-40276,0,0,75a4522257e3f9b2d6a29ea60151721a382394a8c50845341716865c940c6904,2024-08-29T20:35:19.433000 @@ -230515,7 +230515,7 @@ CVE-2023-40353,0,0,f3e665e0a72d639bd49b7a9689cc8f6d7396ab71b80058a79a68ea90fd78c CVE-2023-40354,0,0,bcfe69e008c2d56754863f558681c7486978a8d0d8ff8cc91aafa125c9dadd0d,2023-08-22T15:55:45.223000 CVE-2023-40355,0,0,38724529170120486f5b149ea5c981ceb87856b95d52c945a731efcbe40b373f,2024-02-14T18:49:39.177000 CVE-2023-40356,0,0,c5e14bb829e8aebf4146da797104b4b185c1ff2fa3e426de1e530b5575f33bb8,2024-07-09T18:18:38.713000 -CVE-2023-40357,0,0,79bae1e27122a5867b9805303ffcb539f0b366066b3143c06260287d73f79c71,2023-09-11T13:42:13.197000 +CVE-2023-40357,0,1,9acf5b531ac59d0dc20aae5dc6d1c706e658dbbe9565e63dadd22636d0fad699,2024-09-27T20:35:08.133000 CVE-2023-40359,0,0,d06ab7434461067c4f1c88e3861e4d545e70ee0a582001ff2eb58c5709472e08,2023-09-07T06:15:07.990000 CVE-2023-4036,0,0,b91162d9e771dd89607b3f993f9d1180ebc04c4f7b49ea076b74d15d3b6c5528,2023-11-07T04:22:04.067000 CVE-2023-40360,0,0,7f5df9e5030b3d85b7622463f61fe481a94cdd5c2b01e1d5b5450fc57c6c0e76,2023-12-11T18:34:42.457000 @@ -232858,12 +232858,12 @@ CVE-2023-43580,0,0,627871f80cc02cb5ba29aa3c7dcbeda971b999b6354f75421a953b9b00b06 CVE-2023-43581,0,0,0a604635387ceec17951a64f04890be91fdeea00efaf3b027e3873ca11e361a1,2023-11-16T01:42:25.067000 CVE-2023-43582,0,0,8eff66c831d13989dce4a5aa2d01c2f025b247a8155916a1ba3f32d98f9d55f9,2024-09-19T14:15:16.343000 CVE-2023-43583,0,0,bef83c817f9ae62400588efdf069f3dcdf21b56698a108302d617636adb6a50a,2024-09-19T14:15:16.473000 -CVE-2023-43585,0,0,3963f80a517ae03ff03b6112682400f95fe13e42cc714d57c4a95a4f651363b9,2023-12-19T02:32:59.880000 +CVE-2023-43585,0,1,42891b39cd797185a9f1ffe9f647da7aeff2445de09d6686d54e0f5f78e9a18f,2024-09-27T20:15:05.407000 CVE-2023-43586,0,0,1f7ea621f4780c850857b066e0aebeeb1fa03445a414a126c0f7a88ffa2cdef8,2023-12-18T19:20:25.700000 CVE-2023-43588,0,0,115b6a0624bbeb68df9cbce87f466a9f2cc27b3bf211d3519be89b7456b2129e,2024-09-20T15:15:12.650000 CVE-2023-4359,0,0,36b4cc4177461cc02d1acf6c9accb223cc54ff971af05fb697fbedec37f8d496,2024-01-31T17:15:15.147000 CVE-2023-43590,0,0,75afe884f9ad684824e2fd0561a5e8b7278d71725fd5336f3600d666de0291db,2023-11-21T13:58:05.920000 -CVE-2023-43591,0,0,6cc97a05628e61acd7d07ace7b7c07de944672b455383c9ff824b73fab624c08,2024-08-29T20:35:23.297000 +CVE-2023-43591,0,1,799102ec0fd5f433131c9c4e36e0b20d427e9f739fd400fbc872c6cf8e59ad42,2024-09-27T20:15:05.543000 CVE-2023-4360,0,0,8c6f4fdbe3dd47f783c5a0774b8d480e951b02213bba5e33d72042c17a5efc75,2024-01-31T17:15:15.233000 CVE-2023-43608,0,0,4e109a5c969bf158627fa4659bd8c1c96fe15b5846f7aff8c9ac759edf09e59f,2023-12-11T15:25:39.170000 CVE-2023-43609,0,0,46ee18a48e11a39a2e4de0d6e69db55423afae7105671e190621a437b21fb673,2024-02-15T14:45:17.063000 @@ -233643,7 +233643,7 @@ CVE-2023-4480,0,0,8f720a32700f0dcf88298f81723ae2c513370bf9c361e1a327c21e8404982f CVE-2023-44807,0,0,cc9fa087fd498d5c0142310406c2f8e5ac715823650cae019eedc78dd30884f7,2023-10-10T20:16:41.627000 CVE-2023-44808,0,0,c21fe1fd44aeea6fd1f5d97f8e40c85ef4c9aad99cada000af1d2e25b8ea1a26,2023-10-19T11:11:35.753000 CVE-2023-44809,0,0,106ef081b5af79dc53d4bc479d0aa2e275e4760b3cc08b2cab3264d7a797d158,2024-09-17T02:35:28.503000 -CVE-2023-4481,0,1,fd9cff3497a9fececf4bdfc2570c042517e46a8526db5fbaafef06ca9455d872,2024-09-27T18:15:03.837000 +CVE-2023-4481,0,0,fd9cff3497a9fececf4bdfc2570c042517e46a8526db5fbaafef06ca9455d872,2024-09-27T18:15:03.837000 CVE-2023-44811,0,0,0fdedc6bc111ea9a02c62f8daaeff83c589b5ca14424d7f2de79dccf9ac38af2,2023-10-11T20:06:27.410000 CVE-2023-44812,0,0,54d24d8a8649398546bc69de6f53c9b08c93a76ddc19c43fa225b2d394f3bb24,2023-10-11T20:00:04.033000 CVE-2023-44813,0,0,e4aa38d88de0406751f5d82932d7709b2c42f855dfd3b491016e37100dc99415,2023-10-11T19:58:17.857000 @@ -237780,7 +237780,7 @@ CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edb CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000 CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000 CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000 -CVE-2023-50782,0,1,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000 +CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000 CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000 CVE-2023-50784,0,0,310bd016f72a55e87952759915b2328751f88f7e5a355286cf6eeaceebb855b6,2023-12-26T03:15:08.927000 CVE-2023-50785,0,0,95069a7af58cd3ada76ed23cb42a6b26c34f9d8527e1cd720c0edc9a0997e9b2,2024-01-31T19:16:46.520000 @@ -246198,7 +246198,7 @@ CVE-2024-24694,0,0,53c1cb705c824edd778104ee7d12ae923f740ce699c776d76636bfef61ed1 CVE-2024-24695,0,0,b7e05a6a84aba9149947b93f9b71e9eeb5652ac56c791966c9585e6bf1a2b28e,2024-02-14T13:59:35.580000 CVE-2024-24696,0,0,493abf9e7c1236756720555c7f43f1301a6f5875560eeaaa62abf347ceddcc72,2024-02-14T13:59:35.580000 CVE-2024-24697,0,0,fc8cb016f36fd910eeaf64b66dc231cb060ec899e3e50c99d656beb01db44200,2024-02-14T13:59:35.580000 -CVE-2024-24698,0,0,0e286a7a5a83ea89cff35f9869a2b0fc402da5c5818990f977c776b111b97e86,2024-02-14T13:59:35.580000 +CVE-2024-24698,0,1,626c69bc0b2523cde310c368375ebb83033317866de58b9f699f8c2520b849b6,2024-09-27T20:15:05.683000 CVE-2024-24699,0,0,12f8a16e50a0b56367152cd6544ebddc14566fc60e183e9e17bfada0aea759e6,2024-02-14T13:59:35.580000 CVE-2024-2470,0,0,18e1880afe1444954891abe795fc3a0d849c951a72a80f6d9a727adff6033cb3,2024-08-01T13:49:46.933000 CVE-2024-24700,0,0,6c812a85c120df76a0c27beeca26ed6599a5d3758b067997d6a02be8b6ae6a34,2024-03-27T12:29:30.307000 @@ -246728,8 +246728,8 @@ CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234 CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000 CVE-2024-2541,0,0,bba0606372ded88d8bc4d9948e1817b21d9407fc6bca0230b3250a7d287eee8e,2024-09-09T18:40:23.437000 CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000 -CVE-2024-25411,1,1,7de5576fd307c585f61060f5768eb881de1d39b9f982cce92760f7dc361da668,2024-09-27T18:15:04 -CVE-2024-25412,1,1,874abf180c098ce0160e736f3fd25db3ae69414d9e1283db4e9277a2dad487d5,2024-09-27T18:15:04.100000 +CVE-2024-25411,0,1,fb79fd0dc75adec0fdf905cbdc51a15c574fac13456bf915fe30bbf9a6ce6707,2024-09-27T20:35:09.620000 +CVE-2024-25412,0,0,874abf180c098ce0160e736f3fd25db3ae69414d9e1283db4e9277a2dad487d5,2024-09-27T18:15:04.100000 CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000 CVE-2024-25414,0,0,adf1d11bdd5b149561578133c2144fc86b074e6ead373a55ead3bdaa0f1ac127,2024-08-29T20:36:20.677000 CVE-2024-25415,0,0,43d479f30c3959db40e37d85a2a1b1d045a277956526655bc82aa0e8d248892a,2024-08-28T20:35:08.127000 @@ -249383,7 +249383,7 @@ CVE-2024-28943,0,0,0d7428b497ed4dc685ee859cada5a22616e64d89dbcd3a147111832c09c51 CVE-2024-28944,0,0,f3888aca11035410ad0fed8d85bb5091b862626240ff24765e70f6000a58dc46,2024-04-10T13:24:00.070000 CVE-2024-28945,0,0,04d2a9af526ca30e4ffc0ffa8edb0df1250eaa963fca5ac37255b03b4c8723e7,2024-04-10T13:24:00.070000 CVE-2024-28947,0,0,9d3506b7ac0d8414d56f005d3db3860beb6359f3ca23ee696b9b26b32dc4d488,2024-09-12T18:52:38.433000 -CVE-2024-28948,1,1,3c3e854e1a117f04755f1fc2737376d472ac7ee2a45da7e9cc509c72ae582dda,2024-09-27T18:15:04.197000 +CVE-2024-28948,0,0,3c3e854e1a117f04755f1fc2737376d472ac7ee2a45da7e9cc509c72ae582dda,2024-09-27T18:15:04.197000 CVE-2024-28949,0,0,d5e48bc4aa20c39f513a0582c3f637deca3b5b6936a689a13ce9af3ad1e7d8d0,2024-04-05T12:40:52.763000 CVE-2024-2895,0,0,b446221d46d418d396cd9d883702efdf5b2797ce3a0ab257ce4f7a9b35ffa891,2024-06-05T20:15:13.023000 CVE-2024-28951,0,0,a076a4222e08b02e8cd2b9c67ba4cfaca5bf7589b5e41c98ae39575c74159c6e,2024-04-02T12:50:42.233000 @@ -252535,8 +252535,8 @@ CVE-2024-33344,0,0,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e CVE-2024-33345,0,0,5fb5f74cbe8d9322d0f3b29fb4588f6cf198e3debc3830c92870acdd420c4824,2024-07-03T01:57:56.393000 CVE-2024-33350,0,0,4da55935e9588517cc2dba9e7ca9c451d32fef61d990ac2b7f8d39773dafe4a2,2024-07-03T01:57:57.207000 CVE-2024-33365,0,0,753a357764251688c2c58169a412ba47dbb205dad7d51ffa0d9b46ec5f577645,2024-08-01T13:51:53.400000 -CVE-2024-33368,1,1,ced3fbed5b37a6fa351703c9cf22fcdd82c5bc9ab2bbebf55feac1ee46b043de,2024-09-27T19:35:38.347000 -CVE-2024-33369,1,1,e125b4b53bf8f30eab800b99fb1930c4542a7a8a1d8d9782e28c6e80dc67c7e0,2024-09-27T19:35:39.847000 +CVE-2024-33368,0,0,ced3fbed5b37a6fa351703c9cf22fcdd82c5bc9ab2bbebf55feac1ee46b043de,2024-09-27T19:35:38.347000 +CVE-2024-33369,0,0,e125b4b53bf8f30eab800b99fb1930c4542a7a8a1d8d9782e28c6e80dc67c7e0,2024-09-27T19:35:39.847000 CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48f8,2024-05-02T18:00:37.360000 CVE-2024-33371,0,0,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000 CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000 @@ -253386,7 +253386,7 @@ CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87 CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000 CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000 CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000 -CVE-2024-34542,1,1,448bec67e5a9de69972bffb223f111a5ccd69a8038bd7509dd3b254bb012cc6b,2024-09-27T18:15:04.453000 +CVE-2024-34542,0,0,448bec67e5a9de69972bffb223f111a5ccd69a8038bd7509dd3b254bb012cc6b,2024-09-27T18:15:04.453000 CVE-2024-34543,0,0,d1d082cf58fb09716352a1b771df34e1a1085cf8f4fe64f8d879c516dd412fbe,2024-09-23T14:17:42.957000 CVE-2024-34545,0,0,30a1d58a5a9c49dffb8cec6e8682b29a77cba507757112fa783e98111c20a31c,2024-09-23T14:13:07.883000 CVE-2024-34546,0,0,8800da10c69fec688483057d2cb770a66eb40079057655e7555d9e5ef263c46b,2024-05-08T13:15:00.690000 @@ -255243,7 +255243,7 @@ CVE-2024-37180,0,0,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862 CVE-2024-37182,0,0,2c3b8dc4ac8a4c58e16690b89b8b1d4e60a1d50b12c336b43ce7311fbfe9a142,2024-08-07T16:08:10.810000 CVE-2024-37183,0,0,40759211984c4bbc303ff8d56740c06e4761a951d68b4235158aaff8607d5316,2024-06-21T11:22:01.687000 CVE-2024-37185,0,0,7506242f1ce72376b2b30a412cd4235ec1046d86e8f141e3c3ab3099b75bd0d2,2024-09-09T12:21:53.383000 -CVE-2024-37187,1,1,0c334888e3fcf27416a1e2144d76380d91baba943b26ddcbdbab63bc187e8f6f,2024-09-27T18:15:04.690000 +CVE-2024-37187,0,0,0c334888e3fcf27416a1e2144d76380d91baba943b26ddcbdbab63bc187e8f6f,2024-09-27T18:15:04.690000 CVE-2024-3719,0,0,e1388f5d62a0fd4143182e88b2e1e453aac0737837b6c91a5acc29cfca670145,2024-06-04T19:20:23.553000 CVE-2024-37198,0,0,bf34a330875867b427d853b7c401fbf1da6acf891d942b32d41eff0d38e81318,2024-06-24T18:55:25.417000 CVE-2024-37199,0,0,e0bc94ff3ffb2d447b176c847adbfd46c016cf032811bab5a07d3d759b2c5626,2024-07-25T19:28:39.857000 @@ -256038,7 +256038,7 @@ CVE-2024-38303,0,0,028afe1755065337ff24d15854e1a09f4321a858b56f8ecffef2fc2440540 CVE-2024-38304,0,0,c9c5e31995efec3c1031188bcbced9384b5bd23fcd1002d4307a7715d8d36271,2024-08-29T13:25:27.537000 CVE-2024-38305,0,0,ee5caad84873fbd92352a0446fe4dbaa8294a3e8c08e38b564114b506da289eb,2024-08-21T12:30:33.697000 CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000 -CVE-2024-38308,1,1,ede660bbdd3acded62256ac010e414c1e3400250af21c3fc60205062b6b984eb,2024-09-27T18:15:04.933000 +CVE-2024-38308,0,0,ede660bbdd3acded62256ac010e414c1e3400250af21c3fc60205062b6b984eb,2024-09-27T18:15:04.933000 CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000 CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000 CVE-2024-38313,0,0,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000 @@ -256432,7 +256432,7 @@ CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd3443 CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000 CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000 CVE-2024-38808,0,0,53d74bad70081ff05a1300457357e667e449199d0759115b64cb9ca097eeea3f,2024-08-20T15:44:20.567000 -CVE-2024-38809,0,0,fe0cdff1ac730d03b0835f4c4f18622f42435076867de5e5d8e37db3df24a93d,2024-09-27T17:15:12.393000 +CVE-2024-38809,0,1,2d6123022f4801f9e015259807c633edfa4d06b025c196110fe84161d9cf6ae8,2024-09-27T20:35:10.383000 CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000 CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000 CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000 @@ -256627,7 +256627,7 @@ CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000 CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000 -CVE-2024-39275,1,1,ab9311e8c17c5cead5320c770d56f66a0814f9dc1363bdd82612f13758d50912,2024-09-27T18:15:05.173000 +CVE-2024-39275,0,0,ab9311e8c17c5cead5320c770d56f66a0814f9dc1363bdd82612f13758d50912,2024-09-27T18:15:05.173000 CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000 CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000 CVE-2024-39278,0,0,58069499df62456724a7513c2a4610cfda6b008bc65dc970841f8e87808cbcaf,2024-09-06T12:08:04.550000 @@ -256693,7 +256693,7 @@ CVE-2024-39353,0,0,2167a4e696755ebb97fec80f167f71100aa107b125d2865a5fb1a76c1e17f CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882ba5,2024-05-02T18:00:37.360000 CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 -CVE-2024-39364,1,1,cddbdbf9385162913cdd829bcfd022489ed3440be471312e0e9ca4e079cfd82d,2024-09-27T18:15:05.417000 +CVE-2024-39364,0,0,cddbdbf9385162913cdd829bcfd022489ed3440be471312e0e9ca4e079cfd82d,2024-09-27T18:15:05.417000 CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000 CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000 CVE-2024-39373,0,0,49313ed17734e6debe931be9bab23ed5eb2e40aab9f298cb157f10a9804c26ee,2024-09-17T18:26:20.067000 @@ -257282,9 +257282,9 @@ CVE-2024-40500,0,0,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d CVE-2024-40502,0,0,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000 CVE-2024-40503,0,0,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000 CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000 -CVE-2024-40506,0,1,56d318dec543a258e8379a1056b94aea1892fa3bff6a76d94a32df617adb6a0a,2024-09-27T19:35:41.900000 -CVE-2024-40507,0,1,bac0094e397379a7a3429530e79371989beb903cb3ba3dcf6941846c376629fa,2024-09-27T19:35:42.957000 -CVE-2024-40508,0,0,875ef5f24d9ef2a983cc219f8e90c710f4d378b881c294f19d5c6ea699d3675f,2024-09-26T22:15:03.963000 +CVE-2024-40506,0,0,56d318dec543a258e8379a1056b94aea1892fa3bff6a76d94a32df617adb6a0a,2024-09-27T19:35:41.900000 +CVE-2024-40507,0,0,bac0094e397379a7a3429530e79371989beb903cb3ba3dcf6941846c376629fa,2024-09-27T19:35:42.957000 +CVE-2024-40508,0,1,163caea35cee6de2b2bade7074186a4c5c69d6089b94566378ffeefdb0584ca2,2024-09-27T20:35:11.070000 CVE-2024-40509,0,0,d1633f4b5cac1c7260d34a3e180cc3caa4c2c54ee32e532915a9d5bbdd1fd3f4,2024-09-27T17:35:02.243000 CVE-2024-40510,0,0,1cd8bae3c191b5c9c2bfb7f84e21a91a9f6f5b24548f0743b8a50e4f9c574a44,2024-09-27T15:15:14.820000 CVE-2024-40511,0,0,f8d973732f909d09045739fe483e49a99cd19af67b105075b44a6edfd4a75026,2024-09-27T17:35:05.557000 @@ -258621,7 +258621,7 @@ CVE-2024-42484,0,0,a1d071a36aea45bef6715a21ed0f1766066470b11470c144bede3c9c755cd CVE-2024-42485,0,0,9c52a237d351fcf0752a53847291432cd122014665f3d16b6c4975bcf35af6a7,2024-09-18T18:31:40.427000 CVE-2024-42486,0,0,a989fdd89a78984e53108438ae1d4599e890f4b44bbe2719c613b74d6b8f2b23,2024-08-19T13:00:23.117000 CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b3d2,2024-08-19T13:00:23.117000 -CVE-2024-42488,0,1,2e1cd2e30af855296712aec04f31ad7dc9d3eafb93055aaa6265177ab90fd230,2024-09-27T18:49:05.410000 +CVE-2024-42488,0,0,2e1cd2e30af855296712aec04f31ad7dc9d3eafb93055aaa6265177ab90fd230,2024-09-27T18:49:05.410000 CVE-2024-42489,0,0,181648e804e837cda5bb13bcded826140342ba5660b47fc9ce10fe5b939de398,2024-09-16T19:46:18.913000 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000 @@ -259110,7 +259110,7 @@ CVE-2024-43358,0,0,f13bf774ce7b4c63763f4e38f0e32b38260bf7ed8ec364046e3e65c356bf2 CVE-2024-43359,0,0,52133eb618029c9c6eb094064b83ba6c6a1a2658246d3d1db85edc0e06ef43d1,2024-09-04T21:43:09.613000 CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000 CVE-2024-43360,0,0,7806cb26815467de093fc97bcea332d20fcda51f3ce248e59da2d3fe25d63fb1,2024-09-04T21:42:20.023000 -CVE-2024-43366,0,1,10596fd0d5961ab0f378ad75066948ef896628eea187118ad2dc666e04926488,2024-09-27T18:08:11.690000 +CVE-2024-43366,0,0,10596fd0d5961ab0f378ad75066948ef896628eea187118ad2dc666e04926488,2024-09-27T18:08:11.690000 CVE-2024-43367,0,0,0f8409cf79e678cffdb4974928d567f1e40ad1650bdffb611ca3860d13e991c5,2024-08-19T13:00:23.117000 CVE-2024-43368,0,0,1d00a2d97832bca557e0027710c3b9dd305a4196742f053b6b5599e12fe83219,2024-08-15T13:01:10.150000 CVE-2024-43369,0,0,3f715b9274c2b9674573124fd01c9f3a8a848640345dd0ef56c5a08f4595beba,2024-08-19T13:00:23.117000 @@ -259126,16 +259126,16 @@ CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202 CVE-2024-43379,0,0,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc0798d3,2024-08-21T12:37:22.800000 CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000 CVE-2024-43381,0,0,cadf370b69704b630cecfb0fbe8ba07b198197e9a1164f2a1cf1bce7367f0908,2024-09-11T13:02:26.053000 -CVE-2024-43385,0,1,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096244,2024-09-27T19:33:08.770000 -CVE-2024-43386,0,1,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000 -CVE-2024-43387,0,1,4ccf94a52793dd24dc0376add620cfdf8d8ec8b86efb2e3a9e2719aaace5a025,2024-09-27T19:33:37.497000 -CVE-2024-43388,0,1,3a919f125f0d033e58d76594811e5e9eda62fdacecf5b54a65461d36b7a50c81,2024-09-27T19:32:48.683000 -CVE-2024-43389,0,1,3f9f9cdc5886b7ecf33bb8f06aa9b373429577236913585bc5184f4c4e9d7283,2024-09-27T19:36:56.583000 +CVE-2024-43385,0,0,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096244,2024-09-27T19:33:08.770000 +CVE-2024-43386,0,0,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000 +CVE-2024-43387,0,0,4ccf94a52793dd24dc0376add620cfdf8d8ec8b86efb2e3a9e2719aaace5a025,2024-09-27T19:33:37.497000 +CVE-2024-43388,0,0,3a919f125f0d033e58d76594811e5e9eda62fdacecf5b54a65461d36b7a50c81,2024-09-27T19:32:48.683000 +CVE-2024-43389,0,0,3f9f9cdc5886b7ecf33bb8f06aa9b373429577236913585bc5184f4c4e9d7283,2024-09-27T19:36:56.583000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 -CVE-2024-43390,0,1,23109d4525f6a9ca75d5d95186487af542b1184dea674403bc4a04a2882d389c,2024-09-27T19:37:28.887000 -CVE-2024-43391,0,1,e1b273922d974fb29084f2b4521133382c186185b99241fb223dbcc2186fc12f,2024-09-27T19:38:10.193000 -CVE-2024-43392,0,1,7a4ce8d1a077129e5a7ed7aa98f6ebb17ef4e5a287579f03daecd5e4e224d1cc,2024-09-27T19:04:26.060000 -CVE-2024-43393,0,1,9baf436015d55676fde0405cfe036d7154d0537886ad51cff547297f2e54588a,2024-09-27T19:36:03.473000 +CVE-2024-43390,0,0,23109d4525f6a9ca75d5d95186487af542b1184dea674403bc4a04a2882d389c,2024-09-27T19:37:28.887000 +CVE-2024-43391,0,0,e1b273922d974fb29084f2b4521133382c186185b99241fb223dbcc2186fc12f,2024-09-27T19:38:10.193000 +CVE-2024-43392,0,0,7a4ce8d1a077129e5a7ed7aa98f6ebb17ef4e5a287579f03daecd5e4e224d1cc,2024-09-27T19:04:26.060000 +CVE-2024-43393,0,0,9baf436015d55676fde0405cfe036d7154d0537886ad51cff547297f2e54588a,2024-09-27T19:36:03.473000 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 CVE-2024-43396,0,0,d3e4db1d56053a512790a84d8c3ae6e21035877ac8c09fe39077f7231484b09e,2024-09-03T18:19:33.167000 CVE-2024-43397,0,0,5caa94926889523c153ff1aaf47669fe6c71771da877710063b3b97c2bc5d0dc,2024-08-26T18:28:42.230000 @@ -260145,7 +260145,7 @@ CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc1 CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000 CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000 CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000 -CVE-2024-45682,0,1,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000 +CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000 CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000 CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000 CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000 @@ -260269,7 +260269,7 @@ CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca963 CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000 CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000 CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000 -CVE-2024-46097,1,1,a2aa4eb3f3510d099c585de53942ae579fa3e3e4e4659ef29bcc8e9d212699b3,2024-09-27T18:15:05.687000 +CVE-2024-46097,0,1,627e0402b1b50ebb8f11b3a815189def5c5f266d46c51926b2c740ac6fe4e699,2024-09-27T20:35:12.027000 CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000 CVE-2024-46101,0,0,a18b9da5d1e727101239ea9a87c2c4486b3562ecdcf33f11510119792a28bbeb,2024-09-26T13:32:55.343000 CVE-2024-46103,0,0,b2f06763cf5ad1bb9c9824f579431b62a9daa95bd664b0f57e87a402f9838181,2024-09-26T13:32:55.343000 @@ -260287,8 +260287,8 @@ CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 -CVE-2024-46256,1,1,dba316197e905e3b34748116deb503c053e35ccafe66da2ac53cf681697b8db5,2024-09-27T18:15:05.787000 -CVE-2024-46257,1,1,d2db966c8ceff75ace32702d7ee24ee8dfca463e199814f65b0905374cef38a2,2024-09-27T18:15:05.870000 +CVE-2024-46256,0,0,dba316197e905e3b34748116deb503c053e35ccafe66da2ac53cf681697b8db5,2024-09-27T18:15:05.787000 +CVE-2024-46257,0,0,d2db966c8ceff75ace32702d7ee24ee8dfca463e199814f65b0905374cef38a2,2024-09-27T18:15:05.870000 CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000 CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000 CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000 @@ -260305,8 +260305,8 @@ CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000 CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000 CVE-2024-46362,0,0,8cdb883bb64f25e58b7c696699971ee36778fa528121237250c7da4497ad58d6,2024-09-20T12:30:51.220000 -CVE-2024-46366,0,0,32fee941e3477f38496426c9dfbd23043f6b9230cc739cb2341cf527b2eb24d1,2024-09-27T17:15:13.400000 -CVE-2024-46367,0,0,58f85c2ee5f0f9ac2c557834d0c3dd066e268662e4efaed2e72a41696b171252,2024-09-27T17:15:13.487000 +CVE-2024-46366,0,1,a15ad5c8e03195f0c0817bbf460e8b8c3bdb9facd8ec23d661b448c5e6e4edd8,2024-09-27T20:35:12.770000 +CVE-2024-46367,0,1,c21f1fb2d7acf1b4c5929a647f7c8baa785c92c3b650529e7205a0d9e25436de,2024-09-27T20:35:13.517000 CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000 CVE-2024-46372,0,0,e3b69cc491c1ce73557c9fae2d89432e3f39b15e7ad51da831599618ee55991e,2024-09-24T15:40:12.980000 CVE-2024-46373,0,0,364353f8eed746e65cf065bb51dddf6fa9b6298b578b96d8db4d43f0b16ff53a,2024-09-20T12:30:17.483000 @@ -260328,6 +260328,7 @@ CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f63 CVE-2024-46441,0,0,2418b86253ca00f9dc7f73a4a3e896b30ddde24c4b20f0f372cbb6dbc59ef2a5,2024-09-27T15:35:03.803000 CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000 CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000 +CVE-2024-46453,1,1,b68bb15bb440f00a38a1c5270a76c20c1ee28b0799a4573dd099acd9176b420e,2024-09-27T21:15:03.350000 CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000 CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000 CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000 @@ -260734,6 +260735,7 @@ CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915 CVE-2024-47180,0,0,d098d674c2c5dd84a239cf91df06907f039b4828c306456dcad3f506e675b516,2024-09-26T20:15:07.310000 CVE-2024-47182,0,0,69a16fc9154ea6d7ac97d74655916e8770997f865ecb98299d0d581a01a394b7,2024-09-27T14:15:04.620000 CVE-2024-47184,0,0,af8ebb1816d7ba0a039271d512029a4f3a5177b9bc7103f3acf040e130a3146c,2024-09-27T14:15:04.833000 +CVE-2024-47186,1,1,e4f8ce43fafbf516bf28164ab1dec73a08a2eb15490bbcac5ce1bb957b6e3c72,2024-09-27T21:15:03.443000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47197,0,0,e744485fe82b2c7f5b7c9d650df3296f2a00094efea0a5ed0597ce38048212b5,2024-09-26T13:32:02.803000 CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000 @@ -261148,7 +261150,7 @@ CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2 CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 -CVE-2024-5170,0,1,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000 +CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 @@ -262248,6 +262250,7 @@ CVE-2024-6431,0,0,fcbb0ceb19b6b17057a6532823d607ef530236adc570023f161f002351d029 CVE-2024-6433,0,0,4cb445c95e15de0c345d2cc06e9508b276183ca5d50834d0b48eec3d0df1757b,2024-07-12T08:15:11.963000 CVE-2024-6434,0,0,0183eab14185d66c3308593554f63a98c54f148b051e07902898143029a6dc1e,2024-07-05T17:22:04.687000 CVE-2024-6435,0,0,537ce55d66a34e30f0cdc2fa5f4ebac2551f4222db736332f8b163433bf2dbed,2024-07-16T13:43:58.773000 +CVE-2024-6436,1,1,64ddc4176d1222c2cbf78da7882b182362473f77dc357849500fda95706d0bbf,2024-09-27T20:15:06.043000 CVE-2024-6438,0,0,dda5c3ef0b29175f6296e0b89d7c12c3e07fe51c2f0cc30ea59ffede8f26636c,2024-07-02T17:54:02.370000 CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a09a,2024-07-02T17:58:39.773000 CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000 @@ -262289,7 +262292,7 @@ CVE-2024-6489,0,0,9e9ca0d507c7dd8804b1fd0a0aa043e3fe6638bfc4af4b9ea109d44e00b0a1 CVE-2024-6490,0,0,899b982533855ad09e3dbb0e567c02d65e33383a1b395d2221626be09ed0f8ee,2024-08-01T14:00:24.333000 CVE-2024-6491,0,0,777eb845cac0fc56ad6345347b6b7dff4d99542463073dd5b5752a23e8a26dec,2024-07-22T13:00:53.287000 CVE-2024-6492,0,0,82f79625038ad5debf137137104e45e1e353947b9c4b14df742baece7a047a71,2024-07-17T13:34:20.520000 -CVE-2024-6493,0,0,0a834dea1c3cc746c6a827d048ba68f6ec225a3c2192f6f2cdc6cbf59e192ce5,2024-09-13T16:35:18.740000 +CVE-2024-6493,0,1,62fd8aea82524d9b2897c3d31566621c073b255968a2f6d1f1e5c8fb9113152c,2024-09-27T21:28:49.020000 CVE-2024-6494,0,0,5d616b6f04502e7b8421d6bcde94ff1c84cc44e101748b87939c18b401c713e1,2024-08-07T15:17:46.717000 CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d915,2024-07-12T16:34:58.687000 CVE-2024-6496,0,0,4f2145d6969061de095037c65c4c02c00a89d2331ecd0d31a6eacfc030927f42,2024-08-07T14:35:07.403000 @@ -262396,7 +262399,7 @@ CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520 CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000 CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000 CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9ba8,2024-07-16T18:15:09.893000 -CVE-2024-6617,0,0,b560d79c8ba42d6bf40fdf308b9239d576bc1e677a8ac51cdf4ad279b27d7573,2024-09-13T16:35:18.930000 +CVE-2024-6617,0,1,5909931dadcbc2469c78c33ae14eaaff085d3be701252e008f4f95589a185469,2024-09-27T21:28:35.543000 CVE-2024-6618,0,0,e35778534e5c89186065378dfc4e3df4bed15c4f9d7950adea6d3cb891d47959,2024-08-14T02:07:05.410000 CVE-2024-6619,0,0,f3a91e3a6a10b3f4f501b46572779a0f05e320927845dcf9e15b84cacb4a9100,2024-08-14T02:07:05.410000 CVE-2024-6620,0,0,64e06f08829405566592b044b4a90e5d81b7212d27ff82e69e11d8e82efebda8,2024-07-30T13:33:30.653000 @@ -262476,7 +262479,7 @@ CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75b CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000 CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000 CVE-2024-6722,0,0,703a21dd5b88a7779498c521e3d50e4d788d54c0da4855e87bfa30931015fa08,2024-09-04T15:35:25.590000 -CVE-2024-6723,0,1,89ebec83340ae368fccf6f870b3378a75d74772673809cf534be51c70b5921e8,2024-09-27T18:50:00.913000 +CVE-2024-6723,0,0,89ebec83340ae368fccf6f870b3378a75d74772673809cf534be51c70b5921e8,2024-09-27T18:50:00.913000 CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f22d,2024-08-13T15:35:30.033000 CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000 CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000 @@ -262530,7 +262533,7 @@ CVE-2024-6780,0,0,ad87716761d57bba157b9bc6302fd56c93db87ccc83552a263372092cb4e84 CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000 CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000 -CVE-2024-6785,0,1,ef25cfd9dd9fb398c181c2e2c1a44a7dbc0dc59353d1fa28c2cc7cafe3b60589,2024-09-27T18:59:25.253000 +CVE-2024-6785,0,0,ef25cfd9dd9fb398c181c2e2c1a44a7dbc0dc59353d1fa28c2cc7cafe3b60589,2024-09-27T18:59:25.253000 CVE-2024-6786,0,0,6597b7dd569386c901be03b7245eaafe138b67af6e27e8cdf77a3a0b8ca4cea0,2024-09-26T13:32:55.343000 CVE-2024-6787,0,0,e0b77d2378b8922074bb9dd2f1bdf4b4b3c5d5d4b21b5875d179c9f9f1a98777,2024-09-26T13:32:55.343000 CVE-2024-6788,0,0,369ef896034f113597a96208fca075acd0c3bdd5e82bf3987939f5fd20470069,2024-08-13T17:11:53.553000 @@ -262570,7 +262573,7 @@ CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3b CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000 CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000 CVE-2024-6849,0,0,07092c81deee0f13cbc863d08f18b6ad24a98e3f6832c77e93da65ee89b7a746,2024-09-26T16:36:13.207000 -CVE-2024-6850,0,1,b532166a73b931a8e6589cac5f39582da12c7cd2ba07fbd5ded704f1eec5891d,2024-09-27T18:30:30.930000 +CVE-2024-6850,0,0,b532166a73b931a8e6589cac5f39582da12c7cd2ba07fbd5ded704f1eec5891d,2024-09-27T18:30:30.930000 CVE-2024-6852,0,0,cd867431022b85ee5515b69c46ab068b7525885927be7fa9cfc4c875a9f47878,2024-09-11T16:23:02.500000 CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c118,2024-09-11T16:22:18.850000 CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000 @@ -262776,9 +262779,9 @@ CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072a CVE-2024-7125,0,0,eeabb5486a5ad2f2094206d4f0142bb635fc7a57bcd2279354b026b1e44628c1,2024-08-27T13:01:37.913000 CVE-2024-7127,0,0,2842be40cd41bba2687b1d2d238a3a521369bfe05553f868496bd1f3f7f4951f,2024-08-23T14:00:59.740000 CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000 -CVE-2024-7129,0,1,7be2af5cd46444dfa860a3986fbc878686c2d44c992fb72236870ca711446d78,2024-09-27T18:26:27.560000 +CVE-2024-7129,0,0,7be2af5cd46444dfa860a3986fbc878686c2d44c992fb72236870ca711446d78,2024-09-27T18:26:27.560000 CVE-2024-7132,0,0,3deac5f1e9f8ee84791f2e4d6b9257b8de66af7b06b212663d3e71b6260e8de4,2024-08-29T20:37:07.980000 -CVE-2024-7133,0,0,4e98e3b561cf958bf35a6721b4cbee642ee930a0b0430e16ecd022d881c6c890,2024-09-13T16:35:19.507000 +CVE-2024-7133,0,1,717bce18b1e84ac850eb1ced68f8178470529ff4827bef90b482d0644c3109d8,2024-09-27T21:27:50.053000 CVE-2024-7134,0,0,c5170ada8be1ea583d3dc92d1c0c20ff0ddcfa0f860d82c947cda0aff2380786,2024-08-21T12:30:33.697000 CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000 CVE-2024-7136,0,0,8aada0541fe051e5634e6d0e6056d54d479250830cd49e1b32d308af5a5c28dc,2024-08-19T13:00:23.117000 @@ -263227,8 +263230,8 @@ CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b4 CVE-2024-7693,0,0,8f49e917567dbf3d83b8fab0c0f87defce06a4391222113e25ab3be3d08b6e06,2024-09-06T16:51:35.647000 CVE-2024-7694,0,0,915a620e49de11e538187b87ae1859b4dd8b81a9c117898d10d07c783b69fb2e,2024-09-06T17:24:42.573000 CVE-2024-7697,0,0,56fc87c2b950fc0d4b7d08c76bcec1377c688ea98c921a8e581bb6c082412bb3,2024-09-06T18:04:28.030000 -CVE-2024-7698,0,1,8d09c845ea30b5a1b14332868681fb099784f66e3bda73378a3a159a0b6b09bd,2024-09-27T19:39:43.350000 -CVE-2024-7699,0,1,ed5dc56e694e06cefce7f4b6728302d59b16d08df75052ff1f1aef59a8ce1489,2024-09-27T18:59:31.277000 +CVE-2024-7698,0,0,8d09c845ea30b5a1b14332868681fb099784f66e3bda73378a3a159a0b6b09bd,2024-09-27T19:39:43.350000 +CVE-2024-7699,0,0,ed5dc56e694e06cefce7f4b6728302d59b16d08df75052ff1f1aef59a8ce1489,2024-09-27T18:59:31.277000 CVE-2024-7700,0,0,35ccbcc6c9987f858b077e015d668845c4772768b7fa013291f6195b76e0abe5,2024-09-16T14:20:21.087000 CVE-2024-7702,0,0,35104b2d835bcff771d3508b754ac4f00b960fb6fd0cdfa84ab47a794def21ca,2024-08-26T18:15:46.870000 CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000 @@ -263237,7 +263240,7 @@ CVE-2024-7705,0,0,8729f8bc3ceb5c5f01c7dd391e96850b57511177f9d82b06cbc0e989f2466c CVE-2024-7706,0,0,f82d2763755e9a5f550b3d32288a2fafc9a32d9b764dc49c7c067ba5792a16b6,2024-08-22T13:26:21.843000 CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb01,2024-08-22T13:23:20.327000 CVE-2024-7709,0,0,4ea4e71ad8cd2325399b6f32c817fafe76ecfe7c20ad1838061c8bb44a136e96,2024-08-17T10:15:10.957000 -CVE-2024-7711,0,1,5f68b281cfe401fc4184ff1613ff12ae79d70995453a2a2aa130ad5c1bee1478,2024-09-27T18:17:05.577000 +CVE-2024-7711,0,0,5f68b281cfe401fc4184ff1613ff12ae79d70995453a2a2aa130ad5c1bee1478,2024-09-27T18:17:05.577000 CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000 CVE-2024-7713,0,0,087ec51e88c8fe30f0c34d44b176229232ed6289fc8aa5ebb9431dfe92cfcd5e,2024-09-27T06:15:11.327000 CVE-2024-7714,0,0,705d8fa26395ef610bad264ffef178490d23a61ef3ede9b9fe5bf2e0a9ab5182,2024-09-27T17:35:15.420000 @@ -263311,11 +263314,11 @@ CVE-2024-7813,0,0,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f CVE-2024-7814,0,0,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000 CVE-2024-7815,0,0,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000 CVE-2024-7816,0,0,1b2db663d31365ee9da148e02f7fee6f7353ee5fdc15036a02dd578f17770d3c,2024-09-26T20:23:28.730000 -CVE-2024-7817,0,1,7f26ae977b6327d2a59614ba3ea301244dcc145b21edee3156a2c2d963536ef9,2024-09-27T18:26:21.653000 -CVE-2024-7818,0,1,a8a60252768c6bfc8071e3d171ec5ea550be85793d142018d723cdcbb9fdc29f,2024-09-27T18:18:55.510000 -CVE-2024-7820,0,1,c0453860ab9b7e75523d5974f7f62d77644e4cfdd4c296287f5b328e58fa219d,2024-09-27T18:08:48.757000 +CVE-2024-7817,0,0,7f26ae977b6327d2a59614ba3ea301244dcc145b21edee3156a2c2d963536ef9,2024-09-27T18:26:21.653000 +CVE-2024-7818,0,0,a8a60252768c6bfc8071e3d171ec5ea550be85793d142018d723cdcbb9fdc29f,2024-09-27T18:18:55.510000 +CVE-2024-7820,0,0,c0453860ab9b7e75523d5974f7f62d77644e4cfdd4c296287f5b328e58fa219d,2024-09-27T18:08:48.757000 CVE-2024-7821,0,0,a6cbf4229b3ac9caad2c13358d94e9d25b2f946f0353199ff2ed2717953ff2a4,2024-09-04T10:15:03.553000 -CVE-2024-7822,0,1,3e66fd0a5154ef0743417ad63783b1476c2b8be2ef3918498eb762e4c9c4ec06,2024-09-27T18:06:41.287000 +CVE-2024-7822,0,0,3e66fd0a5154ef0743417ad63783b1476c2b8be2ef3918498eb762e4c9c4ec06,2024-09-27T18:06:41.287000 CVE-2024-7827,0,0,20afe3aa4a313fb97b1d97a1cbf5257a0701f273bd3d99d4148b86bfbef51981,2024-08-20T15:44:20.567000 CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000 CVE-2024-7829,0,0,3634da4931045efa2221e4dd20ed9805c5f347e47423b6602d3467d4b2db62e9,2024-08-19T18:34:00.040000 @@ -263344,12 +263347,12 @@ CVE-2024-7854,0,0,aba539cc6b053a0969fb9c545d61b200c22ae8ea4b03c24dce9c6e90a428e0 CVE-2024-7856,0,0,0b05d57dab8dba6cdf2a128a5ea955132a0df5f7068b3f603d90db91d8053f54,2024-09-13T18:14:47.280000 CVE-2024-7857,0,0,b74961afa7dd10dda782bf64e146bf5117eb37327cdce5dd6f430c037eea52b1,2024-08-29T13:25:27.537000 CVE-2024-7858,0,0,dbe22e1f02da632a108fdb9c096b7008488e7f6cd1024c2ca6a33d2456cc067c,2024-09-03T14:34:09.017000 -CVE-2024-7859,0,1,226a85a1690e60d5c312a7296dfa4fc4fa943380666900b35d25ad4eaf87137f,2024-09-27T18:00:53.567000 -CVE-2024-7860,0,0,6478691d52b931fe14a87d864f1defb31ceb3c959fc542786a5c247463eccd66,2024-09-12T14:35:19.980000 -CVE-2024-7861,0,0,7dc841d67f7cbf14766a683bac9706b93075a04167273c804ada991b965813f0,2024-09-12T14:35:20.767000 +CVE-2024-7859,0,0,226a85a1690e60d5c312a7296dfa4fc4fa943380666900b35d25ad4eaf87137f,2024-09-27T18:00:53.567000 +CVE-2024-7860,0,1,c391ad7c4ef407489069e585cb95bbfbb22674e36a77cbf1c14427ff7d81452b,2024-09-27T20:56:24.493000 +CVE-2024-7861,0,1,0a909509d97ae1cc7403adef3feb39aabff91c1c695789c3f097cacdbb9f06a1,2024-09-27T20:52:11.350000 CVE-2024-7862,0,0,ab3213803d3b49b6ac19aa8c58cc004e989e60ff7f240b01de14d09685981992,2024-09-12T14:35:21.530000 -CVE-2024-7863,0,0,70e912b75e64a9ad15fba5801d0c87cd1786e11898364009ea5424c34735176f,2024-09-13T15:35:12.780000 -CVE-2024-7864,0,0,1d6e49f55212be3f9d708df04449199a97515666347747f7c296214a9b1ccb9b,2024-09-13T15:35:12.997000 +CVE-2024-7863,0,1,11d320db6ad42df94b7ce126cd0ba1a84504b8818a402a12b56e92e066aa845a,2024-09-27T21:27:07.640000 +CVE-2024-7864,0,1,8cb55f9c6813f7ebb3e411de07404fd2812a548c1112fcc9ece6be38f8f1e98f,2024-09-27T21:26:50.067000 CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000 CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000 CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d1a,2024-09-11T12:40:01.817000 @@ -263466,15 +263469,15 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000 CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000 CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000 -CVE-2024-8043,0,1,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000 +CVE-2024-8043,0,0,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000 CVE-2024-8044,0,0,66a840b3b744914aeb912493a88172b219c2bc4688dd089a25891a08edff7e40,2024-09-20T12:31:20.110000 CVE-2024-8045,0,0,4f33bec2129e516f0590350db62def0ffeb2e64cb03de1e46d8b3d52953002f0,2024-09-25T19:22:03.157000 CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000 -CVE-2024-8047,0,0,451c9202eb5241e7fe3b1625d48b44a3fdd0de8dfb43ec8dea1780c6029fedaf,2024-09-20T12:31:20.110000 -CVE-2024-8051,0,1,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934c5,2024-09-27T18:19:41.863000 +CVE-2024-8047,0,1,b09ff33da28d13c746e9dd8622cb16da9ea9a8911cc13c3fef8877b81efca550,2024-09-27T21:25:08.523000 +CVE-2024-8051,0,0,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934c5,2024-09-27T18:19:41.863000 CVE-2024-8052,0,0,d36ff2157e56024767ea82c9c1b8c76ab39601d237dbfd50c7fb1e6eeba7daeb,2024-09-27T16:55:57.383000 -CVE-2024-8054,0,0,cd3f21fbab232193f2e1023cd4fdcf2e5fe80aa9a017de7b992adfbc243b258d,2024-09-12T14:35:22.300000 -CVE-2024-8056,0,0,5fb88a6ca250e6ff67f8a1ef0c841abbb4c8f2529c05613c2143403e703e96cb,2024-09-12T13:35:23.340000 +CVE-2024-8054,0,1,f7372d07d80e2782b99a1ec78381d10ed3eddb2361d69efd0f5544951feb686d,2024-09-27T21:29:57.607000 +CVE-2024-8056,0,1,7d94e922f5f6064358baece439e000bb5b536e03070693d567d210e7b17a441d,2024-09-27T21:29:42.600000 CVE-2024-8059,0,0,bdae740e9708e98c12d1deb7f7b4958a4e9e21cc3d70a47ecc6f19d9246061d0,2024-09-14T11:47:14.677000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8067,0,0,21c0729ad9dc772677b9fbf75bb24db3bcf4512001a88b1eef9d39bf31f69153,2024-09-26T13:32:02.803000 @@ -263494,9 +263497,9 @@ CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800d CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000 CVE-2024-8088,0,0,8ddda94d9e5d462484d35576871f82a931bed67f85a71db29ea75a996b1d19a4,2024-09-04T23:15:13.100000 CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000 -CVE-2024-8091,0,1,06172e44aed678336443c20950f76caa42dd2c2e908885cff9a8110617689662,2024-09-27T18:17:59.267000 -CVE-2024-8092,0,1,065d7728a5c27093389a465996d8f4f342cb2cfe4c5f3383890730cf2cd938fc,2024-09-27T18:17:24.387000 -CVE-2024-8093,0,1,98e0c7040cf9105cb1c3055778b4c0e7f9f1a20fe40737d282c5bab0fdcb3801,2024-09-27T18:16:01.683000 +CVE-2024-8091,0,0,06172e44aed678336443c20950f76caa42dd2c2e908885cff9a8110617689662,2024-09-27T18:17:59.267000 +CVE-2024-8092,0,0,065d7728a5c27093389a465996d8f4f342cb2cfe4c5f3383890730cf2cd938fc,2024-09-27T18:17:24.387000 +CVE-2024-8093,0,0,98e0c7040cf9105cb1c3055778b4c0e7f9f1a20fe40737d282c5bab0fdcb3801,2024-09-27T18:16:01.683000 CVE-2024-8096,0,0,33268897f7f8b2273839db6d4e75fbc8fdf5f760a220b507e80b08e690a9edf4,2024-09-11T16:26:11.920000 CVE-2024-8097,0,0,9eb75255abcd069d744af59bd7e8120e62794401b3e1be4e7c495de1066a7b41,2024-09-12T12:35:54.013000 CVE-2024-8102,0,0,59b268e27a6763219f51e9e55e73ae4276fd3b992bf79726ec1ccd845c10f5f9,2024-09-05T13:28:54.747000 @@ -263606,7 +263609,7 @@ CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000 CVE-2024-8253,0,0,538885466f07c28468f1d184c3fb77b594dc3a7e7631ea6be509e963086ff9ce,2024-09-25T19:42:31.943000 CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000 -CVE-2024-8258,0,1,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000 +CVE-2024-8258,0,0,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000 CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000 CVE-2024-8263,0,0,ad65448f4ef9e6d39f00279a5a8db0ec57a6e502dd6ab5aa12fd95772e708ca5,2024-09-26T13:32:55.343000 CVE-2024-8267,0,0,a2c757f79a1be4af3dcdbc6f7c080b05c84634b9f014df0bba5d8d956f6b81cf,2024-09-26T13:32:02.803000 @@ -263747,7 +263750,7 @@ CVE-2024-8481,0,0,67325c0356d12406e49fab472e21b05bb6061508372f0502a0ce3d40d30f14 CVE-2024-8483,0,0,32ab224ff359b84d82ed4ce77aef264a7f492427c24d93140e77029461e7169c,2024-09-26T13:32:02.803000 CVE-2024-8484,0,0,d0fccdedacf4dc6329ba9866ef74b74fbb5f8d079ba99b2fc034c60f4afe6c85,2024-09-26T13:32:02.803000 CVE-2024-8485,0,0,2d19876b7de8e9f56ec7e63c79b17d47547448dd4997ef0bac6df72b646b7654,2024-09-26T13:32:02.803000 -CVE-2024-8490,0,1,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 +CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000 @@ -263889,7 +263892,7 @@ CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f99 CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000 CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000 CVE-2024-8758,0,0,634aeeda8f9e91934f78e3b64172027c163c387830078a2c36c39ec180a63900,2024-09-27T14:29:23.157000 -CVE-2024-8761,0,1,848a595fd57d8370e05b835997d27866b56b6fe7dc68e418780d166762e6c8fc,2024-09-27T18:41:43.043000 +CVE-2024-8761,0,0,848a595fd57d8370e05b835997d27866b56b6fe7dc68e418780d166762e6c8fc,2024-09-27T18:41:43.043000 CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000 CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588dfe2,2024-09-20T12:31:20.110000 CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e0e,2024-09-20T12:31:20.110000 @@ -264039,7 +264042,7 @@ CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae5 CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000 CVE-2024-9148,0,0,67e1a8965ac157a49477c7b911dc2eab586d6712cddbbb8bebbaaf2d7b8d1009,2024-09-26T13:32:02.803000 CVE-2024-9155,0,0,3667cd6d9c617f3b4fff82f34cbe0acc0c5672d976fdd89baf4e1efb8fe50604,2024-09-26T15:15:18.060000 -CVE-2024-9160,1,1,715ee1443ce6e224602c969cbcd987ef5a27c7bcedffe295ef23dde41ba44f85,2024-09-27T19:15:10.733000 +CVE-2024-9160,0,0,715ee1443ce6e224602c969cbcd987ef5a27c7bcedffe295ef23dde41ba44f85,2024-09-27T19:15:10.733000 CVE-2024-9166,0,0,f959a40ffb6dedc25519b3fb4ef712dde7361eac9f511d5aa4ad9abbf925f6d2,2024-09-26T17:15:04.460000 CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000 CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000 @@ -264061,4 +264064,6 @@ CVE-2024-9281,0,0,b14fc5143e6a25d74bc27cc2c4a8f20e853a4566f74d81cd628d7209421769 CVE-2024-9282,0,0,904745e99b02f17fad93e3d4d12dede442ce386a61a1af6532becd6450b367a2,2024-09-27T13:15:18.443000 CVE-2024-9283,0,0,0dc135be53023bca555d778c9a31c3d6f3a80278eb8a9232d8da6a70571f147e,2024-09-27T14:15:05.330000 CVE-2024-9284,0,0,a3f6be1f322902c2dd706322ffd372bfbe9b47cbadedd7cc30aad50104d2b033,2024-09-27T17:15:14.600000 -CVE-2024-9301,1,1,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000 +CVE-2024-9291,1,1,cb57967e7b1c1e3b6bbd39bdcccb61b556906a24da36a7110dece4902c704d59,2024-09-27T21:15:03.667000 +CVE-2024-9293,1,1,58d1b3c8bf6371fb336102f333c7989d6dbbcc39b37756484826d43b383204c0,2024-09-27T21:15:03.937000 +CVE-2024-9301,0,0,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000