diff --git a/CVE-2022/CVE-2022-05xx/CVE-2022-0550.json b/CVE-2022/CVE-2022-05xx/CVE-2022-0550.json index ea45e988289..4f1cb0abfaa 100644 --- a/CVE-2022/CVE-2022-05xx/CVE-2022-0550.json +++ b/CVE-2022/CVE-2022-05xx/CVE-2022-0550.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0550", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2022-03-24T15:15:07.853", - "lastModified": "2024-05-28T11:15:09.800", + "lastModified": "2024-09-20T11:15:12.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -22,15 +22,15 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", @@ -55,8 +55,8 @@ "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" + "baseScore": 8.6, + "baseSeverity": "HIGH" } } ], @@ -86,20 +86,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-05xx/CVE-2022-0551.json b/CVE-2022/CVE-2022-05xx/CVE-2022-0551.json index fc661a8c4d8..aebf32919ff 100644 --- a/CVE-2022/CVE-2022-05xx/CVE-2022-0551.json +++ b/CVE-2022/CVE-2022-05xx/CVE-2022-0551.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0551", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2022-03-24T15:15:07.917", - "lastModified": "2024-05-28T11:15:09.963", + "lastModified": "2024-09-20T11:15:12.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -22,15 +22,15 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", @@ -55,8 +55,8 @@ "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" + "baseScore": 8.6, + "baseSeverity": "HIGH" } } ], @@ -86,20 +86,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29245.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29245.json index 965e00f1563..8805a1cdd95 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29245.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29245.json @@ -2,13 +2,13 @@ "id": "CVE-2023-29245", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2023-09-19T11:16:18.100", - "lastModified": "2024-05-28T13:15:09.717", + "lastModified": "2024-09-20T11:15:12.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.\n\nMalicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, or to alter its structure and data." + "value": "A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.\n\nMalicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, alter its structure and data, and/or affect its availability." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32649.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32649.json index 0ab5b71f905..583ad618e90 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32649.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32649.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32649", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2023-09-19T11:16:20.297", - "lastModified": "2024-05-28T13:15:09.970", + "lastModified": "2024-09-20T11:15:13.117", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,7 +120,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-1286" } ] } diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3044.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3044.json index 55d1158da09..88917a8bae2 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3044.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3044.json @@ -2,13 +2,13 @@ "id": "CVE-2024-3044", "sourceIdentifier": "security@documentfoundation.org", "published": "2024-05-14T21:15:12.627", - "lastModified": "2024-06-10T17:16:32.823", + "lastModified": "2024-09-20T10:15:02.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted.\n" + "value": "Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted." }, { "lang": "es", @@ -23,7 +23,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-356" } ] } diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9043.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9043.json new file mode 100644 index 00000000000..6585cacca88 --- /dev/null +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9043.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9043", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-09-20T11:15:13.280", + "lastModified": "2024-09-20T11:15:13.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-8103-b0568-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-8102-b94a9-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5e1ea9fdee3..935a12d78fa 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-20T10:00:25.352138+00:00 +2024-09-20T12:00:19.201621+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-20T09:15:02.363000+00:00 +2024-09-20T11:15:13.280000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -263484 +263485 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -- [CVE-2024-41721](CVE-2024/CVE-2024-417xx/CVE-2024-41721.json) (`2024-09-20T08:15:11.323`) -- [CVE-2024-8853](CVE-2024/CVE-2024-88xx/CVE-2024-8853.json) (`2024-09-20T08:15:11.493`) +- [CVE-2024-9043](CVE-2024/CVE-2024-90xx/CVE-2024-9043.json) (`2024-09-20T11:15:13.280`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `5` -- [CVE-2023-36268](CVE-2023/CVE-2023-362xx/CVE-2023-36268.json) (`2024-09-20T09:15:02.363`) +- [CVE-2022-0550](CVE-2022/CVE-2022-05xx/CVE-2022-0550.json) (`2024-09-20T11:15:12.240`) +- [CVE-2022-0551](CVE-2022/CVE-2022-05xx/CVE-2022-0551.json) (`2024-09-20T11:15:12.710`) +- [CVE-2023-29245](CVE-2023/CVE-2023-292xx/CVE-2023-29245.json) (`2024-09-20T11:15:12.980`) +- [CVE-2023-32649](CVE-2023/CVE-2023-326xx/CVE-2023-32649.json) (`2024-09-20T11:15:13.117`) +- [CVE-2024-3044](CVE-2024/CVE-2024-30xx/CVE-2024-3044.json) (`2024-09-20T10:15:02.620`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 31e4bc5c836..243e9abceba 100644 --- a/_state.csv +++ b/_state.csv @@ -187969,8 +187969,8 @@ CVE-2022-0545,0,0,5f8a902dafd6159ee1d3d3abd2a4f5b604bb9b4301573e6f3b22aad99ae5d3 CVE-2022-0546,0,0,110cebfdd6ff13b7140a9f3862078ce3df8bb49e7dcbf8ed64d7ab7bfd8aac29,2023-11-07T03:41:22.280000 CVE-2022-0547,0,0,b87b8392b3086ad91a3af0001d2269bbce828f61152c5d8341fb948ac5e5345a,2023-11-07T03:41:22.420000 CVE-2022-0549,0,0,c8f2d7aed0ece1e7b596fa13ddc848f0d71a04920cd68f4bdcce9ec0950f53e7,2022-04-04T19:20:43.360000 -CVE-2022-0550,0,0,ce68a9292504973c8ee17153be1c78cd39a94db0e7ceac03da15169e07b92fab,2024-05-28T11:15:09.800000 -CVE-2022-0551,0,0,9116424b79d96a144503720a4cf8aecec469a75f78ca1e2e13dee4d6b0821819,2024-05-28T11:15:09.963000 +CVE-2022-0550,0,1,a0c8b7edb7cbce39e0d777c3bda74069fa0c147dacadcf789b1ee438f4cae601,2024-09-20T11:15:12.240000 +CVE-2022-0551,0,1,4ff57a2b595221d06aa6dc5f20d03e0d7e4718d56501ec37e0d6929ec2e8b4ac,2024-09-20T11:15:12.710000 CVE-2022-0552,0,0,183966929729f1900aeaee14e729366e475542a470c3c6adf97292b1287b8219,2023-02-12T22:15:20.927000 CVE-2022-0553,0,0,eed26d5cca99613afef4048e1fbd59fc96d9663c11ef0875849b479a57848b49,2023-07-21T17:13:15.200000 CVE-2022-0554,0,0,0eb14a07a96409838a6e7dedeed6bfe6613c4cc8748340c9ac1a656a21845e81,2023-11-07T03:41:22.640000 @@ -222157,7 +222157,7 @@ CVE-2023-29241,0,0,0332e7b930ff4304668a7a896000a21892f2828fad91c89c531554546ff13 CVE-2023-29242,0,0,b61b510d1f58b7f0d5a338add68b354218b1c2308336d527a49331a9e2d27196,2023-11-07T04:11:07.910000 CVE-2023-29243,0,0,8725de0b480e293af5f5e87a983092ba629b47c9b3a192ae1fceec5139111ba1,2023-11-07T04:11:08.053000 CVE-2023-29244,0,0,fd105b38b3d195c238b5968b40ac7f34e4f4dc15ba8cf11199615ee5ac2d2d49,2024-01-30T15:17:47.337000 -CVE-2023-29245,0,0,0ca0b2361803a7ac20626199514a7eb2ecc0c0d0034bd735fb085330a1b87d2f,2024-05-28T13:15:09.717000 +CVE-2023-29245,0,1,36663441326991b70a4a638f7835ab4b96bdc7534da1afdff5817a73607c1710,2024-09-20T11:15:12.980000 CVE-2023-29246,0,0,66dc05c67373539e60513d12bb8d5ea5cbab81162146e8ad3ad6542b8a2951e0,2023-05-22T14:55:15.440000 CVE-2023-29247,0,0,bb0e3571a900cf515f84f932527ebb6318ef77da20d3db85fc0074ca4d75811e,2023-05-11T23:24:54.837000 CVE-2023-2925,0,0,6dfd7b78d36e2a725703c314ea807457e2096a4bbbc04df212c7a1d27031a788,2024-05-17T02:23:22.303000 @@ -224670,7 +224670,7 @@ CVE-2023-32644,0,0,a354953f4dc4989b7b46cb55cf08179c3a1e29618db34fa29ce42ae9c36e2 CVE-2023-32645,0,0,857d6cc902eefc1d9512ca3bece7549ec7eef38c002db86a230c5d650c8de20d,2023-10-12T22:27:09.257000 CVE-2023-32646,0,0,f6b1530f5a486f7b373de01025884669df82841c6297142c889d164b769a0a22,2024-02-14T15:01:51.137000 CVE-2023-32647,0,0,4e49ef2dce5500c3745634f186eda67b3ba6efb3ab14954d1408922ffebd0d1b,2024-02-14T15:01:51.137000 -CVE-2023-32649,0,0,3eeda4649a3d8c9a74fdb6b317ca0a5456c1ef9a0ae897aa32281936f56efa65,2024-05-28T13:15:09.970000 +CVE-2023-32649,0,1,22b9514becd10eb679dd28ac11c5883dd073215affaee5996a16965af56cdacc,2024-09-20T11:15:13.117000 CVE-2023-3265,0,0,471c4818cf3d140a8514e2ffc1948be656fcb1771a62c82080073ff1643bcfa6,2023-08-22T16:20:24.977000 CVE-2023-32650,0,0,bebe035dcd601dd36e4c165904cd4a21f7ee809614ac45add18da3be91ede908,2024-04-09T21:15:08.027000 CVE-2023-32651,0,0,e84751d5182835b1a5435aa440dd49d94cb9c7b164bddde42f31052d1248666d,2024-02-14T15:01:51.137000 @@ -227228,7 +227228,7 @@ CVE-2023-36260,0,0,d91b3f2df1f07bb3d30f5175114e7ff10cf2983876f42068fd4e8dd27cbdc CVE-2023-36262,0,0,7c84450336c4990e953dce7f54829dc2d1c7e2f75088550f331d29067052f2ae,2023-11-07T04:16:25.310000 CVE-2023-36263,0,0,b1242ace1d95cf1012522f675dbb699d27209303b5ae9e0cf837454186858e60,2024-09-06T18:35:03.833000 CVE-2023-36266,0,0,aebe7aeee850e04c73221b72dc4edaeb825715c758ae43df23e46e458b69eb85,2024-08-02T17:16:00.130000 -CVE-2023-36268,0,1,0d36957fbc7e5c71861a4d41ac1aa9c2b2b9fdb7a1080f5312f94994107e995a,2024-09-20T09:15:02.363000 +CVE-2023-36268,0,0,0d36957fbc7e5c71861a4d41ac1aa9c2b2b9fdb7a1080f5312f94994107e995a,2024-09-20T09:15:02.363000 CVE-2023-3627,0,0,4ace1272386b5faa006e0f4e34aebe17762337fac3ef2a63c17791c405fa06d3,2023-07-18T19:58:32.613000 CVE-2023-36271,0,0,003efbeef2bd5a83160f4c75c748ebebf68aae3263994871e0ae346b564ea886,2023-06-27T12:18:30.333000 CVE-2023-36272,0,0,b40f5b0a455b9096df3ff383271d067f7a04c5792cad2e87f448c1960a80da86,2023-06-27T12:18:19.927000 @@ -250423,7 +250423,7 @@ CVE-2024-30436,0,0,f0e2a7c55294659d9b68ad5c141c1d73e6db3e952470b7608d93d70ce69e7 CVE-2024-30437,0,0,d5da299b996b0ba716b2584fb41394a98fe95a89809181bf72c09bf7480a74ba,2024-04-01T01:12:59.077000 CVE-2024-30438,0,0,97ea6b8f8aa80291648f1edf6ecedc8ad2b8831adb55a9f2824704b938eeb386,2024-04-01T01:12:59.077000 CVE-2024-30439,0,0,bb9a23babf5241450e44866fbe0fadf27f92acd779b0e6450c3ad24b3dc56aa0,2024-04-01T01:12:59.077000 -CVE-2024-3044,0,0,80cba9d327d80e1c11617bbe93ddf860e81ab6aff9aa8b0238cabec93cd3a10d,2024-06-10T17:16:32.823000 +CVE-2024-3044,0,1,0af519ef5bb67073d6c106a5182120b4e7df2c752508af2031107535842b59b3,2024-09-20T10:15:02.620000 CVE-2024-30440,0,0,1faf88fa48a4f6cc8c516503e0314d6e98ae7ec825707099ef9873385afd611f,2024-04-01T01:12:59.077000 CVE-2024-30441,0,0,89b66b83bf93700c5885e6ba0fffb52aebbf8ef8fe82baeb737af3c7229b04d6,2024-04-01T01:12:59.077000 CVE-2024-30442,0,0,000be18b759c476ecf3dd48b77b6402af1ae7c1591716e0862d0f031f46eccb8,2024-04-01T01:12:59.077000 @@ -257927,7 +257927,7 @@ CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79 CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a971,2024-08-30T17:49:42.047000 -CVE-2024-41721,1,1,fbe947beac5451084e31ee7ef479c810f14ce86ff43bb34bde8771ee906b776f,2024-09-20T08:15:11.323000 +CVE-2024-41721,0,0,fbe947beac5451084e31ee7ef479c810f14ce86ff43bb34bde8771ee906b776f,2024-09-20T08:15:11.323000 CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000 CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000 CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000 @@ -263435,7 +263435,7 @@ CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c94343 CVE-2024-8796,0,0,94e01fa2394b7e3cc5729adcbe04212056eb704ee3dccdfd860de0e7129048a2,2024-09-17T18:15:05.443000 CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000 CVE-2024-8850,0,0,93c3effab202541418248ca686b83b93e9ac19fd90a1ab3c2b19a3b5c06db2e1,2024-09-19T04:15:06.557000 -CVE-2024-8853,1,1,5aa5f44c2d0058c33afc2b050a9e181c9b858d177768260824607f55817a7dba,2024-09-20T08:15:11.493000 +CVE-2024-8853,0,0,5aa5f44c2d0058c33afc2b050a9e181c9b858d177768260824607f55817a7dba,2024-09-20T08:15:11.493000 CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000 CVE-2024-8863,0,0,c201c0a73f6e94fc800a591d431c13570689b06531fa3fd890390312a87785df,2024-09-16T15:30:28.733000 CVE-2024-8864,0,0,3bc8b301985cc40353022de4e4744e73398cd0188f617195b9d24ac6f8e8e30d,2024-09-17T10:38:13.410000 @@ -263483,3 +263483,4 @@ CVE-2024-9007,0,0,2ed00ba09d6346ca52405d737f1ea8260825916d8ba14647aaa2678f5fb0a6 CVE-2024-9008,0,0,77d826e7c271663667c77c9a7532359cf4fc0e1d0af525ca0cfcca90765539f1,2024-09-19T23:15:13.100000 CVE-2024-9009,0,0,1ac9519eafc6cbe08b36770826cf44fb97f8235af1e3cf50c2fc809ba50e6294,2024-09-20T00:15:03.997000 CVE-2024-9011,0,0,4c216b753b208d079d0b75681eff478970bf3c3611602e4dca6410c6d6e1d6d5,2024-09-20T01:15:10.550000 +CVE-2024-9043,1,1,fb2d62a3b3fd8a916328179a28239b80c650861677979e64aa76c84487b42f8c,2024-09-20T11:15:13.280000