From 38f3dc13682758b1d374639eff72aa723f7fbfc1 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 14 Nov 2024 13:04:02 +0000 Subject: [PATCH] Auto-Update: 2024-11-14T13:01:00.990980+00:00 --- CVE-2022/CVE-2022-316xx/CVE-2022-31666.json | 56 +++++++++++++++++ CVE-2022/CVE-2022-316xx/CVE-2022-31667.json | 56 +++++++++++++++++ CVE-2022/CVE-2022-316xx/CVE-2022-31668.json | 56 +++++++++++++++++ CVE-2022/CVE-2022-316xx/CVE-2022-31669.json | 56 +++++++++++++++++ CVE-2022/CVE-2022-316xx/CVE-2022-31670.json | 56 +++++++++++++++++ CVE-2022/CVE-2022-316xx/CVE-2022-31671.json | 60 ++++++++++++++++++ CVE-2023/CVE-2023-41xx/CVE-2023-4134.json | 64 +++++++++++++++++++ CVE-2023/CVE-2023-44xx/CVE-2023-4458.json | 64 +++++++++++++++++++ CVE-2024/CVE-2024-105xx/CVE-2024-10571.json | 64 +++++++++++++++++++ CVE-2024/CVE-2024-34xx/CVE-2024-3447.json | 68 +++++++++++++++++++++ CVE-2024/CVE-2024-450xx/CVE-2024-45099.json | 56 +++++++++++++++++ CVE-2024/CVE-2024-456xx/CVE-2024-45642.json | 56 +++++++++++++++++ CVE-2024/CVE-2024-456xx/CVE-2024-45670.json | 56 +++++++++++++++++ CVE-2024/CVE-2024-77xx/CVE-2024-7730.json | 60 ++++++++++++++++++ CVE-2024/CVE-2024-81xx/CVE-2024-8180.json | 68 +++++++++++++++++++++ CVE-2024/CVE-2024-94xx/CVE-2024-9472.json | 4 ++ CVE-2024/CVE-2024-96xx/CVE-2024-9693.json | 60 ++++++++++++++++++ README.md | 44 ++++++------- _state.csv | 50 +++++++++------ 19 files changed, 1015 insertions(+), 39 deletions(-) create mode 100644 CVE-2022/CVE-2022-316xx/CVE-2022-31666.json create mode 100644 CVE-2022/CVE-2022-316xx/CVE-2022-31667.json create mode 100644 CVE-2022/CVE-2022-316xx/CVE-2022-31668.json create mode 100644 CVE-2022/CVE-2022-316xx/CVE-2022-31669.json create mode 100644 CVE-2022/CVE-2022-316xx/CVE-2022-31670.json create mode 100644 CVE-2022/CVE-2022-316xx/CVE-2022-31671.json create mode 100644 CVE-2023/CVE-2023-41xx/CVE-2023-4134.json create mode 100644 CVE-2023/CVE-2023-44xx/CVE-2023-4458.json create mode 100644 CVE-2024/CVE-2024-105xx/CVE-2024-10571.json create mode 100644 CVE-2024/CVE-2024-34xx/CVE-2024-3447.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45099.json create mode 100644 CVE-2024/CVE-2024-456xx/CVE-2024-45642.json create mode 100644 CVE-2024/CVE-2024-456xx/CVE-2024-45670.json create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7730.json create mode 100644 CVE-2024/CVE-2024-81xx/CVE-2024-8180.json create mode 100644 CVE-2024/CVE-2024-96xx/CVE-2024-9693.json diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json new file mode 100644 index 00000000000..da2b83fbc24 --- /dev/null +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-31666", + "sourceIdentifier": "security@vmware.com", + "published": "2024-11-14T12:15:16.083", + "lastModified": "2024-11-14T12:15:16.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Harbor fails to validate user permissions while deleting Webhook policies, allowing malicious users to view, update and delete Webhook policies of other users.\u00a0\u00a0The attacker could modify Webhook policies configured in other projects." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-8hwq-5f22-jfr3", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31667.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31667.json new file mode 100644 index 00000000000..b18c97cb194 --- /dev/null +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31667.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-31667", + "sourceIdentifier": "security@vmware.com", + "published": "2024-11-14T12:15:16.390", + "lastModified": "2024-11-14T12:15:16.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Harbor fails to validate the user permissions when updating a robot account that\u00a0belongs to a project that the authenticated user doesn\u2019t have access to.\u00a0\n\nBy sending a request that attempts to update a robot account, and specifying a robot\u00a0account id and robot account name that belongs to a different project that the user\u00a0doesn\u2019t have access to, it was possible to revoke the robot account permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31668.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31668.json new file mode 100644 index 00000000000..bd9a5813e1f --- /dev/null +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31668.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-31668", + "sourceIdentifier": "security@vmware.com", + "published": "2024-11-14T12:15:16.607", + "lastModified": "2024-11-14T12:15:16.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Harbor fails to validate the user permissions when updating p2p preheat policies.\u00a0By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31669.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31669.json new file mode 100644 index 00000000000..a37715bf061 --- /dev/null +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31669.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-31669", + "sourceIdentifier": "security@vmware.com", + "published": "2024-11-14T12:15:16.817", + "lastModified": "2024-11-14T12:15:16.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Harbor fails to validate the user permissions when updating tag immutability policies.\u00a0\n\nBy sending a request to update a tag immutability policy with an id that belongs to a\nproject that the currently authenticated user doesn\u2019t have access to, the attacker could\nmodify tag immutability policies configured in other projects." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-8c6p-v837-77f6", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31670.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31670.json new file mode 100644 index 00000000000..fbdb899ef97 --- /dev/null +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-31670", + "sourceIdentifier": "security@vmware.com", + "published": "2024-11-14T12:15:17.040", + "lastModified": "2024-11-14T12:15:17.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Harbor fails to validate the user permissions when updating tag retention policies.\u00a0\n\nBy sending a request to update a tag retention policy with an id that belongs to a project\u00a0that the currently authenticated user doesn\u2019t have access to, the attacker could modify\ntag retention policies configured in other projects." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3637-v6vq-xqqw", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31671.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31671.json new file mode 100644 index 00000000000..30bafad6775 --- /dev/null +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31671.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-31671", + "sourceIdentifier": "security@vmware.com", + "published": "2024-11-14T12:15:17.250", + "lastModified": "2024-11-14T12:15:17.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Harbor fails to validate user permissions when reading and updating job execution logs through the P2P preheat execution logs. By sending a request that attempts to read/update P2P preheat execution logs and specifying different job IDs, malicious authenticated users\u00a0could read all the job logs stored in the Harbor database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7", + "source": "security@vmware.com" + }, + { + "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-q76q-q8hw-hmpw", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4134.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4134.json new file mode 100644 index 00000000000..3370fcb467f --- /dev/null +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4134.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2023-4134", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2024-11-14T11:15:03.730", + "lastModified": "2024-11-14T11:15:03.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de use-after-free en el controlador cyttsp4_core del kernel de Linux. Este problema se produce en la rutina de limpieza del dispositivo debido a un posible rearme del watchdog_timer desde la cola de trabajo. Esto podr\u00eda permitir que un usuario local bloquee el sistema, lo que provocar\u00eda una denegaci\u00f3n de servicio. " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-4134", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221700", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4458.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4458.json new file mode 100644 index 00000000000..a0a15bf7853 --- /dev/null +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4458.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2023-4458", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2024-11-14T12:15:17.487", + "lastModified": "2024-11-14T12:15:17.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-4458", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325516", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-590/", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10571.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10571.json new file mode 100644 index 00000000000..02817fd4673 --- /dev/null +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10571.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-10571", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-14T11:15:04.630", + "lastModified": "2024-11-14T11:15:04.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Chartify \u2013 WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Chartify \u2013 WordPress Chart Plugin para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 2.9.5 incluida a trav\u00e9s del par\u00e1metro 'source'. Esto permite que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/chart-builder/tags/2.9.6/admin/partials/charts/actions/chart-builder-charts-actions-options.php?rev=3184238", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4837258-c749-4194-926c-22b67e20c1fc?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3447.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3447.json new file mode 100644 index 00000000000..c2a1eaddcf7 --- /dev/null +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3447.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-3447", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2024-11-14T12:15:17.743", + "lastModified": "2024-11-14T12:15:17.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-3447", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274123", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45099.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45099.json new file mode 100644 index 00000000000..658f6ccb1f6 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45099.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45099", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-11-14T12:15:17.980", + "lastModified": "2024-11-14T12:15:17.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Security ReaQta 3.12 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7172212", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45642.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45642.json new file mode 100644 index 00000000000..bbf29eab35f --- /dev/null +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45642.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45642", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-11-14T12:15:18.323", + "lastModified": "2024-11-14T12:15:18.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Security ReaQta 3.12 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-942" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7172212", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45670.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45670.json new file mode 100644 index 00000000000..3a6346bfcd9 --- /dev/null +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45670", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-11-14T12:15:18.570", + "lastModified": "2024-11-14T12:15:18.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7172206", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7730.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7730.json new file mode 100644 index 00000000000..e498290a389 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7730.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7730", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2024-11-14T12:15:18.857", + "lastModified": "2024-11-14T12:15:18.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-7730", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304289", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8180.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8180.json new file mode 100644 index 00000000000..47d219f3abc --- /dev/null +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8180.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-8180", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-11-14T11:15:04.933", + "lastModified": "2024-11-14T11:15:04.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab CE/EE affecting all versions from 17.3 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. Improper output encoding could lead to XSS if CSP is not enabled." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones desde la 17.3 hasta la 17.3.7, desde la 17.4 hasta la 17.4.4 y desde la 17.5 hasta la 17.5.2. Una codificaci\u00f3n de salida incorrecta podr\u00eda provocar un error XSS si no se habilita CSP." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/#html-injection-in-vulnerability-code-flow-could-lead-to-xss-on-self-hosted-instances", + "source": "cve@gitlab.com" + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/480720", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2654010", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9472.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9472.json index 74675cb7335..6a4a28ad2c9 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9472.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9472.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.\n\n\nPalo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.\n\n\nThis issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:\n\n * 10.2.7-h12\n * 10.2.8-h10\n * 10.2.9-h9\n * 10.2.9-h11\n * 10.2.10-h2\n * 10.2.10-h3\n * 10.2.11\n * 10.2.11-h1\n * 10.2.11-h2\n * 10.2.11-h3\n * 11.1.2-h9\n * 11.1.2-h12\n * 11.1.3-h2\n * 11.1.3-h4\n * 11.1.3-h6\n * 11.2.2\n * 11.2.2-h1" + }, + { + "lang": "es", + "value": "Una desreferencia de puntero nulo en el software PAN-OS de Palo Alto Networks en las plataformas de hardware de las series PA-800, PA-3200, PA-5200 y PA-7000 cuando la pol\u00edtica de descifrado est\u00e1 habilitada permite que un atacante no autenticado bloquee PAN-OS mediante el env\u00edo de tr\u00e1fico espec\u00edfico a trav\u00e9s del plano de datos, lo que genera una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Los intentos repetidos de activar esta condici\u00f3n har\u00e1n que PAN-OS entre en modo de mantenimiento. Las series VM, Cloud NGFW y Prisma Access de Palo Alto Networks no se ven afectados. Este problema solo afecta a las series PA-800, PA-3200, PA-5200 y PA-7000 que ejecutan estas versiones espec\u00edficas de PAN-OS: * 10.2.7-h12 * 10.2.8-h10 * 10.2.9-h9 * 10.2.9-h11 * 10.2.10-h2 * 10.2.10-h3 * 10.2.11 * 10.2.11-h1 * 10.2.11-h2 * 10.2.11-h3 * 11.1.2-h9 * 11.1.2-h12 * 11.1.3-h2 * 11.1.3-h4 * 11.1.3-h6 * 11.2.2 * 11.2.2-h1" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9693.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9693.json new file mode 100644 index 00000000000..dff36efaf61 --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9693.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9693", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-11-14T11:15:05.210", + "lastModified": "2024-11-14T11:15:05.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.0 prior to 17.3.7, starting from 17.4 prior to 17.4.4, and starting from 17.5 prior to 17.5.2, which could have allowed unauthorized access to the Kubernetes agent in a cluster under specific configurations." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afectaba a todas las versiones desde la 16.0 anterior a la 17.3.7, desde la 17.4 anterior a la 17.4.4 y desde la 17.5 anterior a la 17.5.2, lo que podr\u00eda haber permitido el acceso no autorizado al agente de Kubernetes en un cl\u00faster con configuraciones espec\u00edficas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/497449", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 68cd02f94e3..7ad6dd73403 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-14T11:00:56.559636+00:00 +2024-11-14T13:01:00.990980+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-14T10:15:09.423000+00:00 +2024-11-14T12:15:18.857000+00:00 ``` ### Last Data Feed Release @@ -33,36 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269664 +269680 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `16` -- [CVE-2024-2550](CVE-2024/CVE-2024-25xx/CVE-2024-2550.json) (`2024-11-14T10:15:04.137`) -- [CVE-2024-2551](CVE-2024/CVE-2024-25xx/CVE-2024-2551.json) (`2024-11-14T10:15:04.547`) -- [CVE-2024-2552](CVE-2024/CVE-2024-25xx/CVE-2024-2552.json) (`2024-11-14T10:15:04.957`) -- [CVE-2024-38479](CVE-2024/CVE-2024-384xx/CVE-2024-38479.json) (`2024-11-14T10:15:05.347`) -- [CVE-2024-45253](CVE-2024/CVE-2024-452xx/CVE-2024-45253.json) (`2024-11-14T10:15:05.633`) -- [CVE-2024-45254](CVE-2024/CVE-2024-452xx/CVE-2024-45254.json) (`2024-11-14T10:15:06.207`) -- [CVE-2024-47914](CVE-2024/CVE-2024-479xx/CVE-2024-47914.json) (`2024-11-14T10:15:06.677`) -- [CVE-2024-47915](CVE-2024/CVE-2024-479xx/CVE-2024-47915.json) (`2024-11-14T10:15:07.067`) -- [CVE-2024-47916](CVE-2024/CVE-2024-479xx/CVE-2024-47916.json) (`2024-11-14T10:15:07.540`) -- [CVE-2024-50305](CVE-2024/CVE-2024-503xx/CVE-2024-50305.json) (`2024-11-14T10:15:08.013`) -- [CVE-2024-50306](CVE-2024/CVE-2024-503xx/CVE-2024-50306.json) (`2024-11-14T10:15:08.230`) -- [CVE-2024-5917](CVE-2024/CVE-2024-59xx/CVE-2024-5917.json) (`2024-11-14T10:15:08.607`) -- [CVE-2024-5918](CVE-2024/CVE-2024-59xx/CVE-2024-5918.json) (`2024-11-14T10:15:08.813`) -- [CVE-2024-5919](CVE-2024/CVE-2024-59xx/CVE-2024-5919.json) (`2024-11-14T10:15:09.027`) -- [CVE-2024-5920](CVE-2024/CVE-2024-59xx/CVE-2024-5920.json) (`2024-11-14T10:15:09.223`) -- [CVE-2024-7787](CVE-2024/CVE-2024-77xx/CVE-2024-7787.json) (`2024-11-14T09:15:28.200`) -- [CVE-2024-9472](CVE-2024/CVE-2024-94xx/CVE-2024-9472.json) (`2024-11-14T10:15:09.423`) +- [CVE-2022-31666](CVE-2022/CVE-2022-316xx/CVE-2022-31666.json) (`2024-11-14T12:15:16.083`) +- [CVE-2022-31667](CVE-2022/CVE-2022-316xx/CVE-2022-31667.json) (`2024-11-14T12:15:16.390`) +- [CVE-2022-31668](CVE-2022/CVE-2022-316xx/CVE-2022-31668.json) (`2024-11-14T12:15:16.607`) +- [CVE-2022-31669](CVE-2022/CVE-2022-316xx/CVE-2022-31669.json) (`2024-11-14T12:15:16.817`) +- [CVE-2022-31670](CVE-2022/CVE-2022-316xx/CVE-2022-31670.json) (`2024-11-14T12:15:17.040`) +- [CVE-2022-31671](CVE-2022/CVE-2022-316xx/CVE-2022-31671.json) (`2024-11-14T12:15:17.250`) +- [CVE-2023-4134](CVE-2023/CVE-2023-41xx/CVE-2023-4134.json) (`2024-11-14T11:15:03.730`) +- [CVE-2023-4458](CVE-2023/CVE-2023-44xx/CVE-2023-4458.json) (`2024-11-14T12:15:17.487`) +- [CVE-2024-10571](CVE-2024/CVE-2024-105xx/CVE-2024-10571.json) (`2024-11-14T11:15:04.630`) +- [CVE-2024-3447](CVE-2024/CVE-2024-34xx/CVE-2024-3447.json) (`2024-11-14T12:15:17.743`) +- [CVE-2024-45099](CVE-2024/CVE-2024-450xx/CVE-2024-45099.json) (`2024-11-14T12:15:17.980`) +- [CVE-2024-45642](CVE-2024/CVE-2024-456xx/CVE-2024-45642.json) (`2024-11-14T12:15:18.323`) +- [CVE-2024-45670](CVE-2024/CVE-2024-456xx/CVE-2024-45670.json) (`2024-11-14T12:15:18.570`) +- [CVE-2024-7730](CVE-2024/CVE-2024-77xx/CVE-2024-7730.json) (`2024-11-14T12:15:18.857`) +- [CVE-2024-8180](CVE-2024/CVE-2024-81xx/CVE-2024-8180.json) (`2024-11-14T11:15:04.933`) +- [CVE-2024-9693](CVE-2024/CVE-2024-96xx/CVE-2024-9693.json) (`2024-11-14T11:15:05.210`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2024-9472](CVE-2024/CVE-2024-94xx/CVE-2024-9472.json) (`2024-11-14T10:15:09.423`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5773a26179b..922415672cb 100644 --- a/_state.csv +++ b/_state.csv @@ -199591,7 +199591,13 @@ CVE-2022-31662,0,0,4716baf2173369b6ff3e13b07755ad4e0e453df4c6dc19303fe237ad32cf3 CVE-2022-31663,0,0,c250a0e102f60432d255e827fdd6db289d62d1a4e1292229b591504e22573b3c,2022-08-11T16:13:03.250000 CVE-2022-31664,0,0,8ae94e3e4b372e5f45259d81541342947ae361ebba4e6da89206986ea919de52,2023-08-08T14:22:24.967000 CVE-2022-31665,0,0,7a06345a1942d5d52d9b06c0ee41416d4ed2364fdc0d69c8a0c3f480ee888cbb,2022-08-11T16:14:08.620000 +CVE-2022-31666,1,1,93d1afa53e2b5e8dd574073ccb898437a22ca265be8333512b7d05e6509f49bb,2024-11-14T12:15:16.083000 +CVE-2022-31667,1,1,935dfca0b6ac3114c6c92c29854500f621ad40965dccc9fe68e985807237ba29,2024-11-14T12:15:16.390000 +CVE-2022-31668,1,1,1a34cb3f8dee7d08cd0bf80d68a64e47937ab73a6d606a5fc18ccbd84cb45663,2024-11-14T12:15:16.607000 +CVE-2022-31669,1,1,aae168e446b1b7b360056538dfe78a6cfcb29a95f62c1b7b749be0fd99d72e4d,2024-11-14T12:15:16.817000 CVE-2022-3167,0,0,47921e8a9cb97995d6f2ce8276ccf118a65fe4731d6ac6de65dd0ec114eec596,2022-09-14T15:32:08.950000 +CVE-2022-31670,1,1,abeb6dc4aedfef2c517ff862d14065c92b5c07b435e7bbbe658b14725b3e6d9b,2024-11-14T12:15:17.040000 +CVE-2022-31671,1,1,a228ea7ef75cbf94677ef050b31280cda6c7f9c0fe5f23cfbf5744b72bfa57cf,2024-11-14T12:15:17.250000 CVE-2022-31672,0,0,f935cb14a924ae93702f89793daf0806536a0ce42ff8289dde093642be80a068,2023-08-08T14:22:24.967000 CVE-2022-31673,0,0,da7dcaa4140053d84527543292fb585bb296fa966885cdf6f4d876302e1f87da,2023-08-08T14:21:49.707000 CVE-2022-31674,0,0,332df8a6563c46e3b27acddce953af7226cedea008975ba4b629bdb187c43e75,2022-08-15T18:56:24.003000 @@ -231577,6 +231583,7 @@ CVE-2023-41336,0,0,b635acad925f51897708f1c284f31b52e812f930d0f8a69e729a597a376bd CVE-2023-41337,0,0,15e5e52f40f65a0229a0cdd3d18e84b3f05954948f9735ee45da4880e8cdce6b,2023-12-19T19:10:12.043000 CVE-2023-41338,0,0,4ff13041d1d920a3e7cf920d32fc2747c67006ee742953739c10eeb93bb4c4dc,2023-09-12T19:12:29.057000 CVE-2023-41339,0,0,d5e9f04e6c95a3d0eb6da07191e971e3e5f23fc0a4622beb8f9610cba2e4c6d5,2023-10-31T19:53:57.670000 +CVE-2023-4134,1,1,ce3f34903bbe3a1b32f01cc07034b778a77263d9eb3b998ba638b6d0499828bf,2024-11-14T11:15:03.730000 CVE-2023-41343,0,0,d014d94f0c954572fa228d52527071fd46ed723d95e2596289d617e9451c129a,2023-11-09T21:59:36.353000 CVE-2023-41344,0,0,fd945b61a59b0f15cf1f2c1695c5c3de41b28d458dedce455cfee4907f8e8504,2023-11-13T19:54:38.750000 CVE-2023-41345,0,0,ee8a523a2662b0bb570a5de5622ce7c196dfd6d4b60b13c44584d06fa25b5a77,2023-11-13T16:59:55.303000 @@ -233829,6 +233836,7 @@ CVE-2023-4454,0,0,fb429f754193553b6975a0d32c55113a293441b320ca968748467aa80d3d24 CVE-2023-4455,0,0,20e2a71b7fd8a18a1114b92d93267c5ab15590b2a47c5b1f075ea92a982f3a49,2023-08-24T21:11:31.950000 CVE-2023-4456,0,0,369c0fad995b8264d64349ce435b2c1dc3089365795bdcd3741dfadaea65acc6,2023-11-07T04:22:38.447000 CVE-2023-4457,0,0,ee0b8eadfc3272ee478862dc9e8584d1b618758034c6a68efc19123317a2c60b,2023-10-20T15:17:32.870000 +CVE-2023-4458,1,1,5c42a68b97724184291e899bb0d3a84117fb9f7533fba14f383a6e0777f4c2d6,2024-11-14T12:15:17.487000 CVE-2023-4459,0,0,ded88117b55c4284762f2f8393f20b576cf09dfb8895bd1c0d3f42fcb1ae428a,2024-04-25T14:15:09.507000 CVE-2023-4460,0,0,5fb802ae85625b42d8217a009e041c135e908761081f43a6b546052a002e9402,2024-10-01T16:35:12.403000 CVE-2023-4462,0,0,6ee35d095410fea9ab00663779e595263154c8235788b3e851e641d73c81658c,2024-05-17T02:31:35.497000 @@ -242779,6 +242787,7 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000 CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 +CVE-2024-10571,1,1,c0573ee024b89e8cb2673955332f8d3c3706906f08577458df0aac62f4e60965,2024-11-14T11:15:04.630000 CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000 CVE-2024-10575,0,0,d60bf0a0bfff7c064a609e35a84fef721491108a3e1293beb652d4120d21f4e8,2024-11-13T17:01:16.850000 CVE-2024-10577,0,0,a22bb88e9d80100e8493f63e77c4cd5ab2a37147944c69ab526442c593c29d99,2024-11-13T17:01:16.850000 @@ -247964,7 +247973,7 @@ CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e CVE-2024-25469,0,0,557b8a68044694189954e70cb5b5e2ebf1ecf04b2586629d7bb1e69d0af34ee0,2024-08-27T19:35:14.107000 CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000 CVE-2024-2548,0,0,40cde8752e3c8848aae41da66672115ef0cd24cbd123858c9556b9dd3342115f,2024-10-17T15:52:32.283000 -CVE-2024-2550,1,1,5e86919977fb53ff2eff4e17809552931e33dd8e013f78df883f54e1d97b0b78,2024-11-14T10:15:04.137000 +CVE-2024-2550,0,0,5e86919977fb53ff2eff4e17809552931e33dd8e013f78df883f54e1d97b0b78,2024-11-14T10:15:04.137000 CVE-2024-25501,0,0,53c57009bf13ac9e81165c240313efc6336b1030bc10f61986ac8903ee95ed6c,2024-08-27T20:35:14.160000 CVE-2024-25502,0,0,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000 CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000 @@ -247972,7 +247981,7 @@ CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 CVE-2024-25508,0,0,90339bb48fc1cfbfbe04d77c441539b4eb12357264469da7dce73e670017a9bc,2024-08-01T20:35:25.160000 CVE-2024-25509,0,0,43932d598b677151ec148e2c6fe397dad54fbcf37bcb8324dfd2608c97fcef93,2024-07-03T01:48:52.240000 -CVE-2024-2551,1,1,1d814e7cd17a2a7cb6f0b91456c56fa6cef3d08af17516e4c4b24379d0b802a9,2024-11-14T10:15:04.547000 +CVE-2024-2551,0,0,1d814e7cd17a2a7cb6f0b91456c56fa6cef3d08af17516e4c4b24379d0b802a9,2024-11-14T10:15:04.547000 CVE-2024-25510,0,0,861a29eb687c50c63d985cbe3b942fd6dcb2a5ed2f01fa956e441eba24a1e618,2024-07-03T01:48:53.193000 CVE-2024-25511,0,0,45841a27c05abdda5e88c8662dccb1b2ce0612679a4549ee5889dfadc7c35b1c,2024-07-03T01:48:53.997000 CVE-2024-25512,0,0,30e70416daf9bc731aa2cc10d3309e50db92ad7a3860e9d31d00559db96a5244,2024-07-03T01:48:54.810000 @@ -247982,7 +247991,7 @@ CVE-2024-25515,0,0,9552fe583425297ae50d0d3fb3aef41d1ff7ccab24982b4401e1de2eb3120 CVE-2024-25517,0,0,2d5bfca64a87833b4bf7fcaafb0e1c6c75a7c73d9c79ee7ef678b3593647ad5d,2024-07-03T01:48:58.093000 CVE-2024-25518,0,0,4f656721efc43904c6c1b7982efa8acf36cdc63eca4dc6a739fe56633964cd05,2024-07-03T01:48:58.917000 CVE-2024-25519,0,0,1e9856bf69a42caa8c87d9efc940250a43a6d8133746dd534ead5365966d2794,2024-07-03T01:48:59.717000 -CVE-2024-2552,1,1,8db340bdef42e1446619888f064f8ea116f96e25972de2c22775973aeb619fc3,2024-11-14T10:15:04.957000 +CVE-2024-2552,0,0,8db340bdef42e1446619888f064f8ea116f96e25972de2c22775973aeb619fc3,2024-11-14T10:15:04.957000 CVE-2024-25520,0,0,ef18d590b5f58eb9bb7ec3b39fa017b59c50accc89216dbff8503dbc68a15ded,2024-07-03T01:49:00.550000 CVE-2024-25521,0,0,92b6345ac0bc5186de3acc2eb108650c8fdf5ebf11f9b3b43771a2e77e69def2,2024-07-03T01:49:01.367000 CVE-2024-25522,0,0,20bcbb11d104068e82316fe242ad3d32a079fcd34efa7624e69f8b13b3bb1c9c,2024-07-03T01:49:02.173000 @@ -254723,6 +254732,7 @@ CVE-2024-34466,0,0,dd736f9a85d19253650a199739cba2301673ec6ec2adc5e7de09970e86411 CVE-2024-34467,0,0,903bd38a14a72c5e31ca95b7f024225144ec2f1cfed11b0213915da81da29f0c,2024-08-16T19:35:11.493000 CVE-2024-34468,0,0,b164ab2b609bf8b9d79a88576e6595ba967431973eb7a086f2ba71149d9690e8,2024-05-06T12:44:56.377000 CVE-2024-34469,0,0,c68e04abdf928312d44ac341a209cf5378ddee40d6b8b27a9211f964972de340,2024-08-01T13:52:22.830000 +CVE-2024-3447,1,1,ac8d540e8e074eb9e1d447a69aba75608690bbc7caea682160f4ae74862ba7cf,2024-11-14T12:15:17.743000 CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16af48,2024-07-03T02:00:10.887000 CVE-2024-34471,0,0,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000 CVE-2024-34472,0,0,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000 @@ -257738,7 +257748,7 @@ CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f203504 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 -CVE-2024-38479,1,1,ae8d4fe4cee56e3fa0df61bc7ba838dbd35927401f04ef96a32b3fc49065681c,2024-11-14T10:15:05.347000 +CVE-2024-38479,0,0,ae8d4fe4cee56e3fa0df61bc7ba838dbd35927401f04ef96a32b3fc49065681c,2024-11-14T10:15:05.347000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 @@ -262123,6 +262133,7 @@ CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c5455 CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000 CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000 CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000 +CVE-2024-45099,1,1,e1f7554d7008461bbb4f440ce7777acd35ccd117526f34ce5d56e7eb080ede19,2024-11-14T12:15:17.980000 CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000 CVE-2024-45101,0,0,cad1255565408251227b424af7803fa7b621bb0a87132fd60fe56f4ddc9639ef,2024-09-14T11:47:14.677000 CVE-2024-45103,0,0,01e8c7d7777680c3c907a9b9346c8d516e1c4df3a86a3dfed3c0a030a8c65f44,2024-09-19T01:50:12.427000 @@ -262251,8 +262262,8 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d CVE-2024-45250,0,0,e9b56e111bbc8f345e771d0d97f6c666ffbfb94747161b5a547dc2214faeb00b,2024-10-07T17:47:48.410000 CVE-2024-45251,0,0,4723402deaff257a03485bee19d0c63cf2e4218538079529007db41f2e86ba8e,2024-10-07T17:47:48.410000 CVE-2024-45252,0,0,d5507db1b0bfef3e2d4dc8033cbb1d8a5c92c659f9cc4356d3a7d9eed6325773,2024-10-07T17:47:48.410000 -CVE-2024-45253,1,1,9c844f8b6482daf2c9e9c619f77138672c77c72437fed22b52ea10fbc4c2f52c,2024-11-14T10:15:05.633000 -CVE-2024-45254,1,1,d077d3a82c20cb66140b9ebe698ba5da6c884bf474a50526bde47dfe1280eaff,2024-11-14T10:15:06.207000 +CVE-2024-45253,0,0,9c844f8b6482daf2c9e9c619f77138672c77c72437fed22b52ea10fbc4c2f52c,2024-11-14T10:15:05.633000 +CVE-2024-45254,0,0,d077d3a82c20cb66140b9ebe698ba5da6c884bf474a50526bde47dfe1280eaff,2024-11-14T10:15:06.207000 CVE-2024-45256,0,0,1ad6eb17928348883dd9cb354722f92894049d9e7bbed38aa0c5260ca73ab2c4,2024-08-26T13:35:02.937000 CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000 CVE-2024-45259,0,0,5969bc7c5f33ec37926b142b968946029edbf5a989ec1eaf52aded1cc1f71bb1,2024-10-28T20:35:13.597000 @@ -262487,10 +262498,12 @@ CVE-2024-45624,0,0,7a0e35c55ac45641bb752e88253516bf9e2f94ec9e17765278ecb76cea70f CVE-2024-45625,0,0,3e5f2d639aef0e82608d7bd80d0e32d86a25b4046e30921cb8739a9c3be44b6a,2024-09-10T11:19:40.113000 CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000 CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000 +CVE-2024-45642,1,1,a563b90e1d94665aa870097dba4a01ca73a67305095ae38b5397dd7a59c4707b,2024-11-14T12:15:18.323000 CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000 CVE-2024-45656,0,0,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8cf5,2024-10-29T14:34:04.427000 CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000 +CVE-2024-45670,1,1,851960da2818a1988b138d527b50d6f0503f315beb4f5bb4d2af5048acfa6e20,2024-11-14T12:15:18.570000 CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000 CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000 CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000 @@ -263885,9 +263898,9 @@ CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae10 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b38510fd,2024-10-23T15:12:34.673000 CVE-2024-47913,0,0,7cee4e2f0a703b60f4905ba90942e3ad4333a4649dfd698a2259843e49767bfc,2024-10-07T17:48:28.117000 -CVE-2024-47914,1,1,5c1a1c65fd01e6bd94989accfa4c1506f1cf9f8b5a1a5bd5806c7686a7627eb7,2024-11-14T10:15:06.677000 -CVE-2024-47915,1,1,60eddd3046b360d3289fe3509ac1bfe6bb4b437174540ba79ec51a82b1079af5,2024-11-14T10:15:07.067000 -CVE-2024-47916,1,1,2b9b1008ac9b5bf6818ff9dfb5cda417cc71c0062d59e5e2b8d800f5df2ee80b,2024-11-14T10:15:07.540000 +CVE-2024-47914,0,0,5c1a1c65fd01e6bd94989accfa4c1506f1cf9f8b5a1a5bd5806c7686a7627eb7,2024-11-14T10:15:06.677000 +CVE-2024-47915,0,0,60eddd3046b360d3289fe3509ac1bfe6bb4b437174540ba79ec51a82b1079af5,2024-11-14T10:15:07.067000 +CVE-2024-47916,0,0,2b9b1008ac9b5bf6818ff9dfb5cda417cc71c0062d59e5e2b8d800f5df2ee80b,2024-11-14T10:15:07.540000 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 CVE-2024-47939,0,0,fb0122088811efc1ccf3ce2b970c428eb00ae94db66e7aa25ff544122afe9a3d,2024-11-01T12:57:03.417000 @@ -265165,8 +265178,8 @@ CVE-2024-50261,0,0,b4e106f44d4a2eb815d0dd8f540fce25308f032b907e878b88914bfdb4dcb CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000 CVE-2024-50263,0,0,2e071cb68f4a0777e46edaa767663e26ff7c76ecb6dc8a74b30d3bdec9f4ef8b,2024-11-12T13:55:21.227000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 -CVE-2024-50305,1,1,32cba8395bb8f36501f7e711a4f56600fb80cd2e3ef145d3ce8fad1597b52437,2024-11-14T10:15:08.013000 -CVE-2024-50306,1,1,727b7f8b36ac152cbb0b1c517b3517041fae26c484de46eade41a6fc95da4194,2024-11-14T10:15:08.230000 +CVE-2024-50305,0,0,32cba8395bb8f36501f7e711a4f56600fb80cd2e3ef145d3ce8fad1597b52437,2024-11-14T10:15:08.013000 +CVE-2024-50306,0,0,727b7f8b36ac152cbb0b1c517b3517041fae26c484de46eade41a6fc95da4194,2024-11-14T10:15:08.230000 CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000 @@ -266578,10 +266591,10 @@ CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b CVE-2024-5914,0,0,5ab56ff6e03c38766463339097d3da51e1161518db555649197f85ab7972331e,2024-08-20T16:22:06.357000 CVE-2024-5915,0,0,02c85b3460ff280d15df03319450806b3e5d30c71b9189b0ecc887e95a66b96e,2024-08-20T16:23:10.493000 CVE-2024-5916,0,0,5c958efb87a06f0a35735b489fd355d0842ab659e7fda78c1c111ac292a5fa45,2024-08-20T19:30:11.980000 -CVE-2024-5917,1,1,8312a0373c8ae07af5f5ff1c9de2dc34bf27ce28cb7dc87b5ceb7bc0541ae223,2024-11-14T10:15:08.607000 -CVE-2024-5918,1,1,601111e345cc602a705aa6e6333f879bc4848188533dab44825b2b0c4edbdab0,2024-11-14T10:15:08.813000 -CVE-2024-5919,1,1,ef37f8c39509464f0f0ee3958c2bb090e15db003bf1922feacaacba6b6b1823e,2024-11-14T10:15:09.027000 -CVE-2024-5920,1,1,d8577d51641e20a781d4d81162248086899f1355b1a3025dae0803d61f107939,2024-11-14T10:15:09.223000 +CVE-2024-5917,0,0,8312a0373c8ae07af5f5ff1c9de2dc34bf27ce28cb7dc87b5ceb7bc0541ae223,2024-11-14T10:15:08.607000 +CVE-2024-5918,0,0,601111e345cc602a705aa6e6333f879bc4848188533dab44825b2b0c4edbdab0,2024-11-14T10:15:08.813000 +CVE-2024-5919,0,0,ef37f8c39509464f0f0ee3958c2bb090e15db003bf1922feacaacba6b6b1823e,2024-11-14T10:15:09.027000 +CVE-2024-5920,0,0,d8577d51641e20a781d4d81162248086899f1355b1a3025dae0803d61f107939,2024-11-14T10:15:09.223000 CVE-2024-5922,0,0,50960a94a5a484ee279a2b7dcacb2f2a0eb6eb2607889fe30657dd07f5206782,2024-06-28T10:27:00.920000 CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802bd,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 @@ -268106,6 +268119,7 @@ CVE-2024-7725,0,0,0aa115eb5d51c7a8f3b04c61085136493dcca84fb2460c54ba86db4138dcdd CVE-2024-7727,0,0,210da2d03590f7837e73d2a797749f40cf37c3d8121af3fa52cb49298f27dd84,2024-09-18T18:07:55.450000 CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000 +CVE-2024-7730,1,1,a634741f495e3ec408272e754c9efb333594cc9ebc6a1fdfa7605f286255efbe,2024-11-14T12:15:18.857000 CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000 CVE-2024-7732,0,0,301f49d15dd3186d40aa3031630ea252f10589d241790753d1277daa7600dd48,2024-10-03T18:39:20.227000 CVE-2024-7733,0,0,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000 @@ -268147,7 +268161,7 @@ CVE-2024-7783,0,0,39c8808c8c931a81ab6f36457422df672bce6f594a7e28cbb717d3fa5f5b7d CVE-2024-7784,0,0,7e942e70a98522ec84a0bbfc9f820ed1b39966f32999b97410584854b83e96dc,2024-11-08T09:15:08.083000 CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000 CVE-2024-7786,0,0,fc116ee7a384561ad006648b89134c44e9184040e8b317407aecf4e96010cf80,2024-10-07T17:46:08.943000 -CVE-2024-7787,1,1,79ae0a178ab0d95375d06015f2f8124773b17fc844e5199caeeee900f5e4fd10,2024-11-14T09:15:28.200000 +CVE-2024-7787,0,0,79ae0a178ab0d95375d06015f2f8124773b17fc844e5199caeeee900f5e4fd10,2024-11-14T09:15:28.200000 CVE-2024-7788,0,0,70ac00bf2f1b71d3cd198f79846cc3aedcbc03d7b166d0d3297938d6d80c8e0c,2024-09-25T19:56:45.847000 CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000 CVE-2024-7791,0,0,7416656b44e86a668ddf90bfa89c01f36bde25a07c507963ab58656b2d115a3d,2024-08-27T13:01:37.913000 @@ -268458,6 +268472,7 @@ CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd8 CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e5b,2024-09-26T13:32:02.803000 CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000 +CVE-2024-8180,1,1,3f527220eaed68bc730314de70b8de4960a606f59b9267ff7aee238c3ece9a2a,2024-11-14T11:15:04.933000 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8184,0,0,92c1db6b8911f83c9668ff411c9a02657286363b11f9f1292cd97f0715f9d11d,2024-11-08T21:00:09.857000 @@ -269353,7 +269368,7 @@ CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e924 CVE-2024-9469,0,0,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000 CVE-2024-9470,0,0,13c3a583553fbf2e90723a5a0ed6f2354808c5a1753993b658aba04d0ed9b282,2024-10-10T12:51:56.987000 CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000 -CVE-2024-9472,1,1,5a5c8ff54e790973f95e3d96fd46657726d5bdf29433beef2a8f42fc4d72a67e,2024-11-14T10:15:09.423000 +CVE-2024-9472,0,1,dc9ffbb1de0e29c95cab92cb460779413a192268196ad2222d33e0638a30bd5d,2024-11-14T10:15:09.423000 CVE-2024-9473,0,0,2610a860a1ec132e11b499793a273ee08374ba46887944874ff47b7b5fdd4588,2024-10-17T06:15:04.983000 CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000 CVE-2024-9476,0,0,c74fb00e254178958964ec01cef72d6ba991350b2ce7f9bcc28af446dec9cb13,2024-11-13T17:15:12.747000 @@ -269486,6 +269501,7 @@ CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a06 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 CVE-2024-9689,0,0,8f8c579186810d2b61eae71f3a64a7543fcf1895acd4679afad8157c388bec86,2024-11-07T20:35:16.807000 CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000 +CVE-2024-9693,1,1,c6ea5ba17df453e037e2d4723b967aff1042a36b3e7f6b3b7751a1a0eb47d0a9,2024-11-14T11:15:05.210000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000 CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000