diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json index d9049689aa7..4e89168ad55 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46144", "sourceIdentifier": "info@cert.vde.com", "published": "2023-12-14T14:15:43.447", - "lastModified": "2023-12-21T17:16:11.880", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-01T07:15:02.540", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "info@cert.vde.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,24 +38,24 @@ "impactScore": 3.6 }, { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", - "baseScore": 7.7, - "baseSeverity": "HIGH" + "baseScore": 6.5, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.1, - "impactScore": 4.0 + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41176.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41176.json index 58c23cbb6cf..4977c14abbd 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41176.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41176.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41176", "sourceIdentifier": "info@cert.vde.com", "published": "2024-08-27T08:15:05.317", - "lastModified": "2024-09-12T14:26:00.527", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-01T07:15:03.147", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "info@cert.vde.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,23 +38,23 @@ "impactScore": 5.5 }, { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "attackVector": "LOCAL", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "LOW", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 7.3, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.0, + "exploitabilityScore": 1.8, "impactScore": 5.5 } ] diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43389.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43389.json index 60ed790c896..b44fcb0fbc4 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43389.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43389.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43389", "sourceIdentifier": "info@cert.vde.com", "published": "2024-09-10T09:15:05.220", - "lastModified": "2024-09-27T19:36:56.583", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-01T07:15:03.560", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "info@cert.vde.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,24 +38,24 @@ "impactScore": 5.2 }, { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 8.1, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43390.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43390.json index 7aa37a7c31e..b1fa9699708 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43390.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43390.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43390", "sourceIdentifier": "info@cert.vde.com", "published": "2024-09-10T09:15:05.537", - "lastModified": "2024-09-27T19:37:28.887", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-01T07:15:04.083", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "info@cert.vde.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,24 +38,24 @@ "impactScore": 5.2 }, { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 8.1, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43391.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43391.json index 610d6b8dfc2..ec654ec621f 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43391.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43391.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43391", "sourceIdentifier": "info@cert.vde.com", "published": "2024-09-10T09:15:05.760", - "lastModified": "2024-09-27T19:38:10.193", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-01T07:15:04.530", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "info@cert.vde.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,24 +38,24 @@ "impactScore": 5.2 }, { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 8.1, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43392.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43392.json index 9463a48dd9e..76ef01bd488 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43392.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43392.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43392", "sourceIdentifier": "info@cert.vde.com", "published": "2024-09-10T09:15:06.100", - "lastModified": "2024-09-27T19:04:26.060", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-01T07:15:04.953", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "info@cert.vde.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,24 +38,24 @@ "impactScore": 5.2 }, { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 8.1, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43393.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43393.json index fe24a7f99c9..518cb72e481 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43393.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43393.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43393", "sourceIdentifier": "info@cert.vde.com", "published": "2024-09-10T09:15:06.367", - "lastModified": "2024-09-27T19:36:03.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-01T07:15:05.443", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "info@cert.vde.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,24 +38,24 @@ "impactScore": 5.2 }, { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 8.1, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6876.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6876.json index 3e566ebadb5..c7272f69b9d 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6876.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6876.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6876", "sourceIdentifier": "info@cert.vde.com", "published": "2024-09-10T16:15:22.197", - "lastModified": "2024-09-23T16:45:04.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-01T07:15:05.890", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "LOW", - "baseScore": 5.1, + "baseScore": 4.4, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 2.5 } ] diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8107.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8107.json new file mode 100644 index 00000000000..a6d9515bf88 --- /dev/null +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8107.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8107", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-01T07:15:06.263", + "lastModified": "2024-10-01T07:15:06.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Slider Revolution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to use and configure Slider Revolution can be extended to authors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.sliderrevolution.com/documentation/changelog/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.sliderrevolution.com/documentation/changelog/#6-7-19", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22b59b36-ba47-4c10-8f43-a29ae3b9d446?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8421.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8421.json new file mode 100644 index 00000000000..726ddec28c5 --- /dev/null +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8421.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-8421", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-10-01T06:15:02.357", + "lastModified": "2024-10-01T06:15:02.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This CVE has been rejected." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 0.1, + "impactScore": 0.0 + } + ] + }, + "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6755", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2024-8421", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309710", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8445.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8445.json index e81ec36eb46..9f979550f51 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8445.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8445.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8445", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-05T15:15:16.927", - "lastModified": "2024-09-05T17:44:56.007", + "lastModified": "2024-10-01T06:15:02.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:7434", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8445", "source": "secalert@redhat.com" diff --git a/README.md b/README.md index 98f9d9ccf2b..efaddf0555e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-01T06:00:17.209868+00:00 +2024-10-01T08:00:18.031558+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-01T05:15:12.650000+00:00 +2024-10-01T07:15:06.263000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264186 +264188 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `2` -- [CVE-2024-0116](CVE-2024/CVE-2024-01xx/CVE-2024-0116.json) (`2024-10-01T05:15:11.920`) -- [CVE-2024-21489](CVE-2024/CVE-2024-214xx/CVE-2024-21489.json) (`2024-10-01T05:15:12.227`) -- [CVE-2024-21531](CVE-2024/CVE-2024-215xx/CVE-2024-21531.json) (`2024-10-01T05:15:12.440`) -- [CVE-2024-47295](CVE-2024/CVE-2024-472xx/CVE-2024-47295.json) (`2024-10-01T04:15:18.040`) +- [CVE-2024-8107](CVE-2024/CVE-2024-81xx/CVE-2024-8107.json) (`2024-10-01T07:15:06.263`) +- [CVE-2024-8421](CVE-2024/CVE-2024-84xx/CVE-2024-8421.json) (`2024-10-01T06:15:02.357`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `9` -- [CVE-2024-7409](CVE-2024/CVE-2024-74xx/CVE-2024-7409.json) (`2024-10-01T05:15:12.650`) +- [CVE-2023-46144](CVE-2023/CVE-2023-461xx/CVE-2023-46144.json) (`2024-10-01T07:15:02.540`) +- [CVE-2024-41176](CVE-2024/CVE-2024-411xx/CVE-2024-41176.json) (`2024-10-01T07:15:03.147`) +- [CVE-2024-43389](CVE-2024/CVE-2024-433xx/CVE-2024-43389.json) (`2024-10-01T07:15:03.560`) +- [CVE-2024-43390](CVE-2024/CVE-2024-433xx/CVE-2024-43390.json) (`2024-10-01T07:15:04.083`) +- [CVE-2024-43391](CVE-2024/CVE-2024-433xx/CVE-2024-43391.json) (`2024-10-01T07:15:04.530`) +- [CVE-2024-43392](CVE-2024/CVE-2024-433xx/CVE-2024-43392.json) (`2024-10-01T07:15:04.953`) +- [CVE-2024-43393](CVE-2024/CVE-2024-433xx/CVE-2024-43393.json) (`2024-10-01T07:15:05.443`) +- [CVE-2024-6876](CVE-2024/CVE-2024-68xx/CVE-2024-6876.json) (`2024-10-01T07:15:05.890`) +- [CVE-2024-8445](CVE-2024/CVE-2024-84xx/CVE-2024-8445.json) (`2024-10-01T06:15:02.650`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 89198f4b526..de91edda76c 100644 --- a/_state.csv +++ b/_state.csv @@ -234551,7 +234551,7 @@ CVE-2023-4614,0,0,48582db52caa833023c22becbfe97b66601953ec6bd1ee30a7b5e9ca1820d1 CVE-2023-46141,0,0,c5f273a16ddecbce5dba1c7f57708a733529e7eb71e0ea3caf81e42882abba20,2023-12-21T17:14:56.770000 CVE-2023-46142,0,0,3fb6a0861e35fc09ecd0298ad20e5d7a8d5b6455fb61a2037ae1846cac22d64c,2023-12-21T17:15:15.170000 CVE-2023-46143,0,0,e3bc6bf1bb4c8c0f9d3ac70e1c134375256c14ec8394d0b3c4d1d049a67021ad,2023-12-21T17:15:46.577000 -CVE-2023-46144,0,0,3282ce1c9478d9758af9f76cb4e41d53fa70db52bbadc33760bdc9a464fbec5b,2023-12-21T17:16:11.880000 +CVE-2023-46144,0,1,28e54b912c0831ce77f02362c8d0cb49ff749450334118efa496438fceb2310a,2024-10-01T07:15:02.540000 CVE-2023-46145,0,0,349c8808057410d251a89302413901d028ae7fdfdc2fab73cab5d33fd808c463,2024-05-17T18:36:05.263000 CVE-2023-46146,0,0,674968e0b09709c1de659f46455142d49d86eaca8817754c044e40c734f63cb6,2024-09-16T13:40:24.777000 CVE-2023-46147,0,0,b82be5e5d045675023a8fc4f0aac846ce0e3426dc9461912b9f889c9950e280c,2024-09-16T14:11:43.620000 @@ -241333,7 +241333,7 @@ CVE-2024-0110,0,0,9d3ea028d3dde672136c07e8d052ddc3ffee906b5f050cc97127e00fa31f77 CVE-2024-0111,0,0,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f20,2024-09-18T15:22:14.727000 CVE-2024-0113,0,0,30ea5d78769c707d77ab5e88a1087a3bf4be86e316909498095d743b94b19e08,2024-09-11T17:34:37.667000 CVE-2024-0115,0,0,90525cb6d1df6f268f81b58c98763d2a78ce3017a9779cdc04eec9f2dd2bca4d,2024-09-11T17:24:27.393000 -CVE-2024-0116,1,1,adad8d5a6569e5102a9d95bdf9068d17c8ef5bd5a7c84947191f2698e1d6ce25,2024-10-01T05:15:11.920000 +CVE-2024-0116,0,0,adad8d5a6569e5102a9d95bdf9068d17c8ef5bd5a7c84947191f2698e1d6ce25,2024-10-01T05:15:11.920000 CVE-2024-0132,0,0,eda7ee0edadef6ec9cb2c3493d33c997d2ed32b4a18322f4e48c77044ca64949,2024-09-26T13:32:02.803000 CVE-2024-0133,0,0,dc8118cfdd62bde027b0be10a4f284011d28edd78a66df58663a80962bbc8e67,2024-09-26T13:32:02.803000 CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000 @@ -244129,7 +244129,7 @@ CVE-2024-21483,0,0,ddfb5ce914fa1ff56560fa86379b92a602e5ea04b740e3571ddfa8961d666 CVE-2024-21484,0,0,170e730118f02f10a6e5229db7c5eef4d192db3745e0e44dbc53ab2277157f67,2024-03-06T14:15:47.533000 CVE-2024-21485,0,0,5dac3ea1a637c42101b33e62955da26f7c5ea3ebfcf697d6c5d1918b66c865e0,2024-03-06T14:15:47.760000 CVE-2024-21488,0,0,83c39f70c0498b72911f550d6611f69059c8c9cdf3b0f0904578cd793bad095a,2024-02-08T13:15:09.700000 -CVE-2024-21489,1,1,36540101f5fdf2d6688c984b415445d50b1e5b8b22bb291a69a3c690f733eaf0,2024-10-01T05:15:12.227000 +CVE-2024-21489,0,0,36540101f5fdf2d6688c984b415445d50b1e5b8b22bb291a69a3c690f733eaf0,2024-10-01T05:15:12.227000 CVE-2024-2149,0,0,63aa7f0d2a03697c39fae7a40d96338e0e86a5e57c9276eb9e14dee434e327b9,2024-05-17T02:38:04.480000 CVE-2024-21490,0,0,e17a653e77f03eb73e8c36ea364bdcd13a9ebc47ed80c4249ba6d2a59b83412c,2024-05-14T14:54:54.393000 CVE-2024-21491,0,0,1769048d774ec4b234c998b8669c71a35a58efdc743d738c18d816115ffbebfb,2024-03-06T14:15:48.020000 @@ -244174,7 +244174,7 @@ CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd CVE-2024-21528,0,0,20243e12426582c16920a0ab3a8036a5493484e122893e1731a0b03945a2d62b,2024-09-10T12:09:50.377000 CVE-2024-21529,0,0,664e585ecfec877dc16e4d09f63918fa2af81f0c56860c291a634c3448dac725,2024-09-11T16:26:11.920000 CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000 -CVE-2024-21531,1,1,2b9ed23aaafa91e39b01eff409d264c9c679eac5ddcacfd84b1a76246c79022e,2024-10-01T05:15:12.440000 +CVE-2024-21531,0,0,2b9ed23aaafa91e39b01eff409d264c9c679eac5ddcacfd84b1a76246c79022e,2024-10-01T05:15:12.440000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 @@ -257828,7 +257828,7 @@ CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc CVE-2024-41173,0,0,2a967ba5e095ab1e47f786a956c1f076df7830bb3f39a08c0b36771178149730,2024-09-12T14:52:20.820000 CVE-2024-41174,0,0,46f7512448f854e48ad9da184e7c8ef9b0c8ebf22c2d6d526796b00f1d907a8d,2024-09-12T14:33:54.917000 CVE-2024-41175,0,0,35e860a2d31eb21e3779e1686be69664a02d6ab1bab83d6168914f472f9b9f73,2024-09-12T14:25:10.307000 -CVE-2024-41176,0,0,9617663e2578b6f0fb4f568d478dd287853a4464c7fe3c6dcc4d7c2bd5bf268c,2024-09-12T14:26:00.527000 +CVE-2024-41176,0,1,54a27b7d242a59ee004d70d03c3c2f94f53556ca2727d85ff4c509bc25fb8e36,2024-10-01T07:15:03.147000 CVE-2024-41178,0,0,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000 CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000 CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b249634fe,2024-08-02T05:15:47.217000 @@ -259157,12 +259157,12 @@ CVE-2024-43385,0,0,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096 CVE-2024-43386,0,0,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000 CVE-2024-43387,0,0,4ccf94a52793dd24dc0376add620cfdf8d8ec8b86efb2e3a9e2719aaace5a025,2024-09-27T19:33:37.497000 CVE-2024-43388,0,0,3a919f125f0d033e58d76594811e5e9eda62fdacecf5b54a65461d36b7a50c81,2024-09-27T19:32:48.683000 -CVE-2024-43389,0,0,3f9f9cdc5886b7ecf33bb8f06aa9b373429577236913585bc5184f4c4e9d7283,2024-09-27T19:36:56.583000 +CVE-2024-43389,0,1,40bac5f42e49b4f928d773122acf92c0e227abcdb9ce9d6f6ecf3322182450ec,2024-10-01T07:15:03.560000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 -CVE-2024-43390,0,0,23109d4525f6a9ca75d5d95186487af542b1184dea674403bc4a04a2882d389c,2024-09-27T19:37:28.887000 -CVE-2024-43391,0,0,e1b273922d974fb29084f2b4521133382c186185b99241fb223dbcc2186fc12f,2024-09-27T19:38:10.193000 -CVE-2024-43392,0,0,7a4ce8d1a077129e5a7ed7aa98f6ebb17ef4e5a287579f03daecd5e4e224d1cc,2024-09-27T19:04:26.060000 -CVE-2024-43393,0,0,9baf436015d55676fde0405cfe036d7154d0537886ad51cff547297f2e54588a,2024-09-27T19:36:03.473000 +CVE-2024-43390,0,1,8d9acab4763dee913e02b982e6f2e7c4da6de627398ae2e58565c91696ad6dfd,2024-10-01T07:15:04.083000 +CVE-2024-43391,0,1,beb52d75af1ca2e051422364b0d066ee98e8e66a0e2a2826f84a624a57c5d1aa,2024-10-01T07:15:04.530000 +CVE-2024-43392,0,1,9eb1651e4862013b9015d62a0d55c31a661dc5148edd61e3e284f4dd02058e4c,2024-10-01T07:15:04.953000 +CVE-2024-43393,0,1,0b4e4752b1d1624f63c9f36234acbde90cd0d47d6abeb2bcd5368b0a996ac98c,2024-10-01T07:15:05.443000 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 CVE-2024-43396,0,0,d3e4db1d56053a512790a84d8c3ae6e21035877ac8c09fe39077f7231484b09e,2024-09-03T18:19:33.167000 CVE-2024-43397,0,0,5caa94926889523c153ff1aaf47669fe6c71771da877710063b3b97c2bc5d0dc,2024-08-26T18:28:42.230000 @@ -260811,7 +260811,7 @@ CVE-2024-47291,0,0,95f4f6d1ad76b75958b53fcce48efd4386245ae4c1203fa615a86bf26d91d CVE-2024-47292,0,0,e7af822d5ebdcd8e266086596c1d2c3d8ab220c35b937e696621c6b982bac2e4,2024-09-30T12:46:20.237000 CVE-2024-47293,0,0,cb8f6e82d7a55b0155c705860639b79c929e16ad9c10eac6bded35a62d320076,2024-09-30T12:45:57.823000 CVE-2024-47294,0,0,d823222cf57129592969fc1ba04ff680133708feacea1954e2fba7743e757725,2024-09-30T12:45:57.823000 -CVE-2024-47295,1,1,fc2c7723286135cf9c4302efebfdeae1376748d245471dd70807e3f62d382cbe,2024-10-01T04:15:18.040000 +CVE-2024-47295,0,0,fc2c7723286135cf9c4302efebfdeae1376748d245471dd70807e3f62d382cbe,2024-10-01T04:15:18.040000 CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392ab,2024-06-12T20:15:13.300000 CVE-2024-47303,0,0,4fd81bf971579cf0e00271b5e072c908021bfefdc76c11f84286ad7788e9cb34,2024-09-26T13:32:02.803000 CVE-2024-47305,0,0,2c8f799a296592421ee25aa9899e311f2f61ad0eb53c72b4da9231822f1148ec,2024-09-26T13:32:02.803000 @@ -262648,7 +262648,7 @@ CVE-2024-6870,0,0,b8787438d65804a2db5bbc8c04084c34ae58bc1819956a7afefdca8ed2b919 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000 CVE-2024-6874,0,0,805a0b27cbdf811d96209b292e2d5909e967f9d3161226db1f6fe45d6b995555,2024-09-10T15:27:04.190000 -CVE-2024-6876,0,0,f75ef9aba10c8c45da91c570a10f8093fa6d41f207da37c278bee0fbd46d3378,2024-09-23T16:45:04.717000 +CVE-2024-6876,0,1,583f30283a5d24592d6b6307c031cb111ef10b29cd5778033f08bcc8e7270d88,2024-10-01T07:15:05.890000 CVE-2024-6877,0,0,02c2ad8b7328ed9f86319b9c0a10ec2b70408d6e2f96471b9aea8deebf9f2ed4,2024-09-25T18:57:54.607000 CVE-2024-6878,0,0,f5582059b5d1bf17731a698db689103b20b34785921cd291277cac7bea80d487,2024-09-20T12:30:17.483000 CVE-2024-6879,0,0,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000 @@ -263064,7 +263064,7 @@ CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861 CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f45c,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 -CVE-2024-7409,0,1,e344117b22347370b6959672db9a2532903deb2c5b89a1ea7048d8db1b77db2d,2024-10-01T05:15:12.650000 +CVE-2024-7409,0,0,e344117b22347370b6959672db9a2532903deb2c5b89a1ea7048d8db1b77db2d,2024-10-01T05:15:12.650000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e3271d,2024-08-15T13:01:10.150000 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 @@ -263573,6 +263573,7 @@ CVE-2024-8103,0,0,77d380cca7da7a9ea520d1266aaf7f8f8fa25bf0cd8d701002339aafa2f0f3 CVE-2024-8104,0,0,e0dd7af2b8170ad0cb122178cc67d0512cc1eb1562d671a3c4e0173a78c8b550,2024-09-05T13:28:06.817000 CVE-2024-8105,0,0,fdab1a8bdde46d997c9a9800b483d676df23e449425d94531660960b3c42e376,2024-09-09T21:35:17.320000 CVE-2024-8106,0,0,918839130e1d38968c976a0bfdbedb93d4d38744e55b3c51d6882ceb90663b73,2024-09-05T13:05:52.540000 +CVE-2024-8107,1,1,788b47747c80bea0b0fc54cf26df2214d345b7e328d1fbd193f93f6f4f832fad,2024-10-01T07:15:06.263000 CVE-2024-8108,0,0,8f1cde3e4e080de95c0957ccbabc0a49f644f40a04612484228affb54375e534,2024-09-19T13:37:32.203000 CVE-2024-8110,0,0,35b29aa278bc186f939dacbb87981e7b3283cd41ccc0818c634be4d5c87818aa,2024-09-20T12:31:20.110000 CVE-2024-8112,0,0,68d19c324dfb08f42fbaae63f6c41217ad9d464e632ed1f450780261e0cb818a,2024-09-12T18:23:22.507000 @@ -263788,6 +263789,7 @@ CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30 CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb8417,2024-09-06T16:38:44.053000 CVE-2024-8417,0,0,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000 CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000 +CVE-2024-8421,1,1,baa012ceabfe4a98c027974c6cb50310b5e1c6dd28d23e9e37c50e0d90a41b43,2024-10-01T06:15:02.357000 CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000 CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000 @@ -263798,7 +263800,7 @@ CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae5 CVE-2024-8440,0,0,8dcfa58740a8b45172e18897b2d796d55a68f35b9034374864c3da0c6b77c079,2024-09-25T19:34:19.683000 CVE-2024-8441,0,0,0efac0f95475c5b753f85a6e07784bad0c26116c06bdd47c81e7d9e5f2143687,2024-09-12T21:53:43.387000 CVE-2024-8443,0,0,3c60ad7b83386f919c8526ae161201f0c09636191f73ee0cc137a0cb5f793af8,2024-09-26T14:34:03.157000 -CVE-2024-8445,0,0,27d6183cbf221ef18e3639e3533cc8ca212a51b0f7239a93c253eea652cb910f,2024-09-05T17:44:56.007000 +CVE-2024-8445,0,1,a7f7ba812fc058686a7ce9617c544a5ef0aa1db28a47ee616a0e4041709a6c78,2024-10-01T06:15:02.650000 CVE-2024-8448,0,0,a5ecbda13e54e62f08aad0fb96b46ee6676b77e076cfa11ddb79678d5c149797,2024-09-30T12:45:57.823000 CVE-2024-8449,0,0,abd472db671ae2c583e74e98c342c94b8a5a9f987684dd21bb2b434bdad834ec,2024-09-30T12:45:57.823000 CVE-2024-8450,0,0,2f10ea74f337b4e5e3d54aecde245c4e719ad338c5a035141a0dccc4aed1fbcf,2024-09-30T12:45:57.823000