Auto-Update: 2024-10-14T18:00:18.159658+00:00

This commit is contained in:
cad-safe-bot 2024-10-14 18:03:18 +00:00
parent 403cc85267
commit 59953b0434
28 changed files with 1199 additions and 71 deletions

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2023-50780",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-14T16:15:03.477",
"lastModified": "2024-10-14T16:15:03.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.\n\n\nUsers are recommended to upgrade to version 2.29.0 or later, which fixes the issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/63b78shqz312phsx7v1ryr7jv7bprg58",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-41997",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T16:15:03.640",
"lastModified": "2024-10-14T16:15:03.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.warp.dev/features/integrations-and-plugins#docker",
"source": "cve@mitre.org"
},
{
"url": "https://docs.warp.dev/getting-started/changelog#id-2024.07.18-v0.2024.07.16.08.02",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/bhyh/d1ee7a825fce283bf8acbdb42c8a7832",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/warpdotdev/warp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45731",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:11.177",
"lastModified": "2024-10-14T17:15:11.177",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45732",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:11.410",
"lastModified": "2024-10-14T17:15:11.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could run a search as the \"nobody\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45733",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:11.657",
"lastModified": "2024-10-14T17:15:11.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1003",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45734",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:11.850",
"lastModified": "2024-10-14T17:15:11.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1004",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/7464e2dc-98a5-4af9-87a1-fa6d5a256fa6/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45735",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.053",
"lastModified": "2024-10-14T17:15:12.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1005",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/0a3d6035-7bef-4dfa-b01e-84349edac3b4/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45736",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.253",
"lastModified": "2024-10-14T17:15:12.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a search query with an improperly formatted \"INGEST_EVAL\" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1006",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/08978eca-caff-44c1-84dc-53f17def4e14/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45737",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.453",
"lastModified": "2024-10-14T17:15:12.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1007",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/34bac267-a89b-4bd7-a072-a48eef1f15b8/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45738",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.660",
"lastModified": "2024-10-14T17:15:12.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45739",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:12.860",
"lastModified": "2024-10-14T17:15:12.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45740",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:13.047",
"lastModified": "2024-10-14T17:15:13.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through Scheduled Views that could result in execution of unauthorized JavaScript code in the browser of a user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/d4f55f7c-6518-4122-a197-951fe0f21b25/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45741",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-10-14T17:15:13.250",
"lastModified": "2024-10-14T17:15:13.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could create a malicious payload through a custom configuration file that the \"api.uri\" parameter from the \"/manager/search/apps/local\" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46535",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T17:15:13.440",
"lastModified": "2024-10-14T17:15:13.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jepaas v7.2.8 was discovered to contain a SQL injection vulnerability via the orderSQL parameter at /homePortal/loadUserMsg."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/ketr/jepaas-release/issues/IAPJ8H?from=project-issue",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48150",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T16:15:03.750",
"lastModified": "2024-10-14T16:15:03.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_451208 function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/D-Link/DIR-820L/D-Link%20DIR-820L%20Stack%20Overflow%20Vulnerability.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48153",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T16:15:03.840",
"lastModified": "2024-10-14T16:15:03.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_subconfig function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/tw11ty/CVE/blob/main/DrayTek/Vigor3900/Vigor3900%20command%20execution%20vulnerability.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48168",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T17:15:13.520",
"lastModified": "2024-10-14T17:15:13.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/D-Link/DCS-960L/D-Link%20DCS-960L%201.09%20Stack%20overflow_1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48796",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T17:15:13.610",
"lastModified": "2024-10-14T17:15:13.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in EQUES com.eques.plug 1.0.1 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://www.eques.cn/?lang=en",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.eques.plug/com.eques.plug.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48797",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T17:15:13.690",
"lastModified": "2024-10-14T17:15:13.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in PCS Engineering Preston Cinema (com.prestoncinema.app) 0.2.0 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://www.pcsengineering.net/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.prestoncinema.app/com.prestoncinema.app.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48798",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T17:15:13.770",
"lastModified": "2024-10-14T17:15:13.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Hubble Connected (com.hubbleconnected.vervelife) 2.00.81 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.hubbleconnected.vervelife/com.hubbleconnected.vervelife.md",
"source": "cve@mitre.org"
},
{
"url": "https://hubbleconnected.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48799",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T17:15:13.857",
"lastModified": "2024-10-14T17:15:13.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in LOREX TECHNOLOGY INC com.lorexcorp.lorexping 1.4.22 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.lorexcorp.lorexping/com.lorexcorp.lorexping.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.lorex.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2024-6762",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-10-14T16:15:03.930",
"lastModified": "2024-10-14T16:15:03.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jetty PushSessionCacheFilter can be exploited by unauthenticated users \nto launch remote DoS attacks by exhausting the server\u2019s memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://github.com/jetty/jetty.project/pull/10755",
"source": "emo@eclipse.org"
},
{
"url": "https://github.com/jetty/jetty.project/pull/10756",
"source": "emo@eclipse.org"
},
{
"url": "https://github.com/jetty/jetty.project/pull/9715",
"source": "emo@eclipse.org"
},
{
"url": "https://github.com/jetty/jetty.project/pull/9716",
"source": "emo@eclipse.org"
},
{
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79",
"source": "emo@eclipse.org"
},
{
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/24",
"source": "emo@eclipse.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-6763",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-10-14T16:15:04.163",
"lastModified": "2024-10-14T16:15:04.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing.\n\nThe HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI\n differs from the common browsers in how it handles a URI that would be \nconsidered invalid if fully validated against the RRC. Specifically HttpURI\n and the browser may differ on the value of the host extracted from an \ninvalid URI and thus a combination of Jetty and a vulnerable browser may\n be vulnerable to a open redirect attack or to a SSRF attack if the URI \nis used after passing validation checks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1286"
}
]
}
],
"references": [
{
"url": "https://github.com/jetty/jetty.project/pull/12012",
"source": "emo@eclipse.org"
},
{
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-qh8g-58pp-2wxh",
"source": "emo@eclipse.org"
},
{
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/25",
"source": "emo@eclipse.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8184",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-10-14T16:15:04.380",
"lastModified": "2024-10-14T16:15:04.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://github.com/jetty/jetty.project/pull/11723",
"source": "emo@eclipse.org"
},
{
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq",
"source": "emo@eclipse.org"
},
{
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30",
"source": "emo@eclipse.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-9142",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-25T01:15:49.177",
"lastModified": "2024-09-26T13:32:02.803",
"lastModified": "2024-10-14T16:35:01.033",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -97,16 +97,6 @@
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-9823",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-10-14T15:15:14.560",
"lastModified": "2024-10-14T15:15:14.560",
"lastModified": "2024-10-14T16:15:04.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Description\nThere exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized\n\nusers to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests,\n\nattackers can trigger OutofMemory errors and exhaust the server's memory finally.\n\n\nVulnerability details\nThe Jetty DoSFilter (Denial of Service Filter) is a security filter designed to protect web\n\napplications against certain types of Denial of Service (DoS) attacks and other abusive behavior. It\n\nhelps to mitigate excessive resource consumption by limiting the rate at which clients can make\n\nrequests to the server. The DoSFilter monitors and tracks client request patterns, including\n\nrequest rates, and can take actions such as blocking or delaying requests from clients that exceed\n\npredefined thresholds. The internal tracking of requests in DoSFilter is the source of this OutOfMemory\n\ncondition.\n\n\nImpact\nUsers of the DoSFilter may be subject to DoS attacks that \nwill ultimately exhaust the memory of the server if they have not \nconfigured session passivation or an aggressive session inactivation \ntimeout.\n\n\nPatches\nThe DoSFilter has been patched in all active releases to no longer support the session tracking mode, even if configured.\n\n\nPatched releases:\n\n\n\n * 9.4.54\n\n * 10.0.18\n\n * 11.0.18\n\n * 12.0.3"
"value": "There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-14T16:00:22.294274+00:00
2024-10-14T18:00:18.159658+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-14T15:15:14.560000+00:00
2024-10-14T17:15:13.857000+00:00
```
### Last Data Feed Release
@ -33,45 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265485
265509
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `24`
- [CVE-2024-40616](CVE-2024/CVE-2024-406xx/CVE-2024-40616.json) (`2024-10-14T15:15:13.407`)
- [CVE-2024-48119](CVE-2024/CVE-2024-481xx/CVE-2024-48119.json) (`2024-10-14T14:15:11.597`)
- [CVE-2024-48120](CVE-2024/CVE-2024-481xx/CVE-2024-48120.json) (`2024-10-14T14:15:11.780`)
- [CVE-2024-48249](CVE-2024/CVE-2024-482xx/CVE-2024-48249.json) (`2024-10-14T15:15:13.760`)
- [CVE-2024-48251](CVE-2024/CVE-2024-482xx/CVE-2024-48251.json) (`2024-10-14T15:15:13.857`)
- [CVE-2024-48253](CVE-2024/CVE-2024-482xx/CVE-2024-48253.json) (`2024-10-14T14:15:11.857`)
- [CVE-2024-48255](CVE-2024/CVE-2024-482xx/CVE-2024-48255.json) (`2024-10-14T14:15:11.937`)
- [CVE-2024-48257](CVE-2024/CVE-2024-482xx/CVE-2024-48257.json) (`2024-10-14T15:15:13.947`)
- [CVE-2024-48259](CVE-2024/CVE-2024-482xx/CVE-2024-48259.json) (`2024-10-14T15:15:14.033`)
- [CVE-2024-48261](CVE-2024/CVE-2024-482xx/CVE-2024-48261.json) (`2024-10-14T15:15:14.130`)
- [CVE-2024-7847](CVE-2024/CVE-2024-78xx/CVE-2024-7847.json) (`2024-10-14T14:15:12.020`)
- [CVE-2024-8602](CVE-2024/CVE-2024-86xx/CVE-2024-8602.json) (`2024-10-14T14:15:12.400`)
- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-14T15:15:14.560`)
- [CVE-2024-9936](CVE-2024/CVE-2024-99xx/CVE-2024-9936.json) (`2024-10-14T14:15:12.553`)
- [CVE-2023-50780](CVE-2023/CVE-2023-507xx/CVE-2023-50780.json) (`2024-10-14T16:15:03.477`)
- [CVE-2024-41997](CVE-2024/CVE-2024-419xx/CVE-2024-41997.json) (`2024-10-14T16:15:03.640`)
- [CVE-2024-45731](CVE-2024/CVE-2024-457xx/CVE-2024-45731.json) (`2024-10-14T17:15:11.177`)
- [CVE-2024-45732](CVE-2024/CVE-2024-457xx/CVE-2024-45732.json) (`2024-10-14T17:15:11.410`)
- [CVE-2024-45733](CVE-2024/CVE-2024-457xx/CVE-2024-45733.json) (`2024-10-14T17:15:11.657`)
- [CVE-2024-45734](CVE-2024/CVE-2024-457xx/CVE-2024-45734.json) (`2024-10-14T17:15:11.850`)
- [CVE-2024-45735](CVE-2024/CVE-2024-457xx/CVE-2024-45735.json) (`2024-10-14T17:15:12.053`)
- [CVE-2024-45736](CVE-2024/CVE-2024-457xx/CVE-2024-45736.json) (`2024-10-14T17:15:12.253`)
- [CVE-2024-45737](CVE-2024/CVE-2024-457xx/CVE-2024-45737.json) (`2024-10-14T17:15:12.453`)
- [CVE-2024-45738](CVE-2024/CVE-2024-457xx/CVE-2024-45738.json) (`2024-10-14T17:15:12.660`)
- [CVE-2024-45739](CVE-2024/CVE-2024-457xx/CVE-2024-45739.json) (`2024-10-14T17:15:12.860`)
- [CVE-2024-45740](CVE-2024/CVE-2024-457xx/CVE-2024-45740.json) (`2024-10-14T17:15:13.047`)
- [CVE-2024-45741](CVE-2024/CVE-2024-457xx/CVE-2024-45741.json) (`2024-10-14T17:15:13.250`)
- [CVE-2024-46535](CVE-2024/CVE-2024-465xx/CVE-2024-46535.json) (`2024-10-14T17:15:13.440`)
- [CVE-2024-48150](CVE-2024/CVE-2024-481xx/CVE-2024-48150.json) (`2024-10-14T16:15:03.750`)
- [CVE-2024-48153](CVE-2024/CVE-2024-481xx/CVE-2024-48153.json) (`2024-10-14T16:15:03.840`)
- [CVE-2024-48168](CVE-2024/CVE-2024-481xx/CVE-2024-48168.json) (`2024-10-14T17:15:13.520`)
- [CVE-2024-48796](CVE-2024/CVE-2024-487xx/CVE-2024-48796.json) (`2024-10-14T17:15:13.610`)
- [CVE-2024-48797](CVE-2024/CVE-2024-487xx/CVE-2024-48797.json) (`2024-10-14T17:15:13.690`)
- [CVE-2024-48798](CVE-2024/CVE-2024-487xx/CVE-2024-48798.json) (`2024-10-14T17:15:13.770`)
- [CVE-2024-48799](CVE-2024/CVE-2024-487xx/CVE-2024-48799.json) (`2024-10-14T17:15:13.857`)
- [CVE-2024-6762](CVE-2024/CVE-2024-67xx/CVE-2024-6762.json) (`2024-10-14T16:15:03.930`)
- [CVE-2024-6763](CVE-2024/CVE-2024-67xx/CVE-2024-6763.json) (`2024-10-14T16:15:04.163`)
- [CVE-2024-8184](CVE-2024/CVE-2024-81xx/CVE-2024-8184.json) (`2024-10-14T16:15:04.380`)
### CVEs modified in the last Commit
Recently modified CVEs: `12`
Recently modified CVEs: `2`
- [CVE-2023-2975](CVE-2023/CVE-2023-29xx/CVE-2023-2975.json) (`2024-10-14T15:15:11.457`)
- [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2024-10-14T15:15:11.730`)
- [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2024-10-14T15:15:11.930`)
- [CVE-2023-4807](CVE-2023/CVE-2023-48xx/CVE-2023-4807.json) (`2024-10-14T15:15:12.213`)
- [CVE-2023-5363](CVE-2023/CVE-2023-53xx/CVE-2023-5363.json) (`2024-10-14T15:15:12.407`)
- [CVE-2023-5678](CVE-2023/CVE-2023-56xx/CVE-2023-5678.json) (`2024-10-14T15:15:12.603`)
- [CVE-2023-6129](CVE-2023/CVE-2023-61xx/CVE-2023-6129.json) (`2024-10-14T15:15:12.800`)
- [CVE-2023-6237](CVE-2023/CVE-2023-62xx/CVE-2023-6237.json) (`2024-10-14T15:15:12.997`)
- [CVE-2024-0727](CVE-2024/CVE-2024-07xx/CVE-2024-0727.json) (`2024-10-14T15:15:13.100`)
- [CVE-2024-2511](CVE-2024/CVE-2024-25xx/CVE-2024-2511.json) (`2024-10-14T15:15:13.270`)
- [CVE-2024-4603](CVE-2024/CVE-2024-46xx/CVE-2024-4603.json) (`2024-10-14T15:15:14.210`)
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-10-14T15:15:14.373`)
- [CVE-2024-9142](CVE-2024/CVE-2024-91xx/CVE-2024-9142.json) (`2024-10-14T16:35:01.033`)
- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-14T16:15:04.653`)
## Download and Usage

View File

@ -222565,7 +222565,7 @@ CVE-2023-29746,0,0,4de2b2e1305924b83c2f864294adaef5a320dbbbfd2e0c4da9812d2544c38
CVE-2023-29747,0,0,9eb43ea7631dd1e4b72ec6b22803484683cd26588e6859d3a4f9cd0a7cf5a6ed,2023-06-07T14:34:15.043000
CVE-2023-29748,0,0,de4aac23f053152fc00e340c98d6ef168d487dd2c8d8003060d7aad38f43275c,2023-06-07T16:08:01.943000
CVE-2023-29749,0,0,97c0ea052991d778178ffbad7d226f9a754724a6367429fd69f50e01a82beb12,2023-06-16T15:54:20.677000
CVE-2023-2975,0,1,8c5ed1759a3f8bfe3996639c97b804b8ef7fd355e0ee87f009fefc1b3d8957ed,2024-10-14T15:15:11.457000
CVE-2023-2975,0,0,8c5ed1759a3f8bfe3996639c97b804b8ef7fd355e0ee87f009fefc1b3d8957ed,2024-10-14T15:15:11.457000
CVE-2023-29751,0,0,2461bc5a3a2fd89feadf65a8858f15921fea97751e88880207b87de2fec932ad,2023-06-16T16:35:22.790000
CVE-2023-29752,0,0,8e9fbd10ad7a80dafba43e1fcf07712781b98eb8ef62f0c41f7fa00e468ec7e1,2023-06-16T16:38:14.027000
CVE-2023-29753,0,0,04743f0174dcc0b866fcd193b2c619f349964a63f6cc96d6eccf0198e8d578ca,2023-06-16T16:35:10.903000
@ -226191,7 +226191,7 @@ CVE-2023-34455,0,0,20040caee8f9363f09b63fa89c3b13f7d06bec6ac095c1a41354e281696ca
CVE-2023-34457,0,0,c984e4ca565e6e7772b40b5b931c9cee513dae66b761babd02d4d82b3876b73f,2023-08-03T15:15:24.573000
CVE-2023-34458,0,0,1972c79044b76b052e72e6e7d49a0030a5132a71fda0031caa56e56d48f8db72,2023-07-25T18:52:55.960000
CVE-2023-34459,0,0,1661a6473de1a29629a1bc4d0bf8830bb82de99c243e642b96397442324d4635,2023-06-26T18:50:28.553000
CVE-2023-3446,0,1,ef8f33ae332c554f794b1043b102758d30449855c76b3307b3ba2d934d2e2738,2024-10-14T15:15:11.730000
CVE-2023-3446,0,0,ef8f33ae332c554f794b1043b102758d30449855c76b3307b3ba2d934d2e2738,2024-10-14T15:15:11.730000
CVE-2023-34460,0,0,0487d7dc044cb6636be002c9646a7eb4bcbc917660ecd20c81d1e1d439ae04fe,2023-07-05T16:13:13.693000
CVE-2023-34461,0,0,896acc05f1b2c77debce320c87f3a38c1be4e4a6a060c825bff0740c26dcbad2,2023-06-27T17:09:46.680000
CVE-2023-34462,0,0,422a6937f1889a953f13ffdd3ac264e38fa42481cd06cc10e5413836428406f4,2024-06-21T19:15:27.163000
@ -228766,7 +228766,7 @@ CVE-2023-38164,0,0,c75b441218c78eeeccc06b658080d2048b20d7dd914d45a9a762a2cc2e592
CVE-2023-38166,0,0,ec6db0f2c90b9a921c6e3d9dd66068fad15beb1f5bafe3cd770a908408705560,2024-05-29T02:16:27.720000
CVE-2023-38167,0,0,14fed7f47e692fcb5ef19b09920f17f6a8dd5207ad0171b7e71ba31daa66dc66,2024-05-29T02:16:27.953000
CVE-2023-38169,0,0,378fcd3dbcd1e5c72566352be29a70588185b5aaa4494f0fa99a7982c0eeb575,2024-05-29T02:16:28.170000
CVE-2023-3817,0,1,a08e5c61304fb5cac0fe57b7315dfa8930e089db523625cb31a230119ce7571c,2024-10-14T15:15:11.930000
CVE-2023-3817,0,0,a08e5c61304fb5cac0fe57b7315dfa8930e089db523625cb31a230119ce7571c,2024-10-14T15:15:11.930000
CVE-2023-38170,0,0,356aa6c6a4d22d05cdfe4df2b95a9403d364c230ec6550477c3569062517b42d,2024-05-29T02:16:28.293000
CVE-2023-38171,0,0,ee891f4e4709808afde7920b8591f11e8f6acb1ab3065f0211396b20ab5d2869,2024-05-29T02:16:28.403000
CVE-2023-38172,0,0,d3c568e41b16a7d41483c64374a5ac61b2d649c710fc60ed4d48400ab6dda974,2024-05-29T02:16:28.530000
@ -235900,7 +235900,7 @@ CVE-2023-4806,0,0,169c709c7fcce2a813cb83fb6cce3554d64b2c509e52376f27f98faea6ca74
CVE-2023-48060,0,0,fea1d282cced2562e6c31897934f5482f80df5de60fcee98c3efce46bed4f5cd,2024-09-03T19:35:07.643000
CVE-2023-48063,0,0,ea9189f47de248a9b67965af3b522898bbda97ce156221191808cdec464e23d4,2023-11-16T17:35:21.507000
CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09c13,2023-11-16T17:35:37.623000
CVE-2023-4807,0,1,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
CVE-2023-4807,0,0,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000
CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000
CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000
@ -237793,6 +237793,7 @@ CVE-2023-50777,0,0,df0d9de6b8a0baaf3efff27900ebb62bf75a216074a2617fe71f734fe044c
CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edbd60,2023-12-18T19:10:26.547000
CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000
CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000
CVE-2023-50780,1,1,997ce97484e991ac4325541ba8de0cd441dbe9708d3ca1f82502bec6f09a06cf,2024-10-14T16:15:03.477000
CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000
CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000
CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000
@ -239544,7 +239545,7 @@ CVE-2023-5358,0,0,3843b7eb2b83630439823339cd1e7c1ebb5c2bfad1a924657ec37661bd127a
CVE-2023-5359,0,0,cd93a1d7d146b91e639cade66b248b7feb66dbcb22fb36eaf6547dbca671eace,2024-09-30T14:19:15.970000
CVE-2023-5360,0,0,23416f23056cf7d0eaf89d196ff3012aba1f2266b06af6861779d6d467ce1803,2023-11-29T15:15:10.100000
CVE-2023-5362,0,0,80b923a43138bfee55c8b364d2d98e107b276de0395018a0792e2ca94e3f39da,2023-11-13T14:47:34.907000
CVE-2023-5363,0,1,32ed94009f7d7a0175ed9bbcf2376d54f9be36a8ef12ee3c789d732aa98c0273,2024-10-14T15:15:12.407000
CVE-2023-5363,0,0,32ed94009f7d7a0175ed9bbcf2376d54f9be36a8ef12ee3c789d732aa98c0273,2024-10-14T15:15:12.407000
CVE-2023-5365,0,0,a3d6abcc6553631f878844970226a67093bba6db11761fa7e287a38223bd4a0f,2024-09-19T15:35:08.273000
CVE-2023-5366,0,0,549d2b06c12957ddad6fd9e09c667fc61e212290cbc78d274e985fd10c51fd9b,2024-03-23T03:15:10.327000
CVE-2023-5367,0,0,ece93636181bbf6ef1a4f8c67dc0564beafd1659cfc2a57970f0c60be3279f64,2024-09-16T16:15:08.640000
@ -239833,7 +239834,7 @@ CVE-2023-5674,0,0,ad6a524623973b785443ed5ef1d7ce3fc434ea992e37165634367ac391476b
CVE-2023-5675,0,0,26d656fccd5c8593a8d4a9ed8d70f37dec8e8fe19baf58f5aece6460feff10db,2024-08-01T13:45:45.357000
CVE-2023-5676,0,0,a627ea7bf88ea5b6dccb528b94589245e9f9ba331b8e03892a33208a41506408,2023-11-22T22:39:25.137000
CVE-2023-5677,0,0,08b2893d4601209dee22cd4c45290e5831a26efa6eeca1fc36aea8ab189442dc,2024-02-13T00:38:00.893000
CVE-2023-5678,0,1,20fd1e9f5bec6f0da539cc18e171e3a9021c1db788460fc8978c0d9abde4744d,2024-10-14T15:15:12.603000
CVE-2023-5678,0,0,20fd1e9f5bec6f0da539cc18e171e3a9021c1db788460fc8978c0d9abde4744d,2024-10-14T15:15:12.603000
CVE-2023-5679,0,0,4960f652ee6c5b1a46e7d7d2a06407e27c0c64465787d874631b65221eda9309,2024-04-26T09:15:08.843000
CVE-2023-5680,0,0,8cff3e083f7c7bd084b842f852f743395da779c5a8fed0ab54ee3dfa1f5214a1,2024-05-03T13:15:21.093000
CVE-2023-5681,0,0,d7491800836d2388e22440d68a862dd278a82c18bac217a1d7b7b5fd9c059522,2024-05-17T02:33:13.287000
@ -240254,7 +240255,7 @@ CVE-2023-6125,0,0,6680cb2510eb0946111f3e49e52187e7e4686cd04eee3143a65deb0d92b21d
CVE-2023-6126,0,0,fd71edfc64e634c33eecaba889690a462253fd022c13eade6ebce93fb6ac3be0,2023-11-17T17:59:32.487000
CVE-2023-6127,0,0,dd56a9c0eb24ea5efe54939a8e05dcbc5546629a3a54fa1faf2ac7228395f184,2023-11-17T17:58:50.183000
CVE-2023-6128,0,0,8286b6f56ff713bb258e67fc6a050b0a6ddfab13c3281cce30702591390dc377,2023-11-17T17:46:55.197000
CVE-2023-6129,0,1,e16c8ea14afe5d997525e465c6bd7fde97ac937191b20df5c050420596b15dd9,2024-10-14T15:15:12.800000
CVE-2023-6129,0,0,e16c8ea14afe5d997525e465c6bd7fde97ac937191b20df5c050420596b15dd9,2024-10-14T15:15:12.800000
CVE-2023-6130,0,0,2818ee43655844efe6fed8882b910732845b519dfa1dbf502beef737f2e76f99,2023-11-17T21:28:58.080000
CVE-2023-6131,0,0,889a910bd1ac71ecfab90c405c0d8acaa1783fa5493cd17ac2acae757227003a,2023-11-17T21:28:31.490000
CVE-2023-6132,0,0,94bf0b300c60cba1ebf0a1af45abf44572088b1a37ffefc21172e6ef88b3b437,2024-03-01T14:04:26.010000
@ -240346,7 +240347,7 @@ CVE-2023-6233,0,0,e3aaa68b264dc91d419a318d56a374d994d572e57fedadcdf71ff52189d71e
CVE-2023-6234,0,0,5e47c089c57aa5a25b883980b84d44dc18ef3c76841351a6420b2de979b06550,2024-02-13T19:51:46.740000
CVE-2023-6235,0,0,65e74a86f5bbff8d25e3efc268e4bb50210ad04b2f747cf0c9a224be0818ee6c,2023-11-29T16:59:51.970000
CVE-2023-6236,0,0,bfa67257c2a3ffd7b3d06b564fb26217261866326487bc912cbff8bf3f4202d7,2024-06-18T13:15:51.123000
CVE-2023-6237,0,1,b4bc23e4eec08626993d6bd4b0ae8a847710940a5c6135d4b515a1f508c35ad0,2024-10-14T15:15:12.997000
CVE-2023-6237,0,0,b4bc23e4eec08626993d6bd4b0ae8a847710940a5c6135d4b515a1f508c35ad0,2024-10-14T15:15:12.997000
CVE-2023-6238,0,0,2e211fe01ee8c7e57afdef0930b8f1bc5c09293054105dbd159c8f8857f29757,2024-02-07T00:15:55.240000
CVE-2023-6239,0,0,b65e4e0202f8c904d3bed9c0b298036f60e92b6b3988771b4545deac730dcf4b,2024-08-28T09:15:10.550000
CVE-2023-6240,0,0,9a8f126fd8f5ef282af06e27627122b943a8da0b0302096eb47cb5d50f4fd387,2024-09-14T00:15:12.483000
@ -241890,7 +241891,7 @@ CVE-2024-0722,0,0,e3fd857d56c3e7a1ce18df94c2aad06d8e5ba0ba6f59fdbc875af0baef84e5
CVE-2024-0723,0,0,62b3b8158ed5f431f7c823843250dde65bc6b046016f1d806e5bf4a77c554601,2024-05-17T02:34:54.417000
CVE-2024-0725,0,0,9f34bbeb9ca65e262b0f114d97475b4588551a2e0d6e1b478b0fe96d6457c471,2024-05-17T02:34:54.540000
CVE-2024-0726,0,0,614c484a417a79563637bf6c4e4842b2936b34d19e28c25bc06b3ee24570d0f3,2024-05-17T02:34:54.650000
CVE-2024-0727,0,1,029a496ed427073edc27553aecd27066148acfe7af4675f627eb209fc5b1daaa,2024-10-14T15:15:13.100000
CVE-2024-0727,0,0,029a496ed427073edc27553aecd27066148acfe7af4675f627eb209fc5b1daaa,2024-10-14T15:15:13.100000
CVE-2024-0728,0,0,8e86daecc5b7cf2cd88ed5152fb6a2af57ca1a3f0df02f0db63414ebf20cd037,2024-05-17T02:34:54.780000
CVE-2024-0729,0,0,35aad4ab490381a796d82e9abc9a3e9bab04093ac6b38aa110e0a6401a78c4c6,2024-05-17T02:34:54.887000
CVE-2024-0730,0,0,864087475952c894903074292e7d5d73331f2529c20d6e97f634c7504eb2ebd5,2024-05-17T02:34:55.003000
@ -246647,7 +246648,7 @@ CVE-2024-25106,0,0,69f4a5df8f9163ba3cc00a57d78f06705015dcf6a2341378521404b16f38f
CVE-2024-25107,0,0,2f7af5f36b252a42eb30d1f8972da5732bf420e322522d60adcccf7f4819b86a,2024-02-15T18:52:25.613000
CVE-2024-25108,0,0,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e96b,2024-09-05T13:18:39.687000
CVE-2024-2511,0,1,25ba3d5dec8dfd6cf26bc268a14176944084d3a63c61f96c81b75524a5331e44,2024-10-14T15:15:13.270000
CVE-2024-2511,0,0,25ba3d5dec8dfd6cf26bc268a14176944084d3a63c61f96c81b75524a5331e44,2024-10-14T15:15:13.270000
CVE-2024-25110,0,0,d26cbb0693a4d6c53e7081518beb8a84b92d2cd8bf57244ea03bf261dee5ab3f,2024-10-11T21:55:24.837000
CVE-2024-25111,0,0,260c08f765b0b23211db8fb3020f7ae46891432e3f36f885aebdb89bc620ed80,2024-06-10T18:15:27.443000
CVE-2024-25112,0,0,62d81a6835c854cf3f1a6117c1e57e73e656e5f510894e971df29562320bde94,2024-02-13T14:01:40.577000
@ -257574,7 +257575,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d
CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000
CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000
CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000
CVE-2024-40616,1,1,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000
CVE-2024-40616,0,0,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000
CVE-2024-40617,0,0,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
CVE-2024-40619,0,0,71752a5fbb09ad3b98ad49ccde5e7b24e7278b9eb9f9bc361b3decfc42effc78,2024-08-15T13:01:10.150000
@ -258494,6 +258495,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913
CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000
CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000
CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000
CVE-2024-41997,1,1,feb93180957d926c3a2515af9caa2596a5a805e498da40f2eabee214b9d19034,2024-10-14T16:15:03.640000
CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
@ -260698,7 +260700,18 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
CVE-2024-45731,1,1,64f3b076e1ba73dffdf0c460512babb747cd809745bbab294692b67d6edcedab,2024-10-14T17:15:11.177000
CVE-2024-45732,1,1,4e5072a835dfaa21d6aa1c1f6e7186ca3a2566f20a3b2446f1311cd0df57600a,2024-10-14T17:15:11.410000
CVE-2024-45733,1,1,26b12148a3d1f105c07f5ec4d630a2627962ac0992e8874fa66efb919b028102,2024-10-14T17:15:11.657000
CVE-2024-45734,1,1,60f6ad0bd39b15a28edbbec8142bfd65f3dd6893675910d2f5a63b73b1510f5b,2024-10-14T17:15:11.850000
CVE-2024-45735,1,1,d1f5a904ff4ce2124f50a1bcd5480da3acc1d59dfb44c552ef8762f57a0c1d19,2024-10-14T17:15:12.053000
CVE-2024-45736,1,1,f78c0cba5a890982b2563a6304d5814ab3232334c5657217d2788ee254c5ee03,2024-10-14T17:15:12.253000
CVE-2024-45737,1,1,6f1419b68d8eca19f450336f3fec46602dda1e328d1cee2a20bb0db8b44f3328,2024-10-14T17:15:12.453000
CVE-2024-45738,1,1,5d1da984cf863288c52eaff3ff6108b50ab539a8a304723020a2fd2eac1740c7,2024-10-14T17:15:12.660000
CVE-2024-45739,1,1,01a43068fb72c181b3efa5733fc8e8be54627ae8a8ac05fdef7e7315f4ba75ed,2024-10-14T17:15:12.860000
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
CVE-2024-45740,1,1,9d225636a0ff30313e82d40744acf0f9d64b6da60e9d3a775ea47d422a68fd76,2024-10-14T17:15:13.047000
CVE-2024-45741,1,1,2446936f73030d260e2103cbcab9418fbd70c8e0a8e075e9a5a2ac2e64abaf06,2024-10-14T17:15:13.250000
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
CVE-2024-45746,0,0,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000
@ -260818,7 +260831,7 @@ CVE-2024-45999,0,0,af895c303825f0596a9091053cec8108aced826e7775d2d54abeebde71fb3
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000
CVE-2024-4603,0,1,9942bc7f0ee4df83c0037c4c5d6b42a7bde07b02fe0e655d3c99ab93c8488123,2024-10-14T15:15:14.210000
CVE-2024-4603,0,0,9942bc7f0ee4df83c0037c4c5d6b42a7bde07b02fe0e655d3c99ab93c8488123,2024-10-14T15:15:14.210000
CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000
CVE-2024-46040,0,0,f69112d5a1863fbd0caca1b0b2804dd2dfc1a731583d042e591bd5e81ca4008b,2024-10-07T17:47:48.410000
CVE-2024-46041,0,0,c02cff8dc91cfcfecb1fc716067f6a80d76cbf5a6025a1c04ea63ec71bb7758f,2024-10-07T20:35:09.113000
@ -260950,6 +260963,7 @@ CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
CVE-2024-46532,0,0,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
CVE-2024-46535,1,1,236faad90efb2cca4a33db405473a6420ce807a7b23b2f487d5ed937562d9418,2024-10-14T17:15:13.440000
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
@ -261769,13 +261783,16 @@ CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020e
CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000
CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000
CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000
CVE-2024-48119,1,1,5a61747aca6c21835c2f6c3a203be63c2093664c3f6f566c13d1fe431a2fd5d0,2024-10-14T14:15:11.597000
CVE-2024-48119,0,0,5a61747aca6c21835c2f6c3a203be63c2093664c3f6f566c13d1fe431a2fd5d0,2024-10-14T14:15:11.597000
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
CVE-2024-48120,1,1,c62e5be74f0d961b12e910dcf29c3c75e41c7914cfe890c3077ff6c43d8c87f9,2024-10-14T14:15:11.780000
CVE-2024-48120,0,0,c62e5be74f0d961b12e910dcf29c3c75e41c7914cfe890c3077ff6c43d8c87f9,2024-10-14T14:15:11.780000
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
CVE-2024-48150,1,1,19f1376e02c9f64643f71be368bb63d9dab50859eebf81f919523183a5c16d63,2024-10-14T16:15:03.750000
CVE-2024-48153,1,1,3cfd46a773704ab0a351a2b6ce72427b77a3ce4f0b94a6c1ddac6ddeed3918df,2024-10-14T16:15:03.840000
CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000
CVE-2024-48168,1,1,a09a7c75736c5a01c0400c19554fc92c3c8fd8dbfe7d3f38b5cf9ce5962080e1,2024-10-14T17:15:13.520000
CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000
CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
@ -261784,15 +261801,15 @@ CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000
CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000
CVE-2024-48249,1,1,5f69ad216423d88721630184efcc3b6780298c2281ef45447866af266eeaf31b,2024-10-14T15:15:13.760000
CVE-2024-48249,0,0,5f69ad216423d88721630184efcc3b6780298c2281ef45447866af266eeaf31b,2024-10-14T15:15:13.760000
CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000
CVE-2024-48251,1,1,dda6068c3aec0a58728fe7bffc3300b768a57547cce716fc09ce51fb41c159b8,2024-10-14T15:15:13.857000
CVE-2024-48253,1,1,bc18a0e22f877a0da30943ce059ebde5cc7ada183f875ccf73bea55ec5d9c5dd,2024-10-14T14:15:11.857000
CVE-2024-48255,1,1,0a8ed856e42477c3dd884c692f58730bafdfb919692cb5c3147aec3949e7e20f,2024-10-14T14:15:11.937000
CVE-2024-48257,1,1,a1a727e578e5771b374c2be34c1390e71a4865969de7420f02809bdd4b7dbea9,2024-10-14T15:15:13.947000
CVE-2024-48259,1,1,ec456a1c6c04e1393013f41c2dc440ffed601fb5f055ca35b2d9252dd23e0a84,2024-10-14T15:15:14.033000
CVE-2024-48251,0,0,dda6068c3aec0a58728fe7bffc3300b768a57547cce716fc09ce51fb41c159b8,2024-10-14T15:15:13.857000
CVE-2024-48253,0,0,bc18a0e22f877a0da30943ce059ebde5cc7ada183f875ccf73bea55ec5d9c5dd,2024-10-14T14:15:11.857000
CVE-2024-48255,0,0,0a8ed856e42477c3dd884c692f58730bafdfb919692cb5c3147aec3949e7e20f,2024-10-14T14:15:11.937000
CVE-2024-48257,0,0,a1a727e578e5771b374c2be34c1390e71a4865969de7420f02809bdd4b7dbea9,2024-10-14T15:15:13.947000
CVE-2024-48259,0,0,ec456a1c6c04e1393013f41c2dc440ffed601fb5f055ca35b2d9252dd23e0a84,2024-10-14T15:15:14.033000
CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000
CVE-2024-48261,1,1,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000
CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000
CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000
CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000
CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000
@ -261846,6 +261863,10 @@ CVE-2024-48786,0,0,c860c3ab3f85be5742131f9576a41113cc68380c4baa10b74833d50923537
CVE-2024-48787,0,0,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000
CVE-2024-48788,0,0,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
CVE-2024-48796,1,1,7879f1aa8bab9a14d016d74ec58af4d0baf4610a66493dc7e696e44b7ca1bc91,2024-10-14T17:15:13.610000
CVE-2024-48797,1,1,a42b610d7f725207e7958ca937816046c91c2ceb35bdd5acafea0351793590bf,2024-10-14T17:15:13.690000
CVE-2024-48798,1,1,f8e79fb9df797037d2a83f075374be88a20179dcf01384173fccd3a6fc8fb0f0,2024-10-14T17:15:13.770000
CVE-2024-48799,1,1,a3b8aa531325723a40f231e31c933f25fd306c627d1f496d1ce1b3883fd1201f,2024-10-14T17:15:13.857000
CVE-2024-4881,0,0,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000
CVE-2024-48813,0,0,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
@ -263493,6 +263514,8 @@ CVE-2024-6758,0,0,eba9276bccb667ada2a9e6cadd00c35035c829f464cb8fc5793fac965ac82f
CVE-2024-6759,0,0,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000
CVE-2024-6760,0,0,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
CVE-2024-6762,1,1,053cd62e78397cb397f65a69e92749587baeeba6b06a23b25c2cde3a3e8e2412,2024-10-14T16:15:03.930000
CVE-2024-6763,1,1,2e3832a111ef9e1563172f5ed131b6afed3503a9ae140bbd5550f3cc5f769987,2024-10-14T16:15:04.163000
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000
CVE-2024-6767,0,0,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000
@ -264347,7 +264370,7 @@ CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca18
CVE-2024-7844,0,0,b930ca741640f5c7b3b0ce1c61bb7f4e94c485b2638d8e79f4794845e86ce235,2024-08-21T14:12:43.497000
CVE-2024-7845,0,0,2b4134672992a5057330a35c489891fcdc0ff66c466c2c96e09ea314c06bb030,2024-09-26T15:10:57.870000
CVE-2024-7846,0,0,8e15bdd83a5e179d37b373daa0289519d9b1688a7106bd69b16fbadef1928218,2024-09-26T13:32:55.343000
CVE-2024-7847,1,1,c4a5e56225f9502b32f4cf902921ba916babb59c986821e50770707689fdbf7b,2024-10-14T14:15:12.020000
CVE-2024-7847,0,0,c4a5e56225f9502b32f4cf902921ba916babb59c986821e50770707689fdbf7b,2024-10-14T14:15:12.020000
CVE-2024-7848,0,0,b79248ef369f661dc93f45ab33fbf95a9110e81107fbfafbebe6c98477861dfa,2024-09-26T22:12:13.457000
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
@ -264588,6 +264611,7 @@ CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
CVE-2024-8184,1,1,8c163146049144fdada87d362eb75f578744ca06a2fab167b1d676e981e40114,2024-10-14T16:15:04.380000
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000
CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000
@ -264872,7 +264896,7 @@ CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473a
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b36e,2024-09-17T17:54:39.767000
CVE-2024-8602,1,1,4eeda86fadc2aa14b25662e1edaef238609ac66c3a06646af8bc061f10c582f4,2024-10-14T14:15:12.400000
CVE-2024-8602,0,0,4eeda86fadc2aa14b25662e1edaef238609ac66c3a06646af8bc061f10c582f4,2024-10-14T14:15:12.400000
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
CVE-2024-8606,0,0,20f69def3ac5362a6447befa6462591ee01c298b230281fd326f40893e51c1a1,2024-09-30T15:32:34.647000
@ -265181,7 +265205,7 @@ CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a
CVE-2024-9137,0,0,9065b9986e350cb1955cfbec462f81d3d3a9a0cca2dc3d030de4540532f9abca,2024-10-14T09:15:04.403000
CVE-2024-9139,0,0,09eb3f13c3e60192800512c2b76c94742b9d9d7d743e90f5437ddfac8bcedf34,2024-10-14T09:15:04.693000
CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000
CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000
CVE-2024-9142,0,1,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000
CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000
CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000
CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000
@ -265279,7 +265303,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
CVE-2024-9341,0,1,d189ad1f5a137e8ae5c8357f3191cc9111f21b931f4eff48979046ce5164f4a3,2024-10-14T15:15:14.373000
CVE-2024-9341,0,0,d189ad1f5a137e8ae5c8357f3191cc9111f21b931f4eff48979046ce5164f4a3,2024-10-14T15:15:14.373000
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
CVE-2024-9346,0,0,54562034e717f93a9c89f6030e73e47fb9b9d7abbbde9d33821c04e2f0a85d64,2024-10-11T13:15:18.740000
@ -265455,7 +265479,7 @@ CVE-2024-9817,0,0,aa4071cf5ce97bf162c1cca4a7f07d25d51157e1698481fe4534c2979d4a7e
CVE-2024-9818,0,0,0b4965dc9157be1c79882236820da1fc50a01232d912ae1b867d598f551f291b,2024-10-10T23:15:03.680000
CVE-2024-9821,0,0,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000
CVE-2024-9822,0,0,31c5fa39db5fe31c5cd7802827b5c169adace5e7cdcfe1c09d420a2a1af019c6,2024-10-11T03:15:10.967000
CVE-2024-9823,1,1,7e4a61ee23132db2cb613d00e5ac442c24d492bd5341978073a831c8512ab73e,2024-10-14T15:15:14.560000
CVE-2024-9823,0,1,797ad589a845f20d3c764555cd88dd01739b03d274a2154c13310668db597c99,2024-10-14T16:15:04.653000
CVE-2024-9824,0,0,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000
CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000
CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000
@ -265483,4 +265507,4 @@ CVE-2024-9921,0,0,006acd4b794e2adfef5d9ee2d65bed2b1e2281b0d23f9374b3500a3b648fc6
CVE-2024-9922,0,0,38a9a769415efbcfedd53b122b48fa65b5e1f382fdf217a030bbaee2ce3081e3,2024-10-14T03:15:10.683000
CVE-2024-9923,0,0,54d0eb71a24239c4cf72f6c8d2d43f40cc27d7ae4dae943f2db0568ffd629c72,2024-10-14T04:15:06.070000
CVE-2024-9924,0,0,5d7f89079afc3d9ca8548ebb3725e799ef08b64b7b5fd0fc7f3c47978b6a83d8,2024-10-14T04:15:06.353000
CVE-2024-9936,1,1,84f1422b67bbaa43c4b2b921a0bd24fe5cb86e5da956c7f811c06ae275078cda,2024-10-14T14:15:12.553000
CVE-2024-9936,0,0,84f1422b67bbaa43c4b2b921a0bd24fe5cb86e5da956c7f811c06ae275078cda,2024-10-14T14:15:12.553000

Can't render this file because it is too large.