Auto-Update: 2024-10-01T22:00:18.000134+00:00

This commit is contained in:
cad-safe-bot 2024-10-01 22:03:17 +00:00
parent b793a47fa9
commit 39c8f608c0
35 changed files with 1693 additions and 154 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38460",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-09-04T02:15:09.713",
"lastModified": "2023-09-08T00:02:44.077",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-01T20:35:04.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39136",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-30T22:15:08.977",
"lastModified": "2023-09-06T12:41:25.233",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-01T21:35:02.317",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-703"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39137",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-30T22:15:09.030",
"lastModified": "2023-09-05T19:04:53.400",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-01T21:35:03.077",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40272",
"sourceIdentifier": "security@apache.org",
"published": "2023-08-17T14:15:10.083",
"lastModified": "2023-08-24T17:00:07.203",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-01T20:35:06.170",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4357",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:12.247",
"lastModified": "2024-01-31T17:15:14.977",
"lastModified": "2024-10-01T20:35:08.987",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51958",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-10T15:15:09.290",
"lastModified": "2024-01-13T01:36:59.057",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-01T21:35:05.460",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23058",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T16:15:55.997",
"lastModified": "2024-01-18T15:16:50.140",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-01T21:35:06.453",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37533",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-24T18:15:04.690",
"lastModified": "2024-07-25T12:36:39.947",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-01T20:35:02.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294727",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7159173",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-39560",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-07-10T23:15:13.140",
"lastModified": "2024-07-11T17:15:16.867",
"lastModified": "2024-10-01T20:15:05.170",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).\n\nThe kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.\n\nSystem kernel memory can be monitored through the use of the 'show system statistics kernel memory' command as shown below:\n\nuser@router> show system statistics kernel memory\nMemory \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Size (kB) Percentage When\n\u00a0 Active \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 753092 \u00a0 \u00a0 18.4% Now\n\u00a0 Inactive \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 574300 \u00a0 \u00a0 14.0% Now\n\u00a0 Wired\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 443236 \u00a0 \u00a0 10.8% Now\n\u00a0 Cached\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1911204 \u00a0 \u00a0 46.6% Now\n\u00a0 Buf \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 32768\u00a0 \u00a0 \u00a0 0.8% Now\n\u00a0 Free \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 385072\u00a0 \u00a0 \u00a0 9.4% Now\nKernel Memory\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Now\n\u00a0 Data \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 312908\u00a0 \u00a0 \u00a0 7.6% Now\n\u00a0 Text \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2560\u00a0 \u00a0 \u00a0 0.1% Now\n...\n\nThis issue affects:\nJunos OS:\n\n\n * All versions before 20.4R3-S9,\n * All versions of 21.2,\n * from 21.4 before 21.4R3-S5,\n * from 22.1 before 22.1R3-S5,\n * from 22.2 before 22.2R3-S3,\n * from 22.3 before 22.3R3-S2,\n * from 22.4 before 22.4R3,\n * from 23.2 before 23.2R2;\n\n\nJunos OS Evolved:\n\n\n * All versions before 21.4R3-S5-EVO,\n * from 22.1-EVO before 22.1R3-S5-EVO, \n * from 22.2-EVO before 22.2R3-S3-EVO, \n * from 22.3-EVO before 22.3R3-S2-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO."
"value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).\n\nThe kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.\n\nSystem kernel memory can be monitored through the use of the 'show system kernel memory' command as shown below:\n\nuser@router> show system kernel memory \u00a0 \nReal memory total/reserved: 4130268/ 133344 Kbytes\nkmem map free: 18014398509110220 Kbytes\n\nThis issue affects:\nJunos OS:\n\n\n * All versions before 20.4R3-S9,\n * All versions of 21.2,\n * from 21.4 before 21.4R3-S5,\n * from 22.1 before 22.1R3-S5,\n * from 22.2 before 22.2R3-S3,\n * from 22.3 before 22.3R3-S2,\n * from 22.4 before 22.4R3,\n * from 23.2 before 23.2R2;\n\n\nJunos OS Evolved:\n\n\n * All versions before 21.4R3-S5-EVO,\n * from 22.1-EVO before 22.1R3-S5-EVO, \n * from 22.2-EVO before 22.2R3-S3-EVO, \n * from 22.3-EVO before 22.3R3-S2-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO."
},
{
"lang": "es",
@ -22,7 +22,7 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
@ -51,7 +51,7 @@
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"recovery": "AUTOMATIC",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41672",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-24T18:15:05.527",
"lastModified": "2024-07-25T12:36:39.947",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-01T20:33:44.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:duckdb:duckdb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "83AE278C-3F41-40B0-8AE5-3F5D9DFE359A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/duckdb/duckdb/commit/c9b7c98aa0e1cd7363fe8bb8543a95f38e980d8a",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/duckdb/duckdb/pull/13133",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/duckdb/duckdb/security/advisories/GHSA-w2gf-jxc9-pf2q",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42514",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T19:15:07.883",
"lastModified": "2024-10-01T19:15:07.883",
"lastModified": "2024-10-01T20:35:10.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.1.0.4 could allow an unauthenticated attacker to conduct an unauthorized access attack due to inadequate access control checks. A successful exploit could allow an attacker to access sensitive information and send unauthorized messages."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45302",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-29T22:15:05.377",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-01T20:05:07.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:restsharp:restsharp:*:*:*:*:*:*:*:*",
"versionStartIncluding": "107.0.0",
"versionEndExcluding": "112.0.0",
"matchCriteriaId": "AE118595-3073-4346-A583-A7DAE32C060B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/restsharp/RestSharp/blob/777bf194ec2d14271e7807cc704e73ec18fcaf7e/src/RestSharp/Request/HttpRequestMessageExtensions.cs#L32",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/restsharp/RestSharp/commit/0fba5e727d241b1867bd71efc912594075c2934b",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/restsharp/RestSharp/security/advisories/GHSA-4rr6-2v9v-wcpc",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45537",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-17T19:15:28.157",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-01T20:41:33.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,44 @@
"value": "Apache Druid permite a los usuarios con ciertos permisos leer datos de otros sistemas de bases de datos mediante JDBC. Esta funcionalidad permite a los usuarios de confianza configurar b\u00fasquedas de Druid o ejecutar tareas de ingesta. Druid tambi\u00e9n permite a los administradores configurar una lista de propiedades permitidas que los usuarios pueden proporcionar para sus conexiones JDBC. De forma predeterminada, esta lista de propiedades permitidas restringe a los usuarios solo a las propiedades relacionadas con TLS. Sin embargo, al configurar una conexi\u00f3n JDBC de MySQL, los usuarios pueden usar una cadena de conexi\u00f3n JDBC especialmente manipulada para proporcionar propiedades que no est\u00e1n en esta lista de permitidos. Los usuarios sin permiso para configurar conexiones JDBC no pueden aprovechar esta vulnerabilidad. CVE-2021-26919 describe una vulnerabilidad similar que se solucion\u00f3 parcialmente en Apache Druid 0.20.2. Este problema se solucion\u00f3 en Apache Druid 30.0.1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -28,10 +61,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*",
"versionEndExcluding": "30.0.1",
"matchCriteriaId": "03D16162-089B-402F-BBC9-9BC52E415591"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/2ovx1t77y6tlkhk5b42clp4vwo4c8cjv",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45999",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T20:15:05.390",
"lastModified": "2024-10-01T20:15:05.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection vulnerability was discovered in Cloudlog 2.6.15, specifically within the get_station_info()function located in the file /application/models/Oqrs_model.php. The vulnerability is exploitable via the station_id parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://chiggerlor.substack.com/p/cve-2024-45999",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46079",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T19:15:08.373",
"lastModified": "2024-10-01T19:15:08.373",
"lastModified": "2024-10-01T20:35:15.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in proj_new.php via the Descricao parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46080",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T21:15:06.767",
"lastModified": "2024-10-01T21:15:06.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Scriptcase v9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_zip function."
}
],
"metrics": {},
"references": [
{
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46081",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T19:15:08.763",
"lastModified": "2024-10-01T19:15:08.763",
"lastModified": "2024-10-01T20:35:15.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS). An authenticated user can craft malicious payloads in the To-Do List. The assigned user will trigger a stored XSS, which is particularly dangerous because tasks are assigned to various users on the platform."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46082",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T21:15:06.857",
"lastModified": "2024-10-01T21:15:06.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Scriptcase v.9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in nm_cor.php via the form and field parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/",
"source": "cve@mitre.org"
},
{
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46083",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T19:15:09.013",
"lastModified": "2024-10-01T19:15:09.013",
"lastModified": "2024-10-01T20:35:16.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS). An authenticated user can craft malicious payloads using the messages feature, which allows the injection of malicious code into any user's account on the platform. It is important to note that regular users can trigger actions for administrator users."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46084",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T21:15:06.950",
"lastModified": "2024-10-01T21:15:06.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Scriptcase 9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_unzip function."
}
],
"metrics": {},
"references": [
{
"url": "http://scriptcase.com",
"source": "cve@mitre.org"
},
{
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47082",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-25T18:15:05.417",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-01T20:01:13.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:strawberryrocks:strawberry:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.243.0",
"matchCriteriaId": "69791F16-368E-421A-AF87-2B4DE9F15925"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/strawberry-graphql/strawberry/commit/37265b230e511480a9ceace492f9f6a484be1387",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/strawberry-graphql/strawberry/security/advisories/GHSA-79gp-q4wv-33fr",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://strawberry.rocks/docs/breaking-changes/0.243.0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47523",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-01T21:15:07.050",
"lastModified": "2024-10-01T21:15:07.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Alert Transports\" feature allows authenticated users to inject arbitrary JavaScript through the \"Details\" section (which contains multiple fields depending on which transport is selected at that moment). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/blob/4777247327c793ed0a3306d0464b95176008177b/includes/html/print-alert-transports.php#L40",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/commit/ee1afba003d33667981e098c83295f599d88439c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-7f84-28qh-9486",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-47524",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-01T21:15:07.297",
"lastModified": "2024-10-01T21:15:07.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can create a Device Groups, the application did not properly sanitize the user input in the Device Groups name, when user see the detail of the Device Group, if java script code is inside the name of the Device Groups, its will be trigger. This vulnerability is fixed in 24.9.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/commit/d3b51560a8e2343e520d16e9adc72c6951aa91ee",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-fc38-2254-48g7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47525",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-01T21:15:07.520",
"lastModified": "2024-10-01T21:15:07.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Alert Rules\" feature allows authenticated users to inject arbitrary JavaScript through the \"Title\" field. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/blob/9455173edce6971777cf6666d540eeeaf6201920/includes/html/print-alert-rules.php#L405",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/commit/7620d220e48563938d869da7689b8ac3f7721490",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-j2j9-7pr6-xqwv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-47526",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-01T21:15:07.740",
"lastModified": "2024-10-01T21:15:07.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Self Cross-Site Scripting (Self-XSS) vulnerability in the \"Alert Templates\" feature allows users to inject arbitrary JavaScript into the alert template's name. This script executes immediately upon submission but does not persist after a page refresh."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/blob/0e741e365aa974a74aee6b43d1b4b759158a5c7e/includes/html/forms/alert-templates.inc.php#L40",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/blob/0e741e365aa974a74aee6b43d1b4b759158a5c7e/includes/html/modal/alert_template.inc.php#L205",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/commit/f259edc19b9f0ccca484c60b1ba70a0bfff97ef5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-gcgp-q2jq-fw52",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-47527",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-01T21:15:07.967",
"lastModified": "2024-10-01T21:15:07.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Device Dependencies\" feature allows authenticated users to inject arbitrary JavaScript through the device name (\"hostname\" parameter). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/commit/36b38a50cc10d4ed16caab92bdc18ed6abac9685",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-rwwc-2v8q-gc9v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-47528",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-01T21:15:08.273",
"lastModified": "2024-10-01T21:15:08.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Stored Cross-Site Scripting (XSS) can be achieved by uploading a new Background for a Custom Map. Users with \"admin\" role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger on load. This led to Stored Cross-Site Scripting (XSS). The vulnerability is fixed in 24.9.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
},
{
"lang": "en",
"value": "CWE-434"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/commit/d959bf1b366319eda16e3cd6dfda8a22beb203be",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-x8gm-j36p-fppf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-47609",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-01T21:15:08.400",
"lastModified": "2024-10-01T21:15:08.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tonic is a native gRPC client & server implementation with async/await support. When using tonic::transport::Server there is a remote DoS attack that can cause the server to exit cleanly on accepting a TCP/TLS stream. This can be triggered by causing the accept call to error out with errors that were not covered correctly causing the accept loop to exit. Upgrading to tonic 0.12.3 and above contains the fix."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "GREEN",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://github.com/hyperium/tonic/commit/a4472a86f3290e60c7c01348b7e6a8164d6e7e48",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/hyperium/tonic/issues/1897",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/hyperium/tonic/security/advisories/GHSA-4jwc-w2hc-78qv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6936",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-21T04:15:02.007",
"lastModified": "2024-07-22T13:00:31.330",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-01T20:37:34.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:formtools:form_tools:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2FECB7-93EA-4F34-AD68-A96EED343AF6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE2-2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.271991",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271991",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.372318",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-27T20:15:09.650",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-01T20:28:02.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,22 +150,64 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:o3_firmware:1.0.0.10\\(2478\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E05BDCC-AA87-414D-A782-6DE9A79BF613"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:o3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB0A6A18-0499-43E9-ADC9-A229A5DF846A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/noahze01/IoT-vulnerable/blob/main/Tenda/O3v2.0/fromMacFilterSet.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272554",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272554",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.377040",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-9396",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-10-01T16:15:10.790",
"lastModified": "2024-10-01T16:15:10.790",
"lastModified": "2024-10-01T20:35:19.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "It is currently unknown if this issue is exploitable but a condition may arise where the structured clone of certain objects could lead to memory corruption. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912471",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9407",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-10-01T21:15:08.530",
"lastModified": "2024-10-01T21:15:08.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-9407",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315887",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,163 @@
{
"id": "CVE-2024-9411",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-01T20:15:05.630",
"lastModified": "2024-10-01T21:35:07.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in OFCMS 1.1.2. This affects the function add of the file /admin/system/dict/add.json?sqlid=system.dict.save. The manipulation of the argument dict_value leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitee.com/oufu/ofcms/issues/IATECW",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.278973",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.278973",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-01T20:00:17.206345+00:00
2024-10-01T22:00:18.000134+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-01T19:41:08.783000+00:00
2024-10-01T21:35:07.620000+00:00
```
### Last Data Feed Release
@ -33,51 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
264274
264287
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `13`
- [CVE-2024-31835](CVE-2024/CVE-2024-318xx/CVE-2024-31835.json) (`2024-10-01T19:15:07.493`)
- [CVE-2024-42514](CVE-2024/CVE-2024-425xx/CVE-2024-42514.json) (`2024-10-01T19:15:07.883`)
- [CVE-2024-46079](CVE-2024/CVE-2024-460xx/CVE-2024-46079.json) (`2024-10-01T19:15:08.373`)
- [CVE-2024-46081](CVE-2024/CVE-2024-460xx/CVE-2024-46081.json) (`2024-10-01T19:15:08.763`)
- [CVE-2024-46083](CVE-2024/CVE-2024-460xx/CVE-2024-46083.json) (`2024-10-01T19:15:09.013`)
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-10-01T19:15:09.500`)
- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-10-01T19:15:09.793`)
- [CVE-2024-45999](CVE-2024/CVE-2024-459xx/CVE-2024-45999.json) (`2024-10-01T20:15:05.390`)
- [CVE-2024-46080](CVE-2024/CVE-2024-460xx/CVE-2024-46080.json) (`2024-10-01T21:15:06.767`)
- [CVE-2024-46082](CVE-2024/CVE-2024-460xx/CVE-2024-46082.json) (`2024-10-01T21:15:06.857`)
- [CVE-2024-46084](CVE-2024/CVE-2024-460xx/CVE-2024-46084.json) (`2024-10-01T21:15:06.950`)
- [CVE-2024-47523](CVE-2024/CVE-2024-475xx/CVE-2024-47523.json) (`2024-10-01T21:15:07.050`)
- [CVE-2024-47524](CVE-2024/CVE-2024-475xx/CVE-2024-47524.json) (`2024-10-01T21:15:07.297`)
- [CVE-2024-47525](CVE-2024/CVE-2024-475xx/CVE-2024-47525.json) (`2024-10-01T21:15:07.520`)
- [CVE-2024-47526](CVE-2024/CVE-2024-475xx/CVE-2024-47526.json) (`2024-10-01T21:15:07.740`)
- [CVE-2024-47527](CVE-2024/CVE-2024-475xx/CVE-2024-47527.json) (`2024-10-01T21:15:07.967`)
- [CVE-2024-47528](CVE-2024/CVE-2024-475xx/CVE-2024-47528.json) (`2024-10-01T21:15:08.273`)
- [CVE-2024-47609](CVE-2024/CVE-2024-476xx/CVE-2024-47609.json) (`2024-10-01T21:15:08.400`)
- [CVE-2024-9407](CVE-2024/CVE-2024-94xx/CVE-2024-9407.json) (`2024-10-01T21:15:08.530`)
- [CVE-2024-9411](CVE-2024/CVE-2024-94xx/CVE-2024-9411.json) (`2024-10-01T20:15:05.630`)
### CVEs modified in the last Commit
Recently modified CVEs: `30`
Recently modified CVEs: `20`
- [CVE-2023-39553](CVE-2023/CVE-2023-395xx/CVE-2023-39553.json) (`2024-10-01T19:35:04.130`)
- [CVE-2023-4353](CVE-2023/CVE-2023-43xx/CVE-2023-4353.json) (`2024-10-01T19:35:06.040`)
- [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2024-10-01T19:15:07.107`)
- [CVE-2024-22892](CVE-2024/CVE-2024-228xx/CVE-2024-22892.json) (`2024-10-01T19:10:13.467`)
- [CVE-2024-25659](CVE-2024/CVE-2024-256xx/CVE-2024-25659.json) (`2024-10-01T18:35:06.917`)
- [CVE-2024-25660](CVE-2024/CVE-2024-256xx/CVE-2024-25660.json) (`2024-10-01T18:35:07.807`)
- [CVE-2024-3657](CVE-2024/CVE-2024-36xx/CVE-2024-3657.json) (`2024-10-01T19:15:07.647`)
- [CVE-2024-41445](CVE-2024/CVE-2024-414xx/CVE-2024-41445.json) (`2024-10-01T19:03:27.197`)
- [CVE-2024-42154](CVE-2024/CVE-2024-421xx/CVE-2024-42154.json) (`2024-10-01T19:32:18.310`)
- [CVE-2024-44610](CVE-2024/CVE-2024-446xx/CVE-2024-44610.json) (`2024-10-01T18:35:08.880`)
- [CVE-2024-44744](CVE-2024/CVE-2024-447xx/CVE-2024-44744.json) (`2024-10-01T19:35:08.023`)
- [CVE-2024-47078](CVE-2024/CVE-2024-470xx/CVE-2024-47078.json) (`2024-10-01T18:29:17.867`)
- [CVE-2024-47534](CVE-2024/CVE-2024-475xx/CVE-2024-47534.json) (`2024-10-01T18:35:09.730`)
- [CVE-2024-5953](CVE-2024/CVE-2024-59xx/CVE-2024-5953.json) (`2024-10-01T19:15:09.320`)
- [CVE-2024-6593](CVE-2024/CVE-2024-65xx/CVE-2024-6593.json) (`2024-10-01T19:37:55.573`)
- [CVE-2024-6594](CVE-2024/CVE-2024-65xx/CVE-2024-6594.json) (`2024-10-01T19:41:08.783`)
- [CVE-2024-7421](CVE-2024/CVE-2024-74xx/CVE-2024-7421.json) (`2024-10-01T18:36:59.117`)
- [CVE-2024-8888](CVE-2024/CVE-2024-88xx/CVE-2024-8888.json) (`2024-10-01T19:30:35.400`)
- [CVE-2024-8975](CVE-2024/CVE-2024-89xx/CVE-2024-8975.json) (`2024-10-01T19:20:21.103`)
- [CVE-2024-8996](CVE-2024/CVE-2024-89xx/CVE-2024-8996.json) (`2024-10-01T19:16:02.793`)
- [CVE-2024-9392](CVE-2024/CVE-2024-93xx/CVE-2024-9392.json) (`2024-10-01T19:35:08.990`)
- [CVE-2024-9400](CVE-2024/CVE-2024-94xx/CVE-2024-9400.json) (`2024-10-01T19:35:10.277`)
- [CVE-2024-9401](CVE-2024/CVE-2024-94xx/CVE-2024-9401.json) (`2024-10-01T18:35:10.363`)
- [CVE-2024-9402](CVE-2024/CVE-2024-94xx/CVE-2024-9402.json) (`2024-10-01T19:35:11.270`)
- [CVE-2024-9403](CVE-2024/CVE-2024-94xx/CVE-2024-9403.json) (`2024-10-01T19:35:12.057`)
- [CVE-2023-38460](CVE-2023/CVE-2023-384xx/CVE-2023-38460.json) (`2024-10-01T20:35:04.597`)
- [CVE-2023-39136](CVE-2023/CVE-2023-391xx/CVE-2023-39136.json) (`2024-10-01T21:35:02.317`)
- [CVE-2023-39137](CVE-2023/CVE-2023-391xx/CVE-2023-39137.json) (`2024-10-01T21:35:03.077`)
- [CVE-2023-40272](CVE-2023/CVE-2023-402xx/CVE-2023-40272.json) (`2024-10-01T20:35:06.170`)
- [CVE-2023-4357](CVE-2023/CVE-2023-43xx/CVE-2023-4357.json) (`2024-10-01T20:35:08.987`)
- [CVE-2023-51958](CVE-2023/CVE-2023-519xx/CVE-2023-51958.json) (`2024-10-01T21:35:05.460`)
- [CVE-2024-23058](CVE-2024/CVE-2024-230xx/CVE-2024-23058.json) (`2024-10-01T21:35:06.453`)
- [CVE-2024-37533](CVE-2024/CVE-2024-375xx/CVE-2024-37533.json) (`2024-10-01T20:35:02.140`)
- [CVE-2024-39560](CVE-2024/CVE-2024-395xx/CVE-2024-39560.json) (`2024-10-01T20:15:05.170`)
- [CVE-2024-41672](CVE-2024/CVE-2024-416xx/CVE-2024-41672.json) (`2024-10-01T20:33:44.697`)
- [CVE-2024-42514](CVE-2024/CVE-2024-425xx/CVE-2024-42514.json) (`2024-10-01T20:35:10.930`)
- [CVE-2024-45302](CVE-2024/CVE-2024-453xx/CVE-2024-45302.json) (`2024-10-01T20:05:07.857`)
- [CVE-2024-45537](CVE-2024/CVE-2024-455xx/CVE-2024-45537.json) (`2024-10-01T20:41:33.207`)
- [CVE-2024-46079](CVE-2024/CVE-2024-460xx/CVE-2024-46079.json) (`2024-10-01T20:35:15.110`)
- [CVE-2024-46081](CVE-2024/CVE-2024-460xx/CVE-2024-46081.json) (`2024-10-01T20:35:15.930`)
- [CVE-2024-46083](CVE-2024/CVE-2024-460xx/CVE-2024-46083.json) (`2024-10-01T20:35:16.743`)
- [CVE-2024-47082](CVE-2024/CVE-2024-470xx/CVE-2024-47082.json) (`2024-10-01T20:01:13.367`)
- [CVE-2024-6936](CVE-2024/CVE-2024-69xx/CVE-2024-6936.json) (`2024-10-01T20:37:34.150`)
- [CVE-2024-7151](CVE-2024/CVE-2024-71xx/CVE-2024-7151.json) (`2024-10-01T20:28:02.453`)
- [CVE-2024-9396](CVE-2024/CVE-2024-93xx/CVE-2024-9396.json) (`2024-10-01T20:35:19.027`)
## Download and Usage

View File

@ -211259,7 +211259,7 @@ CVE-2022-47180,0,0,feeb910e30fc590f014c687ac3b445ad520d89e7bd146542881614c509fca
CVE-2022-47181,0,0,51afd3bad1538ba6200abd9f8ed00bcacb9c749ddf0f1b3acf678c6446ded1f8,2023-11-15T15:52:09.650000
CVE-2022-47183,0,0,cce3276c953e1ad26b3593918630191fbed32dda25f1ab16491186a3efe94af4,2023-05-26T13:56:53.707000
CVE-2022-47184,0,0,4c70a545a853d25f85171c9fa2b1bd779e68fdc203c6ed430f8ebaf2aef625c9,2023-06-30T02:15:08.723000
CVE-2022-47185,0,1,065bfecabb9c0fe335359d3df24bea57ca36ad2123e34b49d507b12c5e7642ba,2024-10-01T19:35:00.857000
CVE-2022-47185,0,0,065bfecabb9c0fe335359d3df24bea57ca36ad2123e34b49d507b12c5e7642ba,2024-10-01T19:35:00.857000
CVE-2022-47186,0,0,fc4b0558bef7a018ed1447c73a878492478d31f80573d5d43c4df02b4bacefa7,2023-10-03T00:45:03.710000
CVE-2022-47187,0,0,f70f9487045a773b790514c9aaca409db00d19ea5383fd18c1f5d735a7719558,2023-10-02T20:45:38.697000
CVE-2022-47188,0,0,ea49527de7f0fef9a080da54534eb3be5ad9a5330b8ad0dd08b44e7004124fe4,2023-04-06T19:46:55.110000
@ -215106,9 +215106,9 @@ CVE-2023-20845,0,0,02fc9de8b79334f19e56f97c1e0d83a8ed285d0db1c41fa812625c5f13612
CVE-2023-20846,0,0,6cd059ec6b277b1d7eb18c1c547341c79d6b806c2d39572a914bec0a227f4e62,2023-09-07T14:42:09.063000
CVE-2023-20847,0,0,fca0d6701300e43b9ac492b44dba1f93abaea048fb485ddb4172af838081672a,2023-09-07T14:43:55.820000
CVE-2023-20848,0,0,f8ab05aaa65b9d97c7927c9f7f85f45846288129514faf0a47280807318007af,2023-09-07T14:44:06.117000
CVE-2023-20849,0,1,732ea1440309f4e1beded71f9f4fba5ac28aea4f3eff22c819fa9a5b01f18bdd,2024-10-01T19:35:01.137000
CVE-2023-20849,0,0,732ea1440309f4e1beded71f9f4fba5ac28aea4f3eff22c819fa9a5b01f18bdd,2024-10-01T19:35:01.137000
CVE-2023-2085,0,0,338a62bf8724204748fc07e75fa57132a1fae27e3dff7bdb8f58ed05edf063d5,2023-11-07T04:11:54.957000
CVE-2023-20850,0,1,73fd7189993018104a47c923837818af31364782c90b09203ab602d9e71b3051,2024-10-01T18:35:02.863000
CVE-2023-20850,0,0,73fd7189993018104a47c923837818af31364782c90b09203ab602d9e71b3051,2024-10-01T18:35:02.863000
CVE-2023-20851,0,0,be0013a00c3715e1813fdf306db6be2e25c169823a0d7a12944b48deefed838b,2023-09-07T19:10:10.583000
CVE-2023-20852,0,0,0bb4ba88c629b90d1df3958f078964652582dca9076942a6163fb821e9a4dc4a,2023-05-08T17:45:47.537000
CVE-2023-20853,0,0,710623e02ee2d05aec5c3ee6bf751e0da0fec2fdaef0dc7d038d8c18682b7eb9,2023-05-08T18:45:09.930000
@ -224839,7 +224839,7 @@ CVE-2023-32807,0,0,d8a6af0507a0d41f9a8ee4ad9d32298e7eae1bab1e6d2928ee6b7def5c985
CVE-2023-32808,0,0,bd0af10904aecc1ae16ec029049d57afde81c9af3947ef3356881d7703008230,2023-09-07T19:12:34.423000
CVE-2023-32809,0,0,929cb445486c4573195687241ba6c1ed4f870abddd481c25e4dc12969ed4fd51,2023-09-07T19:12:43.770000
CVE-2023-32810,0,0,4fb3f76b2305d513fe8fafd71268d676dbcee10861a6e4da52ccaed05bc22c8d,2023-09-07T19:12:56.850000
CVE-2023-32811,0,1,c7e3a2acd8ac3002d64478758a339565290c41241e59c530e4832384cd1c700a,2024-10-01T19:35:02.820000
CVE-2023-32811,0,0,c7e3a2acd8ac3002d64478758a339565290c41241e59c530e4832384cd1c700a,2024-10-01T19:35:02.820000
CVE-2023-32812,0,0,599edd474e68b3b82ff60cf2047213ad572ad452ad4995cf016ec27b59b086c0,2023-09-07T14:42:25.327000
CVE-2023-32813,0,0,c96bd46cd9ba2352828083b7c7200ae5888cb4d37f5907c2db7d910bb0203cef,2023-09-07T14:42:39.470000
CVE-2023-32814,0,0,4feadb463c76a88ab596897a43377e7f80236c0d7ca7b35eb9093f0abea1d20c,2023-09-07T14:42:58.513000
@ -225681,7 +225681,7 @@ CVE-2023-3393,0,0,ed9a0ba91ad4a8f09fbdeaeefe5d6742b533c27532218bce46a9c7781a5552
CVE-2023-33930,0,0,5e1b4b2e39ebc0810edaed24fa749cb5ff1094a76d90351b848320fd4a16f9c5,2024-06-04T16:57:41.053000
CVE-2023-33931,0,0,9106168532ab2addb5e7b5a3eb8d9190aa2bca4cfda158157202afa7a07cd3a7,2023-06-02T01:31:13.207000
CVE-2023-33933,0,0,9175093f486b4ea5e2aca075e1a9835d48e8aca0045318fe8eb28760e9a74497,2023-06-30T02:15:09.060000
CVE-2023-33934,0,1,de334d9acd68662471dedff6521ef25ea4f9b72b7a3f6f1790e5d33c45ca327d,2024-10-01T19:35:03.657000
CVE-2023-33934,0,0,de334d9acd68662471dedff6521ef25ea4f9b72b7a3f6f1790e5d33c45ca327d,2024-10-01T19:35:03.657000
CVE-2023-33937,0,0,bc1be9e31f7865fa56bee64c9cedb1f9708b14232973e80728efd59ee3961971,2023-05-30T17:03:17.217000
CVE-2023-33938,0,0,ac6ff70b73875be47e3d0537893ed9a023897167f8897f10814a360e575b89e1,2023-05-31T19:32:37.323000
CVE-2023-33939,0,0,9a73d602606c77bd69142852b1957d1038d49fb0d2e040861c2d1bd59203784a,2023-05-31T20:35:06.760000
@ -229037,7 +229037,7 @@ CVE-2023-38457,0,0,f02a3fd8430e0c8ee48f173f1e80cb2811aab3b6dbc442550c71a1ce0dbf3
CVE-2023-38458,0,0,4dd8cb39abe3a2898afc4c68fb3269e759faa98ba291cfc9970979260faad039,2023-09-08T00:02:21.383000
CVE-2023-38459,0,0,da38a8e6a851d6028dcb97ddf67e397e73d01255f5b1c893ade23785cf2580a1,2023-09-08T00:02:33.287000
CVE-2023-3846,0,0,c04eb34779e2dd8a560eaeeaf47fca879072f7e8dce2ee419ef68b6a1c4dcd45,2024-05-17T02:27:53.090000
CVE-2023-38460,0,0,fb856bc587c829fe459042e290e0d72c9fac8a91c5c4e7b46f9984c2422f81a4,2023-09-08T00:02:44.077000
CVE-2023-38460,0,1,7edb98d5d86b34dc83f0614538a100382c98c6255ec1756e9552295c060f795c,2024-10-01T20:35:04.597000
CVE-2023-38461,0,0,ef1f9318b591f67680fb88cab0a45ea5592d498d20e13820d69b14910f7a31d4,2023-09-08T00:02:53.680000
CVE-2023-38462,0,0,ad8f13637d50038aa92b9722f87fbd880b84386b94fb455f8d003e25ca3bf654,2023-09-08T00:03:05.363000
CVE-2023-38463,0,0,c448fe007f1883db40b171cfe3dc3ea94417cbd4f603b041b857c9a1b11546de,2023-09-08T00:03:15.670000
@ -229550,8 +229550,8 @@ CVE-2023-39128,0,0,77f6c5119bafca0b9996aee2842e191a4d9548174e03d2fa9b129d2810aeb
CVE-2023-39129,0,0,d1eb5fed83fa5734b4290c997347cd686277058609690a23f95237e8ce709e17,2023-08-03T13:49:53.617000
CVE-2023-39130,0,0,9393d377d6aa3221c621e3302d662e6b07a56ec0af558ca2a1cb541bcac10567,2023-08-03T13:50:26.573000
CVE-2023-39135,0,0,594c0f936b3099d165517fc58af2cdacfab98a3e04f24198a0ddf203d5f1b5de,2023-09-06T13:12:18.997000
CVE-2023-39136,0,0,86e08af91084edda0600c9f57d0319754607f3c44537b3711ea63f35a4d082a3,2023-09-06T12:41:25.233000
CVE-2023-39137,0,0,601a28e4e912b3746c0594cbef62e56ae00fee9ae7aea82deb28ee5c00fe5878,2023-09-05T19:04:53.400000
CVE-2023-39136,0,1,c06ff859bd1c7c055b45576b7dbb53007c0cde9db1fc9d5dc938e1bfc6260f86,2024-10-01T21:35:02.317000
CVE-2023-39137,0,1,638e7b31a00f87602302ef4b52c85d129349bffb8d3723657dc3b2438559c13b,2024-10-01T21:35:03.077000
CVE-2023-39138,0,0,6dcde40857a231284385091ae6674cabfe3f0cf7ca44d8a504c40d2c03a30cfc,2023-09-05T19:00:03.030000
CVE-2023-39139,0,0,d39e992b252416f6b6937fce8132868562a07c9f97ba56c45ab42cc8e857d843,2023-09-05T18:59:48.403000
CVE-2023-3914,0,0,685f2ca881f14c2c10a5fcd42b9f85e11043130d7961d19b65a5febef8c6adec,2023-10-03T15:31:20.073000
@ -229951,7 +229951,7 @@ CVE-2023-3955,0,0,510b6186eabfafe872746a3af55ba860a172147a88fc084aca8037ff56624d
CVE-2023-39550,0,0,2a8d817096e915e94fe219a53b6a38ead86de951ff52ddb911ad30f78e04b370,2023-08-09T20:32:27.357000
CVE-2023-39551,0,0,8d5e6a566bc2cd3065689b637543c0821838e3c03e3582da35fdeda106407485,2023-12-28T14:38:04.070000
CVE-2023-39552,0,0,02ee4c2492f2965e99540c5423c0fdededbafe1eb16493d9b568d848959a133c,2023-11-07T04:17:32.960000
CVE-2023-39553,0,1,dbd6cd86e49522a71b233588d611bc7c44ac0c2670dd6c99c7cdd270a728d3b7,2024-10-01T19:35:04.130000
CVE-2023-39553,0,0,dbd6cd86e49522a71b233588d611bc7c44ac0c2670dd6c99c7cdd270a728d3b7,2024-10-01T19:35:04.130000
CVE-2023-39558,0,0,5145ad8848de2b2a6600b3fdbb21297a79091733780a9f23e50a185007d8fa3a,2023-08-31T20:10:44.260000
CVE-2023-39559,0,0,054d47cac5a8a6923a905c555773c14dce51b228c84c87f8f079198b6c03dd1d,2023-08-31T20:05:28.393000
CVE-2023-3956,0,0,575daaaf998cddcbf63d4d2ed6f9a7d2053e76a2a5cbf3196a7093f0e7062d90,2023-11-07T04:20:01.623000
@ -230442,7 +230442,7 @@ CVE-2023-40267,0,0,56572919214891c41bf23bf9a2a8facbc146568509a54758466f00ffb956e
CVE-2023-4027,0,0,48dd689c0965b18792f4cfccdc2c7158758924f1ef3e29f58ca27c4d96ee8917,2024-09-12T17:53:23.627000
CVE-2023-40270,0,0,bfe775aa3824e231981669c54daa4b3626fdef3730529a7294f128db1bc3f6b9,2023-11-07T04:20:11.150000
CVE-2023-40271,0,0,6b7cac9f3aa7106de89543b184fd87ed595daa98acee7e01c87cb1a2e5f2240d,2023-09-13T02:27:16.427000
CVE-2023-40272,0,0,dc2163a711fa92f8bca2bd6cb8aeefb8d5caede053b4827a4026ffd948affedb,2023-08-24T17:00:07.203000
CVE-2023-40272,0,1,c51ef96a95f857beeafcaad1f1e8a7a8691f09322a6f61139921406cef681ae7,2024-10-01T20:35:06.170000
CVE-2023-40273,0,0,1aeff0c64e332d86a913527db0cb88631ccab3f1706bf0fb35ec4fc41927c1a7,2024-09-27T21:35:03.083000
CVE-2023-40274,0,0,f20f5b1641662d852a3d92ec12b3069f4904a342ddf85c169c1d25358b0bc60a,2023-08-22T17:47:49.207000
CVE-2023-40275,0,0,bb235e4d61f5beda262b4c42a88b68d3e4b0c5cc4d47ebabd44e56511d114a27,2024-08-01T13:44:29.067000
@ -232809,7 +232809,7 @@ CVE-2023-43526,0,0,fdef4d07433978c21e90f2aaa2d5e0744a40159cb46d2523f600e44091ff5
CVE-2023-43527,0,0,7eb5c18eb2dcab19f02773f664512e59d6f3104050a058d0292f61259e86f9d7,2024-05-06T16:00:59.253000
CVE-2023-43528,0,0,17723454d7170de1ffe05a669d9458b879c06f04bcd60806eb419a03cff21a7e,2024-05-06T16:00:59.253000
CVE-2023-43529,0,0,d796ba91e8ed3a8af43a3b917741a5721c1a1c6f37759baff5d843732f367ee6,2024-05-06T16:00:59.253000
CVE-2023-4353,0,1,393e1bc8974009d001ebc36ee1d228d22785f4af86ba454f0fc8955240e1e1dc,2024-10-01T19:35:06.040000
CVE-2023-4353,0,0,393e1bc8974009d001ebc36ee1d228d22785f4af86ba454f0fc8955240e1e1dc,2024-10-01T19:35:06.040000
CVE-2023-43530,0,0,2b0e9b8c44b2af07efc8e1983d06865dbe8d4ff2d4b02c1d4461a0a3baae25ca,2024-05-06T16:00:59.253000
CVE-2023-43531,0,0,8776dcf534399ce96f5122f460d512396d2f87ec911c41e1e3bf01fcb06c7188,2024-05-06T16:00:59.253000
CVE-2023-43532,0,0,2152376de855e4c6f3a3defbbd22ff091a522c6da97f87a072241e119c769d31,2024-04-12T16:15:34.570000
@ -232844,7 +232844,7 @@ CVE-2023-43566,0,0,93b8330a966078586ff833ee074865965aee8604bc18527a8553469739647
CVE-2023-43567,0,0,2aa86a4e24e6fbbc26da7a89b2443664154e1ca53a55c0280bab873782f48bbd,2023-11-16T14:27:01.117000
CVE-2023-43568,0,0,bdfb543de0dbba6d1e62cd6b1d8ef84ab210795e281df5ecaa3d356a7108492b,2023-11-16T14:24:24.567000
CVE-2023-43569,0,0,b501c00f16ad12c10de51b119f50da5b049f47b7a51d0959233e8a67b55dbb6f,2023-11-16T14:17:19.957000
CVE-2023-4357,0,0,e5caa97919d1edd1308d69be6b40fa8b90c186dccadad04dac8f127c95689c26,2024-01-31T17:15:14.977000
CVE-2023-4357,0,1,9a94caff9b6bef36e5d7f09901164950bf982836eab1382d1ab74e5201c2a9d8,2024-10-01T20:35:08.987000
CVE-2023-43570,0,0,9ad3b7c79f93c1e3393183edbef7977dccc2cb0e413a289ae0c6f5cdc6eaca94,2023-11-16T14:20:36.770000
CVE-2023-43571,0,0,0e75aa7e46973e590b7ca83bf8a058f9bcfeaf9ea393965470cb6593b7717e7b,2023-11-15T21:15:32.450000
CVE-2023-43572,0,0,4fabdbdf5ef9f17ef700646cf6ea9081ceb1666f94c31ca11a0803fcb32aac84,2023-11-15T21:16:30.670000
@ -238585,7 +238585,7 @@ CVE-2023-51954,0,0,4ff76b568d3faff9f829ea591dbfd0d9115272ba981bdf7edc32bb5147722
CVE-2023-51955,0,0,96b6c1691f65514a025578a62b8ac9a0de7de576b9ebb58feaa93bb19273720d,2024-01-13T01:37:05.593000
CVE-2023-51956,0,0,39d053af463ba7e4c7411fd2ae0ae34235a4f5d7202a921e90419dda10c7c0a3,2024-01-13T01:37:00.747000
CVE-2023-51957,0,0,d4fa4f4bf8e10824cf2b7b73f04972398831051b7356d3b28aeb0357f12b784b,2024-09-03T21:35:05.447000
CVE-2023-51958,0,0,6a543d9cfb3d754668940339330a02888bb256ec0fc4794f933773784d3b7e99,2024-01-13T01:36:59.057000
CVE-2023-51958,0,1,9c0aa07523721b15574a8902ade72dd402be70f2c14a5bc99aef1fd7808f35d4,2024-10-01T21:35:05.460000
CVE-2023-51959,0,0,88b3cd42f3f63afb4a575533356810808dc0bdec1c8365e49cf2b4a7a510665c,2024-01-13T01:36:56.537000
CVE-2023-5196,0,0,b20860c77a6c0ec45058e11238b4e7202da899f6f301963823f3d3e85909eb20,2023-10-03T18:03:34.537000
CVE-2023-51960,0,0,3084e660dc3b4485d09a6056a61ba99e47ad1e9382a09a174ebbb903ebd4df7e,2024-01-13T01:36:54.740000
@ -242184,7 +242184,7 @@ CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab32714
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000
CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000
CVE-2024-1062,0,1,24ecace5df9c5b33c9bbceb7b481f2a68a28ce66c96d3da7dab3563d6caa5f19,2024-10-01T19:15:07.107000
CVE-2024-1062,0,0,24ecace5df9c5b33c9bbceb7b481f2a68a28ce66c96d3da7dab3563d6caa5f19,2024-10-01T19:15:07.107000
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000
@ -245081,7 +245081,7 @@ CVE-2024-2288,0,0,cd7c5230343a968ec1284ad6d84a2effc1ddaec094bc18cd1b2aea35c83f88
CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000
CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000
CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000
CVE-2024-22892,0,1,1cb70c9bbe2035656f1a61537a281bff8d1269d1ea2645c56c1075af5d2518c3,2024-10-01T19:10:13.467000
CVE-2024-22892,0,0,1cb70c9bbe2035656f1a61537a281bff8d1269d1ea2645c56c1075af5d2518c3,2024-10-01T19:10:13.467000
CVE-2024-22893,0,0,e1e53fa1e54ff65fc5aae6a149ae9db0f2276c6ba02f1d9037ae0607db2029bf,2024-09-26T14:35:12.920000
CVE-2024-22894,0,0,ecc90d1f90435a146d50bcd73db1df9adeb9ffb1597740cac1fbe4451cd93336,2024-08-29T20:36:06.063000
CVE-2024-22895,0,0,ed8706063f1e23de8c688f7d1c47a27a8939e76d7f567287b7abe53b8af0f9ba,2024-01-26T19:34:53.417000
@ -245138,7 +245138,7 @@ CVE-2024-23052,0,0,6e63544b9543a8be6c4c9d7ca85d761282c9d7499422234fa61e57b1028c2
CVE-2024-23054,0,0,7a4436b0ce2b8f811851624479923281ac594f0e57d9c7febac6e9ac0a1c183e,2024-07-03T01:47:31.317000
CVE-2024-23055,0,0,39a1da2046599a541095e649cd1467da192eafbb8c83bda6ccc7f637566b20d9,2024-02-02T17:05:51.857000
CVE-2024-23057,0,0,356413b0e16b06656f2e48b34a263773eed2e79f92f54165ef6c3b3059d3c30c,2024-08-30T20:35:09.487000
CVE-2024-23058,0,0,fbe948769846a0ca6a1c6e458e451afa4015e04c958980894e74b0838aeb0576,2024-01-18T15:16:50.140000
CVE-2024-23058,0,1,2a01ebbd00ace7d6e55c410bee23cc5baa62717edeeb4cc89cb06fbb07b5e202,2024-10-01T21:35:06.453000
CVE-2024-23059,0,0,9b9d622c9c169dee1e73de5d3695d13a5b3f299998a8b8578a6cba7dbf769da5,2024-01-18T15:17:14.453000
CVE-2024-2306,0,0,dba4619c77c06715e90d6a0a9c40f646be88098100eb784089d749ef57adff28,2024-04-10T13:23:38.787000
CVE-2024-23060,0,0,c533a2c3ab7879cb6341107bf55fb347921b4dcfd1771c35cc46c295fffc3384,2024-01-18T15:17:35.587000
@ -246916,9 +246916,9 @@ CVE-2024-25655,0,0,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969
CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000
CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000
CVE-2024-25658,0,0,f09508debc7eed82221938be7b993c0160818aa241ddbeae9e878f31f37fca08,2024-10-01T15:15:07.640000
CVE-2024-25659,0,1,e243ce9030582146f2f06c628d6032baed4429ba1e3bb6f5631d56029f34cf07,2024-10-01T18:35:06.917000
CVE-2024-25659,0,0,e243ce9030582146f2f06c628d6032baed4429ba1e3bb6f5631d56029f34cf07,2024-10-01T18:35:06.917000
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
CVE-2024-25660,0,1,00be2a86b19b7b85d17c4c9f5b4bc90225a5d5112c345c0347406e7d2223b9d0,2024-10-01T18:35:07.807000
CVE-2024-25660,0,0,00be2a86b19b7b85d17c4c9f5b4bc90225a5d5112c345c0347406e7d2223b9d0,2024-10-01T18:35:07.807000
CVE-2024-25661,0,0,b2add6eeddb71dfa6f29717e48f88f16d7fabe3cb3344824a313325dcf3b42aa,2024-10-01T15:35:11.597000
CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000
CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000
@ -251464,7 +251464,7 @@ CVE-2024-31822,0,0,f5a60a4c5bebe79b36a24a50e6b8d88f76d622645863bbbdd8c3e989dd181
CVE-2024-31823,0,0,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5297,2024-07-03T01:55:25.480000
CVE-2024-31828,0,0,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000
CVE-2024-3183,0,0,0492ca93cdfb91fe06164185f64dfd6e79760054d26b360873216c2809fc0f55,2024-09-25T16:29:45.630000
CVE-2024-31835,1,1,a15909b348dffc8f5b64de98bd835d16533e3f022180d11add00c96b0d6d92ad,2024-10-01T19:15:07.493000
CVE-2024-31835,0,0,a15909b348dffc8f5b64de98bd835d16533e3f022180d11add00c96b0d6d92ad,2024-10-01T19:15:07.493000
CVE-2024-31837,0,0,d4b11924eb0f296c66c4011d26e3c8d35fd7f17f46fa8fcc1ff3c6feb008909a,2024-04-30T13:11:16.690000
CVE-2024-31839,0,0,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000
CVE-2024-31840,0,0,2a239ae6429f1e619b6ab41616165b617110dec5fa8e072accfd9e1f9e2b5f58,2024-07-26T19:12:02.190000
@ -254883,7 +254883,7 @@ CVE-2024-3655,0,0,e71ce96c12260fd20e30c34a37c891ab80d60d68f884fd271e3bd452e26ac6
CVE-2024-36550,0,0,d598c384dd8bbd4edfd1900743514ac3a937e6a8f9e3bb960c12f741aca4d680,2024-08-21T16:35:07.113000
CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000
CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000
CVE-2024-3657,0,1,83c06ed0f4ba7d4d8236ae3b34414da273019294423ac879c4a20b79f527b478,2024-10-01T19:15:07.647000
CVE-2024-3657,0,0,83c06ed0f4ba7d4d8236ae3b34414da273019294423ac879c4a20b79f527b478,2024-10-01T19:15:07.647000
CVE-2024-36572,0,0,51fcc433e117044936f625e7e1dc65ef66d9076878d51d4460ad4070df0069c4,2024-08-08T14:28:25.750000
CVE-2024-36573,0,0,9ceb16a2acc670182f357db64f06ef9a672381f951b2f58ee1e425755272a679,2024-08-01T13:53:08.237000
CVE-2024-36574,0,0,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000
@ -255528,7 +255528,7 @@ CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726
CVE-2024-37529,0,0,f9accff698127aa01ca28b864c7fa6ff8749b3c683fd8343d39e26a6d0d3d7fd,2024-08-23T18:55:48.257000
CVE-2024-3753,0,0,84eff4df8db1a00368e62ddb5ee92a92d75f6c87384a685b642620e2007cf84f,2024-08-01T13:56:41.100000
CVE-2024-37532,0,0,3b60301bd3ecd5ba1ae039adbdac16a6f9c55836208bf93b57eccc416f5b126c,2024-08-21T14:19:53.637000
CVE-2024-37533,0,0,d82586c3abd351c16093df491355c34e8750e635410a84408441a8e9ff8b85a0,2024-07-25T12:36:39.947000
CVE-2024-37533,0,1,8617a6cc9c5f8f71c3d60c428ddee73394a13d5fc8b812be34dfeb025cafba9c,2024-10-01T20:35:02.140000
CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000
CVE-2024-37536,0,0,195e5e44f085284e46a0abfb4a43141ba690e4bb70fa2e823028c4e9bfbf4e97,2024-08-30T20:29:11.573000
CVE-2024-37537,0,0,b4ce6fe0880001166fce40df54becea01a571a6ed2c234e78a95332e05a4f107,2024-08-30T20:35:49.987000
@ -256903,7 +256903,7 @@ CVE-2024-39557,0,0,a32cc20ffd72a7cfc463b7005050b871d4a9c6b4282470b8a1b65cda36863
CVE-2024-39558,0,0,f90cadeb1900fca56f5888109bfbb2a2d09e5b97ab830e54de2a3e13ed068c80,2024-08-12T13:38:24.610000
CVE-2024-39559,0,0,3e11b67256a64801d826cd1dd91d32c291c393011a888b94d8c41f17c128d873,2024-07-11T13:05:54.930000
CVE-2024-3956,0,0,a3cb09bf1f28d977327946dc32f9ea686f27cbe51075fc0453b6840e64eb9d3b,2024-05-14T16:11:39.510000
CVE-2024-39560,0,0,b4ed92932e2d04f6c32524ca2b7ed5834cd6ea452116fcc1c65eefbeae3fbc2c,2024-07-11T17:15:16.867000
CVE-2024-39560,0,1,23f69d2135add515835b57e80ed861f5b71ea1c4537140e0184db49c17a20902,2024-10-01T20:15:05.170000
CVE-2024-39561,0,0,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbcb51,2024-07-11T13:05:54.930000
CVE-2024-39562,0,0,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000
CVE-2024-39565,0,0,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000
@ -257949,7 +257949,7 @@ CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1
CVE-2024-41440,0,0,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000
CVE-2024-41443,0,0,4b989230a84b85398c5698bceac0a0dd2b8192cac38c0d61b31ca0600868cc4e,2024-09-11T15:54:29.327000
CVE-2024-41444,0,0,5ea59719718418adee108f9ce5540b96facb8a58caf3370b9e6aa1a42ff02782,2024-09-05T18:36:39.773000
CVE-2024-41445,0,1,0fc7f8fbc1abd819663cf2e74dae12a1de52a80ed01d9032692e1c87685a8e86,2024-10-01T19:03:27.197000
CVE-2024-41445,0,0,0fc7f8fbc1abd819663cf2e74dae12a1de52a80ed01d9032692e1c87685a8e86,2024-10-01T19:03:27.197000
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000
CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000
@ -258035,7 +258035,7 @@ CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca74
CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000
CVE-2024-41670,0,0,d4de1327e25e7abc39266a562cb92a3c058d45ff783401ce0a66d0266a4c8b41,2024-07-29T14:12:08.783000
CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b806,2024-07-29T16:21:52.517000
CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000
CVE-2024-41672,0,1,663620cb38189153336e50cbd79c8e42d8e45afa368faf46f48802a1fdfadeff,2024-10-01T20:33:44.697000
CVE-2024-41673,0,0,920f05f9faa451ee3028416d14a5dbff94f88b00a7d462342ce1687bde0dafad,2024-10-01T15:15:07.873000
CVE-2024-41674,0,0,e673b8205e82a534b9a977608e67254dbf60c56054d2121630b866936cabb953,2024-08-23T17:06:58.063000
CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000
@ -258408,7 +258408,7 @@ CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad
CVE-2024-42151,0,0,fdb3fba7028cbe28580e674b99b9030e1b9e9a62c2e7f59da9e900cf53455fd9,2024-07-30T13:32:45.943000
CVE-2024-42152,0,0,f9b1bdbb9770cb880c8e4f665160afe152a7dd9b4afb734b9f478a046b3eefc2,2024-08-09T14:55:35.753000
CVE-2024-42153,0,0,fcc644e98f47bf80a615aace1a6ace900e6f19b9ce88641e6a917689ff1d51b4,2024-08-08T12:51:49.873000
CVE-2024-42154,0,1,c65c832cba909a54bbd26126a85c44c643ba5fb94f1f9e28362ed2f837ea2217,2024-10-01T19:32:18.310000
CVE-2024-42154,0,0,c65c832cba909a54bbd26126a85c44c643ba5fb94f1f9e28362ed2f837ea2217,2024-10-01T19:32:18.310000
CVE-2024-42155,0,0,95a42d84399f0f115a34ecfd921658f3d7af5446b3cada02cd7d7dba29b77291,2024-08-08T15:01:33.093000
CVE-2024-42156,0,0,3e3b593a088f7c0fa294387fa1377c62b099a10750cb61c9f552055051d6684b,2024-08-02T14:31:53.660000
CVE-2024-42157,0,0,5125f5bae216026101436b8ffee5dc883ebe43267cdd74d06d29261ee37e908f,2024-08-02T14:31:28.107000
@ -258677,7 +258677,7 @@ CVE-2024-42505,0,0,2fcd58f857ce6c82725ed74b63d72047c82b9583f361cc1246e436db45ee2
CVE-2024-42506,0,0,a50836bc4b1264acacafbcc6caa08df43b3dfb5e0abc0c4e6db32750472d07f5,2024-09-26T13:32:02.803000
CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb509124921a9,2024-09-26T13:32:02.803000
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
CVE-2024-42514,1,1,67642e13ec32e598611ef0c754f1018f0c4bb02e7b9cedf0e4b024d133cabaf6,2024-10-01T19:15:07.883000
CVE-2024-42514,0,1,61ee7e24012c0212f358aa1c3d0fe07389e60a29dbac19896e49651b443d2093,2024-10-01T20:35:10.930000
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
CVE-2024-42523,0,0,e7f13531824456b37c381b164195bec4f01c74ddaa27da31139f6cf4c536fef0,2024-08-23T18:35:03.563000
@ -259689,7 +259689,7 @@ CVE-2024-44589,0,0,67d52b979dbf84795ff1b1a6445da43c9d3cf1ac9141ab2287575f9704bf9
CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000
CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000
CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000
CVE-2024-44610,0,1,d9977e7613c4219febbb22e6f2d11d119f7833e2e068a8d6964d274f158b29fa,2024-10-01T18:35:08.880000
CVE-2024-44610,0,0,d9977e7613c4219febbb22e6f2d11d119f7833e2e068a8d6964d274f158b29fa,2024-10-01T18:35:08.880000
CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000
CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000
CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000
@ -259720,7 +259720,7 @@ CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a254
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3ab6,2024-09-06T16:46:47.907000
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
CVE-2024-44744,0,1,2cfc69cf96d0f6d6bf0cafff4131548c736f85c9575c6e741792a6f3559eb74f,2024-10-01T19:35:08.023000
CVE-2024-44744,0,0,2cfc69cf96d0f6d6bf0cafff4131548c736f85c9575c6e741792a6f3559eb74f,2024-10-01T19:35:08.023000
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000
@ -260031,7 +260031,7 @@ CVE-2024-45298,0,0,3855d0d2f5eeba6af655c62306c41db8dfb0c660d64bc08f64547216bf276
CVE-2024-45299,0,0,9c3c8396841ffa0041cd432be8da2038212f3a02e0878e8a646a9564573126e8,2024-09-30T12:48:22.930000
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
CVE-2024-45300,0,0,27fd775164e57067a38ceabd2aa31d5b4a7f60dbeadc170d1b287ab3c44d3eb5,2024-09-29T00:08:14.363000
CVE-2024-45302,0,0,2643a37ef19c9772537ce62d37ff849e3e9fbe197380391a278662073d8a215f,2024-08-30T13:00:05.390000
CVE-2024-45302,0,1,9c7190c10c27ef40d1c9209827dd8e45f9bb7da829c533438c3bcb25c5fb1108,2024-10-01T20:05:07.857000
CVE-2024-45303,0,0,0f2993ec35c2f5c69a86f92f14083da5a1f9682262497cdf98941162719918c3,2024-09-18T20:25:05.807000
CVE-2024-45304,0,0,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000
CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000
@ -260141,7 +260141,7 @@ CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6
CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
CVE-2024-45537,0,0,a282d5193ad4ed25eb36900d0c615a3a776acb77a2f162fd5f0d463a04fcdb02,2024-09-20T12:30:51.220000
CVE-2024-45537,0,1,8c7192afa018dd1f57bdc055aa77c26b5bbb005bc40a8a5d5186545cf53e09ac,2024-10-01T20:41:33.207000
CVE-2024-4554,0,0,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000
CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
@ -260301,6 +260301,7 @@ CVE-2024-45987,0,0,78f20ed33f2f525a22db6a5cf4bd6c14205c0abb553bb982099aff60afe84
CVE-2024-45989,0,0,ab3f6bd3392b087dcb35df06d536b3edd1a33ced94d9672493bfe0cf20988e7e,2024-09-30T12:46:20.237000
CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000
CVE-2024-45993,0,0,e26b64fa81fc283c963e728220ec6b219796ae3f5c14eda623f46362e541d825,2024-09-30T19:35:05.410000
CVE-2024-45999,1,1,4a0e2d6b9b706a9c04f96309d805e7a6593b35eaced1e9b7eade5f19e1c83601,2024-10-01T20:15:05.390000
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000
@ -260315,10 +260316,13 @@ CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
CVE-2024-46079,1,1,dad44f151f567ca45ee3a42f209885ad348460752883d5e1da277ce1abc03bdb,2024-10-01T19:15:08.373000
CVE-2024-46079,0,1,de738a0bd882f39ea47b8b780287948857238b9c551e4d68f6db004a475649c2,2024-10-01T20:35:15.110000
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
CVE-2024-46081,1,1,267260957606f4fcc19bc77768a77368d056373798b365f99fdafa532b090fe3,2024-10-01T19:15:08.763000
CVE-2024-46083,1,1,4bd55eb181f311fa2dca0ffc852711a990cc815111820be04315a4fee90c9829,2024-10-01T19:15:09.013000
CVE-2024-46080,1,1,fc601b9ca1b02c7d9ec64ffd3e18ec37b90c292805b3e0ba6020447020b8c32c,2024-10-01T21:15:06.767000
CVE-2024-46081,0,1,ce234681fd295fa30b0365e788d91f8af933d72fe65b9789b0e2a2d1afc6dfb2,2024-10-01T20:35:15.930000
CVE-2024-46082,1,1,d95641b6e12ce4e2c315980636fb143c9979cbf517556c795f433f4f608511d1,2024-10-01T21:15:06.857000
CVE-2024-46083,0,1,9a57be1cd20a7d38e5aef4fd8fde4bd404240de87843aaaa1ae4ab3787c965a8,2024-10-01T20:35:16.743000
CVE-2024-46084,1,1,03932b1e786313bde47afcea58437164dbad1a2165bf11903e8b6ec41ebf5c6d,2024-10-01T21:15:06.950000
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
@ -260768,9 +260772,9 @@ CVE-2024-47071,0,0,20aabd4cecd2fa87bfcd546bdad0f706b91d0c98fb8b7e753eb6864a0d761
CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000
CVE-2024-47078,0,1,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000
CVE-2024-47078,0,0,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
CVE-2024-47082,0,0,d7ffc8b868640d5bbc5bc3253e64c223c49da037df585cfe29979998a6e29188,2024-09-26T13:32:02.803000
CVE-2024-47082,0,1,1308a2a31af2cc56619224d4839a59b43bea81793244865a2d1ff9a5500281b8,2024-10-01T20:01:13.367000
CVE-2024-47083,0,0,5b490c0fd8cdac8afed0a02d02ba8fbf5e1993a5d9b09690e4aa8f97b99a9224,2024-09-26T13:32:02.803000
CVE-2024-47085,0,0,52609fda0dd3268fb54a4c4835942301029b5f82b7a9256b81c2395928ebbe9b,2024-09-26T15:30:47.787000
CVE-2024-47086,0,0,170e19d2a5f94228d179fe1c43d4342418d894a17ee62d0745e0ba04130a0c3e,2024-09-26T15:29:47.233000
@ -260867,11 +260871,17 @@ CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef
CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000
CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000
CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000
CVE-2024-47523,1,1,fca2b0d3b1acc48eb24e4a02cc1e9ba9635ac9f135f59c304acc058ad85d9be4,2024-10-01T21:15:07.050000
CVE-2024-47524,1,1,3aec47c770f6d1d3bcb3c93afa50d815d55cf5bd0a76155277e66f52d1432216,2024-10-01T21:15:07.297000
CVE-2024-47525,1,1,9a4e8f76e84229f4808462d3a570657a25dda99b3c44f531ee53664db59a21d0,2024-10-01T21:15:07.520000
CVE-2024-47526,1,1,43af752c3e2fc7342ec611606be28a580ed0ec758c75ca78eb986e06173bde43,2024-10-01T21:15:07.740000
CVE-2024-47527,1,1,34969198f4910991ff7dd37ae24149a4937c9d23978ca5ae81c80cd14b82849a,2024-10-01T21:15:07.967000
CVE-2024-47528,1,1,c80083da542e7f6c3b4980993c546b6e063f1d605799a426937d87a9431cf505,2024-10-01T21:15:08.273000
CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000
CVE-2024-47530,0,0,fba522e024b83acf70358c93acf37e114887d5fe3a476a11c9462eadc0b44e72,2024-09-30T16:15:09.540000
CVE-2024-47531,0,0,33301edab0f0649702484b01110937da183dc72540869ebdc9cdc877c211a23a,2024-09-30T16:15:09.750000
CVE-2024-47532,0,0,260108fc45e8ac31160035cc2b3e7ed0f7f45e8ba1661343699d85f76bbe06fa,2024-09-30T16:15:09.960000
CVE-2024-47534,0,1,671e6c0c25dde8e26f9c5f40d1c53b3b411fe0b9cd99c946b70166162df34376,2024-10-01T18:35:09.730000
CVE-2024-47534,0,0,671e6c0c25dde8e26f9c5f40d1c53b3b411fe0b9cd99c946b70166162df34376,2024-10-01T18:35:09.730000
CVE-2024-47536,0,0,6e4acb61d2da8d00872363d19c0ef06b941da325b5d169aae3bc2073325756a6,2024-09-30T17:15:04.780000
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
@ -260883,6 +260893,7 @@ CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f289
CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000
CVE-2024-47604,0,0,b6b4fc903f99b2043f88ddbd3163a454dae216b1bade4187e503e59baa13044e,2024-10-01T16:15:10.003000
CVE-2024-47608,0,0,183b8f26709f0bb4c9315ae5ac8f0737eedb89fb07f4c926502b272e6d5567a7,2024-10-01T17:15:08.970000
CVE-2024-47609,1,1,c9cf022f1dfad5ffb2fde9c3a055c08aea8aa07af7c65f963881117a985c612b,2024-10-01T21:15:08.400000
CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000
CVE-2024-4763,0,0,674813a6ab24bd703f885b42dfe132f3057b83ab6d40519e0af01ad0b69a7ece,2024-08-19T13:00:23.117000
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
@ -261925,7 +261936,7 @@ CVE-2024-5949,0,0,4572c12d3ad878ee653901722f7c16c0dabd647af42f6f6ae5a5828547615d
CVE-2024-5950,0,0,f2973766f812398c51fdc9e52a19a5f151706c2da451b30e218939a121000c2a,2024-08-07T18:12:58.253000
CVE-2024-5951,0,0,6febf2923b11ad8e5c0b580c95ce8478dd937b62c84a55da1a853959f3aac15d,2024-08-07T18:12:55.977000
CVE-2024-5952,0,0,4b0244413edcc544ed5c05479b5dbc3eeb5d75652ce440b39e8ad3eb0aaa28bb,2024-08-07T17:50:09.493000
CVE-2024-5953,0,1,b0757fe0be0db13c58712e79eac7917768b2c13e9ca44ac3bbcfbb57ee29490a,2024-10-01T19:15:09.320000
CVE-2024-5953,0,0,b0757fe0be0db13c58712e79eac7917768b2c13e9ca44ac3bbcfbb57ee29490a,2024-10-01T19:15:09.320000
CVE-2024-5956,0,0,420ebddf13dc6945f3b24acaba57b0a6b03370d22cfc4e076d52d9e45c18f699,2024-09-06T16:25:19.253000
CVE-2024-5957,0,0,c06bad62b3a76beb3abdcaffc89e2e904ca620c6e7deccb3fcebfda71eaf22f8,2024-09-06T16:24:23.317000
CVE-2024-5958,0,0,c362ae5c540e50c1b2c9dabce36ffa9306ab0cb7dda4c74f438c515104f11dba,2024-09-26T15:35:51.207000
@ -262469,8 +262480,8 @@ CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbe
CVE-2024-6590,0,0,d0599e66e3892d02270a133e7b75afc43bc911ece06aeb7ca1aaac80a84c180b,2024-09-30T14:31:06.627000
CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000
CVE-2024-6592,0,0,774b02abc9a341465f921917d82b309b3271b39fa6eaccc5903cbff98ad507d8,2024-10-01T16:06:09.937000
CVE-2024-6593,0,1,8f2655c01f1a83b7a90fb05748c8d626172d70351c6af6caea97afc7c1e3cc00,2024-10-01T19:37:55.573000
CVE-2024-6594,0,1,2593d3c0abe72883de12f7c5bcc72b3469cc3337afbd9c16e369acfd8c35d63c,2024-10-01T19:41:08.783000
CVE-2024-6593,0,0,8f2655c01f1a83b7a90fb05748c8d626172d70351c6af6caea97afc7c1e3cc00,2024-10-01T19:37:55.573000
CVE-2024-6594,0,0,2593d3c0abe72883de12f7c5bcc72b3469cc3337afbd9c16e369acfd8c35d63c,2024-10-01T19:41:08.783000
CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
CVE-2024-6596,0,0,8001cefbd18b27b44dffd25d89889cfeadffdcc6d2b877cab97cdf4b13170018,2024-10-01T12:26:45.967000
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
@ -262736,7 +262747,7 @@ CVE-2024-6932,0,0,b45f238b66342b8a7c2c79c0dddcacbab87276fdb0cd01ae77c1653350b609
CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000
CVE-2024-6934,0,0,e803290e0f45598964544bee83d9eab1d1648748432498a6102e4608f1e931cb,2024-09-10T20:22:56.390000
CVE-2024-6935,0,0,e72e7506294a595ab2cf5db5061b1cb277319bbf98ed1b3e690a38f115d41f6a,2024-09-10T20:14:55.343000
CVE-2024-6936,0,0,c3135623e07bfa962eaae47b33235e55701757a791431ecc292302b1d8016c20,2024-07-22T13:00:31.330000
CVE-2024-6936,0,1,1709a234b5c59ba1493b0dd105fab2e74988aa262e2e78535f0b41c6d2257151,2024-10-01T20:37:34.150000
CVE-2024-6937,0,0,9f011e32ee5611afd15c42ca9833c85e92433cbb9a85515a07cac7b3da88768e,2024-10-01T16:51:29.433000
CVE-2024-6938,0,0,b45e7150592dc53d2d6f8456f74caeee413b2781d0948d41717bd8701ae68b88,2024-07-22T13:00:31.330000
CVE-2024-6939,0,0,a7847aa2e67130908ca4b0fccbd5e84e8651f5b038701465ea8b316a5bed0334,2024-09-20T22:55:37.133000
@ -262884,7 +262895,7 @@ CVE-2024-7146,0,0,0d097eb41f121dd3c78bcb7ece20b3c3122f8d7908fd573306f5f8009daac9
CVE-2024-7147,0,0,d64b7d45d4df4fda891fe044ed5ed11da3adfb67eec103504ae2ce9a34185836,2024-08-19T13:00:23.117000
CVE-2024-7149,0,0,ef084513070b63be43d2b9419aae4af22b746649f4805a3227c23f4589d058d4,2024-09-30T12:45:57.823000
CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000
CVE-2024-7151,0,0,27748e77ac666f37b5ea95444b5871c2d624c12d124d7b3d9588f7bd43672a12,2024-07-29T14:12:08.783000
CVE-2024-7151,0,1,414c1240860ea75ab59ee6e10e908928a07d954f70fe0075d0c8750033db15c0,2024-10-01T20:28:02.453000
CVE-2024-7152,0,0,dcb2ef4ff482b2e3310b87257a8cfd0ded02bb0f2f9cc18d404e9808150d9dbb,2024-07-29T14:12:08.783000
CVE-2024-7153,0,0,9aefcf5212f7daa00d220d7b2b9f573be0a36b383139766fde3ad17e71ad7b77,2024-07-29T14:12:08.783000
CVE-2024-7154,0,0,e57552471881e1a14b1caaa59dc9c6ca8d39660d594fa4a96870a943590cfe91,2024-08-08T12:38:38.570000
@ -263106,7 +263117,7 @@ CVE-2024-7415,0,0,4f3e91f02c270ceca383c924b673a911f19c76918de0da2e60f23a61a9c60f
CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000
CVE-2024-7418,0,0,6785004d3e0c8a7d4acd7be47cb26ee53d058e1a0fbb989539468dc8c9c8a1ec,2024-08-29T13:25:27.537000
CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc054,2024-09-13T14:45:43.513000
CVE-2024-7421,0,1,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000
CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000
CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000
CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000
CVE-2024-7426,0,0,6a71007700c4116b380e5f6e6a7f1695f7459185616f96253328245521427764,2024-09-30T14:17:51.317000
@ -264074,7 +264085,7 @@ CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488
CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000
CVE-2024-8883,0,0,d39bf3fdabe814eab7383cf7d0056d70749ac8a21f6ccaada9d165b73ef13b6c,2024-10-01T13:15:03.313000
CVE-2024-8887,0,0,0407ca62fcbad308289f29aa7a81815bcc03d59968582f8cfbf5cd23bcc12817,2024-10-01T17:30:07.597000
CVE-2024-8888,0,1,3a815de886bf077ac63d6810f20ea887274d5ca628e3e664db2efb49b96f7c7b,2024-10-01T19:30:35.400000
CVE-2024-8888,0,0,3a815de886bf077ac63d6810f20ea887274d5ca628e3e664db2efb49b96f7c7b,2024-10-01T19:30:35.400000
CVE-2024-8889,0,0,409f189e1cc8763baf41f6d7663087a2138f3ee0ecad616a441fc7d44385c004,2024-09-20T12:30:51.220000
CVE-2024-8890,0,0,853fdfae0cb7e409cedb2bfde6ac5084d9565e6d8770bf21e4fc31a9e1d858a1,2024-10-01T15:46:33.750000
CVE-2024-8891,0,0,aa12a440054ffbd9bbb7dd25787b2c9efe1fc6e33a09eaeb1daa5594da775bc2,2024-09-26T18:50:56.827000
@ -264110,13 +264121,13 @@ CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4
CVE-2024-8965,0,0,4ba541e4606533e3a8bee7a33ff07d0a9f7a7b73c53d09de5034be2d80daa7c8,2024-09-30T12:46:20.237000
CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000
CVE-2024-8974,0,0,d4bcc9476e440aef15c3a18c780e18e6939f5911111a1f36c9f70c7d14bcd4bb,2024-09-30T12:46:20.237000
CVE-2024-8975,0,1,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
CVE-2024-8981,0,0,a6dff398f54eed438863305f0063a0cfe917abfa14511ee9bceae99f41bf945c,2024-10-01T03:15:02.470000
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
CVE-2024-8989,0,0,6ab2546ec964e99a431fecbc3726785c0f1928620ca5ffdda7abd4a623d7c876,2024-10-01T08:15:04.840000
CVE-2024-8990,0,0,5f3121a9544cb00fa60db849505a5187b12f6013895f285bda1d0b2e597f3595,2024-10-01T08:15:05.060000
CVE-2024-8991,0,0,09885cc5ee50368e772186dae89932abe94e78de6f22233b671ca629cda9542e,2024-09-30T12:46:20.237000
CVE-2024-8996,0,1,b0907780bcace0477557b6ba9bb55a2aefa2e27bdc88e1eb50e40fe332316c17,2024-10-01T19:16:02.793000
CVE-2024-8996,0,0,b0907780bcace0477557b6ba9bb55a2aefa2e27bdc88e1eb50e40fe332316c17,2024-10-01T19:16:02.793000
CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000
CVE-2024-9003,0,0,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000
CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000
@ -264254,22 +264265,24 @@ CVE-2024-9326,0,0,bc58a26c9b43fcdd4054d9300d5d0cde5547399aaa29865b7fca11d142895d
CVE-2024-9327,0,0,789b0175cdbfabd0a2b291c27ea4b21dfccf76f50782f3eac2c88bada4dfe956,2024-09-30T12:45:57.823000
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
CVE-2024-9329,0,0,98bed362b2a24e4db4311c4ce14eee7b5d7d3a2b87c87f5c94a31ac7bc8ac4f5,2024-09-30T12:45:57.823000
CVE-2024-9341,1,1,d5fd607e07f2946dcf80c0714f2f83eb8231c34e7bb32f10864cd8428533f0a9,2024-10-01T19:15:09.500000
CVE-2024-9355,1,1,bc71c5b9ebfc4eac935290ed6c54b2a101846c60f03637d231f1d92ea2a8c69d,2024-10-01T19:15:09.793000
CVE-2024-9341,0,0,d5fd607e07f2946dcf80c0714f2f83eb8231c34e7bb32f10864cd8428533f0a9,2024-10-01T19:15:09.500000
CVE-2024-9355,0,0,bc71c5b9ebfc4eac935290ed6c54b2a101846c60f03637d231f1d92ea2a8c69d,2024-10-01T19:15:09.793000
CVE-2024-9358,0,0,0152cc075779a766d901f87385961645ed224130afe67fa457b1ec2b8de41536,2024-10-01T02:15:10.340000
CVE-2024-9359,0,0,5e91a64536057dea096939e15114b5b156ad006dfcccaeb6e7ef261c97c1ddd2,2024-10-01T02:15:10.657000
CVE-2024-9360,0,0,bc1b1d81b39a5da5efaa713a48768241d5b68973f72008d946c08564d584aa3a,2024-10-01T03:15:02.690000
CVE-2024-9391,0,0,4c41432718e7451dc470a85181cb09fb2bd64b781f5907911b14b935baeaf954,2024-10-01T16:15:10.510000
CVE-2024-9392,0,1,407207e9e6bd2b7ba92ed54ef3a4a35aab092bf9644ceeea6fbb3985d013ec81,2024-10-01T19:35:08.990000
CVE-2024-9392,0,0,407207e9e6bd2b7ba92ed54ef3a4a35aab092bf9644ceeea6fbb3985d013ec81,2024-10-01T19:35:08.990000
CVE-2024-9393,0,0,7475863af582d7682a6cb667413720d8e8e419cf18be5c21c0a8d554e15e8e48,2024-10-01T16:15:10.623000
CVE-2024-9394,0,0,94ac2f796a28a48fb8529db6d17f57bb7aa19d5460b4224a06e050de703c7467,2024-10-01T16:15:10.683000
CVE-2024-9395,0,0,146f3b6c203b667b0708a9cd79c0e427dcadd8287fbd519c028fdd750b54ddc2,2024-10-01T16:15:10.740000
CVE-2024-9396,0,0,a50ce8a9060c20d0ea77d2742b7c06ef5085a0732da723d5dac6169147daa334,2024-10-01T16:15:10.790000
CVE-2024-9396,0,1,30f872d95bfbe66505283ad3346d27217f937a94e7cff3447a4a7706017b7395,2024-10-01T20:35:19.027000
CVE-2024-9397,0,0,0e6dc018e27e106f8465f46982df3d3806f8eaa1705916a22bae5ef9542138bc,2024-10-01T16:15:10.847000
CVE-2024-9398,0,0,cbf6d5eea6bb52c18b5f761a5bd1d0e77b201a1de5510ad862b43de95ab8a99e,2024-10-01T16:15:10.913000
CVE-2024-9399,0,0,7831716ae62b7b01e34c5c67a387b7643b5b679c0690629c11f4db300e7b381a,2024-10-01T16:15:10.980000
CVE-2024-9400,0,1,cc4fb93e00abf7802426c11e025b2c7a4c7347dd968ff958c1332299ebead6de,2024-10-01T19:35:10.277000
CVE-2024-9401,0,1,ccf23971d5a906be4b8d96e3aa94ed0071c57600834a3074e4d71320bf7c6562,2024-10-01T18:35:10.363000
CVE-2024-9402,0,1,9433d310ea442611994bb49cae76b6abe099452fd68462d2a25ab8d64b3a2459,2024-10-01T19:35:11.270000
CVE-2024-9403,0,1,66d9e463986ac67ad9bceb6cae4045b10ea740cc9a13552aa6348c37ab2ae35e,2024-10-01T19:35:12.057000
CVE-2024-9400,0,0,cc4fb93e00abf7802426c11e025b2c7a4c7347dd968ff958c1332299ebead6de,2024-10-01T19:35:10.277000
CVE-2024-9401,0,0,ccf23971d5a906be4b8d96e3aa94ed0071c57600834a3074e4d71320bf7c6562,2024-10-01T18:35:10.363000
CVE-2024-9402,0,0,9433d310ea442611994bb49cae76b6abe099452fd68462d2a25ab8d64b3a2459,2024-10-01T19:35:11.270000
CVE-2024-9403,0,0,66d9e463986ac67ad9bceb6cae4045b10ea740cc9a13552aa6348c37ab2ae35e,2024-10-01T19:35:12.057000
CVE-2024-9405,0,0,e9703465f499653ca07470a1ffd16e91f994c6f46933e9f402589910617b650e,2024-10-01T12:15:03.893000
CVE-2024-9407,1,1,844e60b42bd22ac882920576f0244b4221aa1cb4e0aeb01caf7aa58317c74c32,2024-10-01T21:15:08.530000
CVE-2024-9411,1,1,0ed7229fadcaa0ba2be6aae3ed0a903fea8ee7057f413ca8d29b7080b09aae26,2024-10-01T21:35:07.620000

Can't render this file because it is too large.