From 5eb078aae5a48746253b4cff4daa3d19f896e4cd Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 9 Sep 2024 18:03:18 +0000 Subject: [PATCH] Auto-Update: 2024-09-09T18:00:19.755140+00:00 --- CVE-2018/CVE-2018-15xx/CVE-2018-1546.json | 23 ++- CVE-2023/CVE-2023-55xx/CVE-2023-5570.json | 14 +- CVE-2023/CVE-2023-56xx/CVE-2023-5623.json | 14 +- CVE-2024/CVE-2024-215xx/CVE-2024-21524.json | 69 +++++++- CVE-2024/CVE-2024-217xx/CVE-2024-21759.json | 53 +++++- CVE-2024/CVE-2024-236xx/CVE-2024-23663.json | 105 +++++++++++- CVE-2024/CVE-2024-260xx/CVE-2024-26015.json | 91 ++++++++++- CVE-2024/CVE-2024-277xx/CVE-2024-27784.json | 46 +++++- CVE-2024/CVE-2024-277xx/CVE-2024-27785.json | 46 +++++- CVE-2024/CVE-2024-29xx/CVE-2024-2911.json | 48 +++++- CVE-2024/CVE-2024-29xx/CVE-2024-2935.json | 52 +++++- CVE-2024/CVE-2024-335xx/CVE-2024-33509.json | 48 +++++- CVE-2024/CVE-2024-386xx/CVE-2024-38651.json | 14 +- CVE-2024/CVE-2024-394xx/CVE-2024-39498.json | 70 +++++++- CVE-2024/CVE-2024-397xx/CVE-2024-39714.json | 14 +- CVE-2024/CVE-2024-397xx/CVE-2024-39715.json | 14 +- CVE-2024/CVE-2024-407xx/CVE-2024-40710.json | 14 +- CVE-2024/CVE-2024-407xx/CVE-2024-40711.json | 14 +- CVE-2024/CVE-2024-407xx/CVE-2024-40712.json | 14 +- CVE-2024/CVE-2024-409xx/CVE-2024-40964.json | 102 +++++++++++- CVE-2024/CVE-2024-409xx/CVE-2024-40965.json | 69 +++++++- CVE-2024/CVE-2024-409xx/CVE-2024-40967.json | 105 +++++++++++- CVE-2024/CVE-2024-409xx/CVE-2024-40969.json | 81 +++++++++- CVE-2024/CVE-2024-420xx/CVE-2024-42019.json | 14 +- CVE-2024/CVE-2024-443xx/CVE-2024-44333.json | 25 +++ CVE-2024/CVE-2024-447xx/CVE-2024-44720.json | 56 +++++++ CVE-2024/CVE-2024-447xx/CVE-2024-44721.json | 21 +++ CVE-2024/CVE-2024-454xx/CVE-2024-45406.json | 64 ++++++++ CVE-2024/CVE-2024-62xx/CVE-2024-6274.json | 66 +++++++- CVE-2024/CVE-2024-62xx/CVE-2024-6275.json | 66 +++++++- CVE-2024/CVE-2024-62xx/CVE-2024-6276.json | 66 +++++++- CVE-2024/CVE-2024-62xx/CVE-2024-6277.json | 66 +++++++- CVE-2024/CVE-2024-62xx/CVE-2024-6278.json | 66 +++++++- CVE-2024/CVE-2024-62xx/CVE-2024-6279.json | 66 +++++++- CVE-2024/CVE-2024-83xx/CVE-2024-8373.json | 4 +- CVE-2024/CVE-2024-85xx/CVE-2024-8517.json | 10 +- CVE-2024/CVE-2024-86xx/CVE-2024-8604.json | 137 ++++++++++++++++ CVE-2024/CVE-2024-86xx/CVE-2024-8605.json | 141 ++++++++++++++++ README.md | 73 +++++---- _state.csv | 168 ++++++++++---------- 40 files changed, 1990 insertions(+), 239 deletions(-) create mode 100644 CVE-2024/CVE-2024-443xx/CVE-2024-44333.json create mode 100644 CVE-2024/CVE-2024-447xx/CVE-2024-44720.json create mode 100644 CVE-2024/CVE-2024-447xx/CVE-2024-44721.json create mode 100644 CVE-2024/CVE-2024-454xx/CVE-2024-45406.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8604.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8605.json diff --git a/CVE-2018/CVE-2018-15xx/CVE-2018-1546.json b/CVE-2018/CVE-2018-15xx/CVE-2018-1546.json index af295fdb726..7975e7b203d 100644 --- a/CVE-2018/CVE-2018-15xx/CVE-2018-1546.json +++ b/CVE-2018/CVE-2018-15xx/CVE-2018-1546.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1546", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-07-06T14:29:01.443", - "lastModified": "2019-10-09T23:38:37.773", + "lastModified": "2024-09-09T17:15:12.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -36,9 +36,11 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 - }, + } + ], + "cvssMetricV30": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.0", @@ -125,11 +127,8 @@ ] }, { - "url": "https://www-prd-trops.events.ibm.com/node/715299", - "source": "psirt@us.ibm.com", - "tags": [ - "Permissions Required" - ] + "url": "https://www.ibm.com/support/pages/node/715299", + "source": "psirt@us.ibm.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5570.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5570.json index 974c580207b..73109654c90 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5570.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5570.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5570", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2023-10-27T12:15:08.757", - "lastModified": "2023-11-07T21:34:59.460", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-09T16:35:01.990", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,6 +79,16 @@ "value": "CWE-1320" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1320" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5623.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5623.json index 0b18fb95261..62aab45d995 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5623.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5623.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5623", "sourceIdentifier": "vulnreport@tenable.com", "published": "2023-10-26T17:15:09.860", - "lastModified": "2023-11-07T13:49:33.017", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-09T16:35:03.113", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21524.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21524.json index 89d711a6fa8..99959804b0e 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21524.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21524.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21524", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:11.340", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:36:33.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "report@snyk.io", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "report@snyk.io", "type": "Secondary", @@ -51,18 +81,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magiclen:stringbuilder:*:*:*:*:*:node.js:*:*", + "versionEndIncluding": "2.2.7", + "matchCriteriaId": "8DE1612F-F4A0-4ED1-8229-FC7EF4167BE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/dellalibera/0bb022811224f81d998fa61c3175ee67", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/magiclen/node-stringbuilder/blob/5c2797d3d6bf8cb6d10fe1e077609cef9a5a7de0/src/node-stringbuilder.c%23L1281", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-JS-NODESTRINGBUILDER-6421617", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21759.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21759.json index 0c204b67923..66bec764068 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21759.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21759.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21759", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:04.357", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T16:02:11.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.7", + "matchCriteriaId": "281311DE-FCED-4AB9-8D54-EBD0C8FE53B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiportal:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2C7F7D4E-DE62-491A-9C00-EAD2595BF2D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-011", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23663.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23663.json index 8fa06f9c0a0..8e222dc8670 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23663.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23663.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23663", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:04.593", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T16:05:49.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@fortinet.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@fortinet.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.1", + "versionEndIncluding": "4.1.9", + "matchCriteriaId": "13C8C635-302D-4495-A0C0-069F08CA9CAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndIncluding": "4.2.6", + "matchCriteriaId": "BC6A9F11-62C8-4A04-B1FC-795BD0D80EE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.4", + "matchCriteriaId": "52A6C42E-B444-4E9D-8DDE-377FDF85FA68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.4", + "matchCriteriaId": "57CACD11-5B17-4540-87AF-1B8730C84984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndIncluding": "7.4.2", + "matchCriteriaId": "D22C31E2-F928-4244-A5CD-CF7F018A17F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC2C9D3-01FD-4D5B-AE85-05B0CA6C99AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0617C1D-E321-409D-B54B-775E854A03C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-459", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26015.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26015.json index fce0545c30e..4774d51d1ed 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26015.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26015", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:04.810", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T16:12:36.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@fortinet.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] + }, + { + "source": "psirt@fortinet.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.4.3", + "matchCriteriaId": "662CC1BD-BA5A-4765-9D74-A887690F726F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.15", + "matchCriteriaId": "F75019A7-F58D-4863-AE73-B63E38C8D880" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.8", + "matchCriteriaId": "5F669948-010A-4105-9E63-0D47CA92CA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndIncluding": "7.4.3", + "matchCriteriaId": "D89D2813-5224-4658-97B8-56CBD3E49ED6" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-446", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27784.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27784.json index 62bd6ce634a..cc07c072cfb 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27784.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27784", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:05.470", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T16:16:47.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiaiops:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46735B4F-511E-4C02-A561-FCF029146F79" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-072", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27785.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27785.json index fd7bd34fc58..5b9cb74ec11 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27785.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27785.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27785", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:05.687", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T16:18:45.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiaiops:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46735B4F-511E-4C02-A561-FCF029146F79" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-073", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2911.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2911.json index 85bddc6c21d..b53cb79c2fb 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2911.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2911.json @@ -2,13 +2,13 @@ "id": "CVE-2024-2911", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T22:15:07.823", - "lastModified": "2024-06-26T20:15:15.360", + "lastModified": "2024-09-09T16:15:02.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as problematic, was found in Tianjin PubliCMS 4.0.202302.e. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257979. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability, which was classified as problematic, was found in Tianjin PubliCMS 4.0.202302.e. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "es", @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], "cvssMetricV31": [ { "source": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json index 18d77258d68..a74da8f8e59 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json @@ -2,13 +2,13 @@ "id": "CVE-2024-2935", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T01:15:47.360", - "lastModified": "2024-05-17T02:38:38.003", + "lastModified": "2024-09-09T16:15:02.587", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Todo List in Kanban Board 1.0. Affected by this issue is some unknown functionality of the component Add ToDo. The manipulation of the argument Todo leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258014 is the identifier assigned to this vulnerability." + "value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Todo List in Kanban Board 1.0. Affected by this issue is some unknown functionality of the component Add ToDo. The manipulation of the argument Todo leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], "cvssMetricV31": [ { "source": "cna@vuldb.com", @@ -92,6 +136,10 @@ { "url": "https://vuldb.com/?submit.304678", "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33509.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33509.json index f9db09e7959..3f52ce0d6a5 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33509.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33509.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33509", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:05.950", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:06:37.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "7.2.2", + "matchCriteriaId": "41F978BE-CB8B-4B00-AC72-1FE4ABD134DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-326", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38651.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38651.json index 8e6eced6717..1acdc2a7cdd 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38651.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38651.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38651", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:12.347", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T17:35:02.663", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39498.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39498.json index a1d934dbc2d..7d2da6a0291 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39498.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39498.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39498", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:12.387", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:47:58.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/mst: corrige la desreferencia del puntero NULL en drm_dp_add_payload_part2 [Por qu\u00e9] Commit: - commit 5aa1dfcdf0a4 (\"drm/mst: refactorizar el flujo para la asignaci\u00f3n/eliminaci\u00f3n de carga\") sobrescribe accidentalmente el commit - commit 54d217406afe (\"drm: use mgr->dev en drm_dbg_kms en drm_dp_add_payload_part2\") que causa regresi\u00f3n. [C\u00f3mo] Recupere la correcci\u00f3n NULL original y elimine el par\u00e1metro de entrada innecesario 'estado' para drm_dp_add_payload_part2(). (cereza escogida del commit 4545614c1d8da603e57b60dd66224d81b6ffc305)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.6", + "matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a507b7d2be15fddb95bf8dee01110b723e2bcd9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8e21de5f99b2368a5155037ce0aae8aaba3f5241", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39714.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39714.json index d155b623a71..770ab8c2ded 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39714.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39714.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39714", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:12.507", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T17:35:03.387", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39715.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39715.json index de59bffaddd..48d5167ba3b 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39715.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39715.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39715", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:12.663", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T16:35:04.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40710.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40710.json index d163175fcf2..b878ac2333c 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40710.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40710.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40710", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.110", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T17:35:04.207", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40711.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40711.json index b8a17372754..aca405f3994 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40711.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40711.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40711", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.260", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T16:35:05.923", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40712.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40712.json index f50a3fa38db..a245600fef8 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40712.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40712.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40712", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.410", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T16:35:06.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40964.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40964.json index 2db07d8e1fe..f77d14824a5 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40964.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40964.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40964", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.310", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:48:55.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,109 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: hda: cs35l41: Posible desreferencia del puntero nulo en cs35l41_hda_unbind() La funci\u00f3n cs35l41_hda_unbind() borra la entrada hda_component que coincide con su \u00edndice y luego desreferencia el puntero del c\u00f3dec contenido en el primer elemento de la matriz hda_component, esto es un problema cuando el \u00edndice del dispositivo era 0. En su lugar, utilice el puntero del c\u00f3dec escondido en la estructura cs35l41_hda, ya que seguir\u00e1 siendo v\u00e1lido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "7811AF31-E4C8-4CC1-8D27-717621D639B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", + "matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19be722369c347f3af1c5848e303980ed040b819", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6386682cdc8b41319c92fbbe421953e33a28840c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff27bd8e17884f7cdefecb3f3817caadd6813dc0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40965.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40965.json index cba2be8fcf4..f0ba317f19c 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40965.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40965.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40965", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.370", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:57:18.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: i2c: lpi2c: evite llamar a clk_get_rate durante la transferencia. En lugar de llamar repetidamente a clk_get_rate para cada transferencia, bloquee la velocidad del reloj y almacene en cach\u00e9 el valor. Se ha observado un punto muerto al agregar el c\u00f3dec de audio tlv320aic32x4 al sistema. Cuando este proveedor de reloj agrega su reloj, el mutex clk ya est\u00e1 bloqueado, necesita acceder a i2c, que a cambio tambi\u00e9n necesita el mutex para clk_get_rate." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0C5DBBC3-3C7D-44D9-B480-A05A38B8AE77" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2b42e9587a7a9c7b824e0feb92958f258263963e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4268254a39484fc11ba991ae148bacbe75d9cc0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40967.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40967.json index 3cc0040c57f..c30c84d3615 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40967.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40967.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40967", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.480", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:58:49.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,116 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: imx: Introduce tiempo de espera cuando se espera que el transmisor est\u00e9 vac\u00edo. Esperando como m\u00e1ximo 1 segundo para que se establezca USR2_TXDC, evitamos un posible punto muerto. En caso de que se agote el tiempo de espera, no hay mucho que podamos hacer, por lo que simplemente ignoramos el estado del transmisor e intentamos continuar con optimismo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.162", + "matchCriteriaId": "DD1E49C8-DE20-4CCB-8715-3FB3FA95ABC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.96", + "matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/53b2c95547427c358f45515a9f144efee95e3701", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f2b9ab6d0b26f16cd38dd9fd91d51899635f7c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f9e70c68b7ace0141fe3bc94bf7b61296b71916", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/982ae3376c4c91590d38dc8a676c10f7df048a44", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e533e4c62e9993e62e947ae9bbec34e4c7ae81c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40969.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40969.json index 6a7b4952e65..1414d3468b9 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40969.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40969", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.627", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:59:29.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: f2fs: no configure RO al apagar f2fs El apagado no verifica el error de thaw_super debido a solo lectura, lo que causa un punto muerto como el que se muestra a continuaci\u00f3n. f2fs_ioc_shutdown(F2FS_GOING_DOWN_FULLSYNC) issues_discard_thread - bdev_freeze - frozen_super - f2fs_stop_checkpoint() - f2fs_handle_critical_error - sb_start_write - establecer RO - esperando - bdev_thaw - thaw_super_locked - devolver -EINVAL, si sb_rdonly() - card_thread -> esperar kthread_stop(discard_thread);" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "97F8F699-7041-44A4-9087-0E1FFC0543C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1036d3ea7a32cb7cee00885c73a1f2ba7fbc499a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3bdb7f161697e2d5123b89fe1778ef17a44858e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f47ed3b284b38f235355e281f57dfa8fffcc6563", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42019.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42019.json index 4638556b15c..b918575a49c 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42019.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42019.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42019", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.980", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T17:35:05.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44333.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44333.json new file mode 100644 index 00000000000..615146797f1 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44333.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44333", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-09T17:15:13.120", + "lastModified": "2024-09-09T17:15:13.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution. An attacker can achieve arbitrary command execution by sending a carefully crafted malicious string to the CGI function responsible for handling usb_paswd.asp." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Swind1er/c8656b32058e28e64f92d100c92ca12c", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44720.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44720.json new file mode 100644 index 00000000000..59e3f1e04c5 --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44720.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-44720", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-09T16:15:02.780", + "lastModified": "2024-09-09T17:35:06.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SeaCMS v13.1 was discovered to an arbitrary file read vulnerability via the component admin_safe.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/seacms-net/CMS/issues/22", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44721.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44721.json new file mode 100644 index 00000000000..e85e51b6c3b --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44721.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44721", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-09T16:15:02.853", + "lastModified": "2024-09-09T16:15:02.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SeaCMS v13.1 was discovered to a Server-Side Request Forgery (SSRF) via the url parameter at /admin_reslib.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/seacms-net/CMS/issues/23", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45406.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45406.json new file mode 100644 index 00000000000..a4e774cf090 --- /dev/null +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45406.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-45406", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-09T17:15:13.180", + "lastModified": "2024-09-09T17:15:13.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/craftcms/cms/commit/b7348942f8131b3868ec6f46d615baae50151bb8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/craftcms/cms/security/advisories/GHSA-28h4-788g-rh42", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6274.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6274.json index eb5b82a70b8..2aa2b381c82 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6274.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6274.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6274", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-24T02:15:53.827", - "lastModified": "2024-06-24T12:57:36.513", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T16:15:27.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83" + } + ] + } + ] + } + ], "references": [ { "url": "https://powerful-bulb-c36.notion.site/sql-injection-1-6b3c66351180485ea764561a47239907", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269487", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.269487", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.362872", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6275.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6275.json index fbf581e2b23..5955edca9b9 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6275.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6275.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6275", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-24T02:15:54.140", - "lastModified": "2024-06-25T16:15:25.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:20:46.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83" + } + ] + } + ] + } + ], "references": [ { "url": "https://powerful-bulb-c36.notion.site/sql-injection-2-bd75eb9250214c2e95e57965d9ea392a", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269488", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.269488", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.362876", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6276.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6276.json index 7a173fbae54..f8a2a892347 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6276.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6276", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-24T02:15:54.410", - "lastModified": "2024-06-24T15:15:12.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:20:48.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83" + } + ] + } + ] + } + ], "references": [ { "url": "https://powerful-bulb-c36.notion.site/sql-injection-3-52ce387faca74869b441eb1bf4cec27a", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269489", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.269489", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.362877", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6277.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6277.json index ec83d130c43..96f83f76473 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6277.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6277.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6277", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-24T03:15:10.027", - "lastModified": "2024-06-24T15:15:12.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:20:50.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83" + } + ] + } + ] + } + ], "references": [ { "url": "https://powerful-bulb-c36.notion.site/sql-injection-4-a2545288ad9244009ff1097df19ee635", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269490", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.269490", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.362882", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6278.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6278.json index 8759620e25d..ce40ed1e4c4 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6278.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6278.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6278", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-24T03:15:10.290", - "lastModified": "2024-06-24T14:15:13.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:20:52.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83" + } + ] + } + ] + } + ], "references": [ { "url": "https://powerful-bulb-c36.notion.site/sql-injection-5-f0e968979e3c47049ed5965ca3a7ed7e", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269491", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.269491", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.362883", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6279.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6279.json index 34437aa997f..9b487923cb3 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6279.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6279.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6279", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-24T03:15:10.573", - "lastModified": "2024-06-26T20:15:17.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T17:20:45.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83" + } + ] + } + ] + } + ], "references": [ { "url": "https://powerful-bulb-c36.notion.site/sql-injection-6-cb069f55445545e19212a7b1ae489a72", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.269492", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.269492", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.362886", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8373.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8373.json index 1d07f6dec56..896e0527af1 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8373.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8373.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8373", "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", "published": "2024-09-09T15:15:12.887", - "lastModified": "2024-09-09T15:15:12.887", + "lastModified": "2024-09-09T16:15:02.927", "vulnStatus": "Received", "cveTags": [ { @@ -15,7 +15,7 @@ "descriptions": [ { "lang": "en", - "value": "Improper sanitization of the value of the '[srcset]' attribute in '' HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ." + "value": "Improper sanitization of the value of the [srcset] attribute in HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8517.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8517.json index a93f66c2ac0..d910d071d6b 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8517.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8517.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8517", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-09-06T16:15:03.793", - "lastModified": "2024-09-06T16:46:26.830", + "lastModified": "2024-09-09T16:15:03.053", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SPIP before 4.3.2, 4.2.16, and \n4.1.18 is vulnerable to a command injection issue. A \nremote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request." + }, + { + "lang": "es", + "value": "SPIP anterior a 4.3.2, 4.2.16 y 4.1.18 es vulnerable a un problema de inyecci\u00f3n de comandos. Un atacante remoto y no autenticado puede ejecutar comandos arbitrarios del sistema operativo enviando una solicitud HTTP de carga de archivo multiparte manipulada." } ], "metrics": { @@ -56,6 +60,10 @@ "url": "https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_2_a_big_upload/", "source": "disclosure@vulncheck.com" }, + { + "url": "https://vozec.fr/researchs/spip-preauth-rce-2024-big-upload/", + "source": "disclosure@vulncheck.com" + }, { "url": "https://vulncheck.com/advisories/spip-upload-rce", "source": "disclosure@vulncheck.com" diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8604.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8604.json new file mode 100644 index 00000000000..bac0d8435e3 --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8604.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-8604", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-09T16:15:03.203", + "lastModified": "2024-09-09T16:15:03.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in SourceCodester Online Food Ordering System 2.0. This affects an unknown part of the file index.php of the component Create an Account Page. The manipulation of the argument First Name/Last Name leads to cross site scripting. It is possible to initiate the attack remotely." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.276831", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.276831", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.404660", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8605.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8605.json new file mode 100644 index 00000000000..0f02d28511a --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8605.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-8605", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-09T16:15:03.570", + "lastModified": "2024-09-09T16:15:03.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in code-projects Inventory Management 1.0. This vulnerability affects unknown code of the file /view/registration.php of the component Registration Form. The manipulation with the input leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ali0999109/Inventory-management", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.276832", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.276832", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.404711", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 09ba87b35f2..c1d8f2f8daf 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-09T16:00:18.916348+00:00 +2024-09-09T18:00:19.755140+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-09T15:59:57.527000+00:00 +2024-09-09T17:59:29.787000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262211 +262217 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `6` -- [CVE-2024-40643](CVE-2024/CVE-2024-406xx/CVE-2024-40643.json) (`2024-09-09T15:15:11.597`) -- [CVE-2024-44375](CVE-2024/CVE-2024-443xx/CVE-2024-44375.json) (`2024-09-09T14:15:14.290`) -- [CVE-2024-45041](CVE-2024/CVE-2024-450xx/CVE-2024-45041.json) (`2024-09-09T15:15:11.940`) -- [CVE-2024-7015](CVE-2024/CVE-2024-70xx/CVE-2024-7015.json) (`2024-09-09T14:15:14.430`) -- [CVE-2024-8042](CVE-2024/CVE-2024-80xx/CVE-2024-8042.json) (`2024-09-09T15:15:12.340`) -- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2024-09-09T15:15:12.560`) -- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-09T15:15:12.887`) +- [CVE-2024-44333](CVE-2024/CVE-2024-443xx/CVE-2024-44333.json) (`2024-09-09T17:15:13.120`) +- [CVE-2024-44720](CVE-2024/CVE-2024-447xx/CVE-2024-44720.json) (`2024-09-09T16:15:02.780`) +- [CVE-2024-44721](CVE-2024/CVE-2024-447xx/CVE-2024-44721.json) (`2024-09-09T16:15:02.853`) +- [CVE-2024-45406](CVE-2024/CVE-2024-454xx/CVE-2024-45406.json) (`2024-09-09T17:15:13.180`) +- [CVE-2024-8604](CVE-2024/CVE-2024-86xx/CVE-2024-8604.json) (`2024-09-09T16:15:03.203`) +- [CVE-2024-8605](CVE-2024/CVE-2024-86xx/CVE-2024-8605.json) (`2024-09-09T16:15:03.570`) ### CVEs modified in the last Commit -Recently modified CVEs: `43` +Recently modified CVEs: `32` -- [CVE-2024-39867](CVE-2024/CVE-2024-398xx/CVE-2024-39867.json) (`2024-09-09T15:19:17.710`) -- [CVE-2024-39868](CVE-2024/CVE-2024-398xx/CVE-2024-39868.json) (`2024-09-09T15:20:25.113`) -- [CVE-2024-39869](CVE-2024/CVE-2024-398xx/CVE-2024-39869.json) (`2024-09-09T15:20:59.443`) -- [CVE-2024-39870](CVE-2024/CVE-2024-398xx/CVE-2024-39870.json) (`2024-09-09T15:21:43.183`) -- [CVE-2024-39872](CVE-2024/CVE-2024-398xx/CVE-2024-39872.json) (`2024-09-09T15:24:26.130`) -- [CVE-2024-39873](CVE-2024/CVE-2024-398xx/CVE-2024-39873.json) (`2024-09-09T15:25:21.893`) -- [CVE-2024-39874](CVE-2024/CVE-2024-398xx/CVE-2024-39874.json) (`2024-09-09T15:25:33.577`) -- [CVE-2024-40709](CVE-2024/CVE-2024-407xx/CVE-2024-40709.json) (`2024-09-09T15:35:08.283`) -- [CVE-2024-40713](CVE-2024/CVE-2024-407xx/CVE-2024-40713.json) (`2024-09-09T15:35:08.970`) -- [CVE-2024-40714](CVE-2024/CVE-2024-407xx/CVE-2024-40714.json) (`2024-09-09T14:35:02.980`) -- [CVE-2024-40718](CVE-2024/CVE-2024-407xx/CVE-2024-40718.json) (`2024-09-09T14:35:03.723`) -- [CVE-2024-42021](CVE-2024/CVE-2024-420xx/CVE-2024-42021.json) (`2024-09-09T14:35:04.620`) -- [CVE-2024-42022](CVE-2024/CVE-2024-420xx/CVE-2024-42022.json) (`2024-09-09T15:35:09.917`) -- [CVE-2024-42023](CVE-2024/CVE-2024-420xx/CVE-2024-42023.json) (`2024-09-09T14:35:05.330`) -- [CVE-2024-42024](CVE-2024/CVE-2024-420xx/CVE-2024-42024.json) (`2024-09-09T14:35:06.053`) -- [CVE-2024-44838](CVE-2024/CVE-2024-448xx/CVE-2024-44838.json) (`2024-09-09T14:35:06.773`) -- [CVE-2024-44839](CVE-2024/CVE-2024-448xx/CVE-2024-44839.json) (`2024-09-09T15:35:10.797`) -- [CVE-2024-45034](CVE-2024/CVE-2024-450xx/CVE-2024-45034.json) (`2024-09-09T14:35:07.577`) -- [CVE-2024-45771](CVE-2024/CVE-2024-457xx/CVE-2024-45771.json) (`2024-09-09T15:35:11.567`) -- [CVE-2024-6910](CVE-2024/CVE-2024-69xx/CVE-2024-6910.json) (`2024-09-09T14:35:08.260`) -- [CVE-2024-7644](CVE-2024/CVE-2024-76xx/CVE-2024-7644.json) (`2024-09-09T15:15:12.197`) -- [CVE-2024-7687](CVE-2024/CVE-2024-76xx/CVE-2024-7687.json) (`2024-09-09T14:35:09.030`) -- [CVE-2024-7688](CVE-2024/CVE-2024-76xx/CVE-2024-7688.json) (`2024-09-09T14:35:09.803`) -- [CVE-2024-7689](CVE-2024/CVE-2024-76xx/CVE-2024-7689.json) (`2024-09-09T14:35:10.587`) -- [CVE-2024-7918](CVE-2024/CVE-2024-79xx/CVE-2024-7918.json) (`2024-09-09T14:35:10.777`) +- [CVE-2024-27784](CVE-2024/CVE-2024-277xx/CVE-2024-27784.json) (`2024-09-09T16:16:47.253`) +- [CVE-2024-27785](CVE-2024/CVE-2024-277xx/CVE-2024-27785.json) (`2024-09-09T16:18:45.420`) +- [CVE-2024-2911](CVE-2024/CVE-2024-29xx/CVE-2024-2911.json) (`2024-09-09T16:15:02.413`) +- [CVE-2024-2935](CVE-2024/CVE-2024-29xx/CVE-2024-2935.json) (`2024-09-09T16:15:02.587`) +- [CVE-2024-33509](CVE-2024/CVE-2024-335xx/CVE-2024-33509.json) (`2024-09-09T17:06:37.737`) +- [CVE-2024-38651](CVE-2024/CVE-2024-386xx/CVE-2024-38651.json) (`2024-09-09T17:35:02.663`) +- [CVE-2024-39498](CVE-2024/CVE-2024-394xx/CVE-2024-39498.json) (`2024-09-09T17:47:58.640`) +- [CVE-2024-39714](CVE-2024/CVE-2024-397xx/CVE-2024-39714.json) (`2024-09-09T17:35:03.387`) +- [CVE-2024-39715](CVE-2024/CVE-2024-397xx/CVE-2024-39715.json) (`2024-09-09T16:35:04.780`) +- [CVE-2024-40710](CVE-2024/CVE-2024-407xx/CVE-2024-40710.json) (`2024-09-09T17:35:04.207`) +- [CVE-2024-40711](CVE-2024/CVE-2024-407xx/CVE-2024-40711.json) (`2024-09-09T16:35:05.923`) +- [CVE-2024-40712](CVE-2024/CVE-2024-407xx/CVE-2024-40712.json) (`2024-09-09T16:35:06.673`) +- [CVE-2024-40964](CVE-2024/CVE-2024-409xx/CVE-2024-40964.json) (`2024-09-09T17:48:55.847`) +- [CVE-2024-40965](CVE-2024/CVE-2024-409xx/CVE-2024-40965.json) (`2024-09-09T17:57:18.697`) +- [CVE-2024-40967](CVE-2024/CVE-2024-409xx/CVE-2024-40967.json) (`2024-09-09T17:58:49.700`) +- [CVE-2024-40969](CVE-2024/CVE-2024-409xx/CVE-2024-40969.json) (`2024-09-09T17:59:29.787`) +- [CVE-2024-42019](CVE-2024/CVE-2024-420xx/CVE-2024-42019.json) (`2024-09-09T17:35:05.247`) +- [CVE-2024-6274](CVE-2024/CVE-2024-62xx/CVE-2024-6274.json) (`2024-09-09T16:15:27.780`) +- [CVE-2024-6275](CVE-2024/CVE-2024-62xx/CVE-2024-6275.json) (`2024-09-09T17:20:46.777`) +- [CVE-2024-6276](CVE-2024/CVE-2024-62xx/CVE-2024-6276.json) (`2024-09-09T17:20:48.280`) +- [CVE-2024-6277](CVE-2024/CVE-2024-62xx/CVE-2024-6277.json) (`2024-09-09T17:20:50.147`) +- [CVE-2024-6278](CVE-2024/CVE-2024-62xx/CVE-2024-6278.json) (`2024-09-09T17:20:52.050`) +- [CVE-2024-6279](CVE-2024/CVE-2024-62xx/CVE-2024-6279.json) (`2024-09-09T17:20:45.137`) +- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-09T16:15:02.927`) +- [CVE-2024-8517](CVE-2024/CVE-2024-85xx/CVE-2024-8517.json) (`2024-09-09T16:15:03.053`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 689f1c213e8..cbb9d926e6f 100644 --- a/_state.csv +++ b/_state.csv @@ -86975,7 +86975,7 @@ CVE-2016-3710,0,0,f9e59617883b323f95ff6f5a7a03da9d298f637e07e1bc0d7501f309b1a739 CVE-2016-3711,0,0,c83a67f72aa4c2861ef346c90cac54d305f88ed90f7be93aa656fb4e4c2c38f0,2023-02-12T23:19:22.177000 CVE-2016-3712,0,0,c7f8b4f08f7e1f6b1a1ea7bea5477b9261472b30b06cc0735ec9663f83a435d4,2023-02-12T23:19:25.750000 CVE-2016-3713,0,0,a0fd3a736659e40bc6953eb2ee96f88b830db73527d62c25a6b3e9fd4b3aae3c,2016-06-27T17:57:26.057000 -CVE-2016-3714,0,1,12047890f358fc6cf683ff6af23d89825a9fc414a9509972590d644fdd8841d0,2024-09-09T15:35:01.367000 +CVE-2016-3714,0,0,12047890f358fc6cf683ff6af23d89825a9fc414a9509972590d644fdd8841d0,2024-09-09T15:35:01.367000 CVE-2016-3715,0,0,41a429bb9cd4e58bec46c18da65f864fbf1003189981e9643c46c4b6d44f1441,2024-07-24T17:06:03.347000 CVE-2016-3716,0,0,2d621eca38580eb36b12da03d5052a9d202f297848297f9114ec53c77580c3f4,2023-02-12T23:20:02.797000 CVE-2016-3717,0,0,578985c683d019d0063f96d744b7323756592c56c56d5244a232b553f341441d,2023-02-12T23:20:04.043000 @@ -115876,7 +115876,7 @@ CVE-2018-15456,0,0,2f5375f8b0f509603fd54b269e38b48a0e84eb432e0fcde4bdc157b3e7a84 CVE-2018-15457,0,0,cdfe8cdb910400a06d0e86e52da3f71533948b4b17b6875b4bad1a18bc50537e,2019-10-09T23:35:40.640000 CVE-2018-15458,0,0,4eb5b07daaa1a3f80fe57f2e45110d3b67ae8f6a4650f78feb2a0f6ffefe59ab,2019-10-09T23:35:40.797000 CVE-2018-15459,0,0,dae7ef94e050cebb33367e92f31c861188eddb57780a1409c0e04bdc73180bad,2019-10-09T23:35:40.953000 -CVE-2018-1546,0,0,0f52c9cede5828a29aff0f3708a43e81f922dd1a36d945615816ef4c43fcedf9,2019-10-09T23:38:37.773000 +CVE-2018-1546,0,1,3445ce9333d207bad13225edf4b9047dfb47f100802c6b2ac38b0a302e5dca2d,2024-09-09T17:15:12.590000 CVE-2018-15460,0,0,042368f743de9f2440d9b065fb6145817fac73be370a0d72fa5ee01a063e76b6,2020-09-16T14:14:08.843000 CVE-2018-15461,0,0,ae67f638beec243dec718374a8e6b1c09ecf1f3102af33850b52c3310bf7421b,2019-10-09T23:35:41.280000 CVE-2018-15462,0,0,bc1e46ac08a8d665be64afdd3c2427983783a6b60ca748eaa2e219b2bc09cf74,2019-10-03T00:03:26.223000 @@ -177080,8 +177080,8 @@ CVE-2021-33631,0,0,4bb1a57fd3d7061179ee5c0b5fadd3e14fb67d29158d40a23ef4978e9cb74 CVE-2021-33632,0,0,43a59214a93b179dd702b6249acf41f30b42300f7e20046b4225555f242eea2a,2024-03-25T13:47:14.087000 CVE-2021-33633,0,0,1d3e7e2ce5a496d7680fb52d6ceddef03ab2b2de739c40081f467b0103db15d5,2024-03-25T01:51:01.223000 CVE-2021-33634,0,0,fc018a97b593180ebc66efc3271787e02d333437980e2e2373b53a0d32e0e1f0,2023-11-08T01:52:34.450000 -CVE-2021-33635,0,1,1cc558d28dbd4d265a34db235a099e52303d822dc579ae2bed87e7d5e8a9962f,2024-09-09T15:35:02.913000 -CVE-2021-33636,0,1,3e394c5e0743c35e5547dc0e89470c8c7f4c1a3f0291f97394c500ca58a9fd66,2024-09-09T15:35:03.650000 +CVE-2021-33635,0,0,1cc558d28dbd4d265a34db235a099e52303d822dc579ae2bed87e7d5e8a9962f,2024-09-09T15:35:02.913000 +CVE-2021-33636,0,0,3e394c5e0743c35e5547dc0e89470c8c7f4c1a3f0291f97394c500ca58a9fd66,2024-09-09T15:35:03.650000 CVE-2021-33637,0,0,b82226142afcda7a12981711fbe46dda28a7cfa9b79905e9871a619153029f73,2023-11-08T14:12:00.513000 CVE-2021-33638,0,0,773f59b2d260a28e8578abcb1600f2c2526fbce23df34714be75cf39335c79b7,2023-11-08T01:29:32.623000 CVE-2021-33639,0,0,61a013ecdf2663ac151a4005baef2377c4c167eb7255a50cace6e65de6850c97,2023-03-15T18:47:45.320000 @@ -237357,10 +237357,10 @@ CVE-2023-50172,0,0,0e77f8672f5cf0fb47b8becab367b19a56d5395eded77044b2dad65f5dff6 CVE-2023-50174,0,0,5231481744a295e82b51c5724a4a3afbdad4616950b393d426cf684f8bc4019b,2024-02-14T18:15:46.640000 CVE-2023-50175,0,0,1f4c148f2ad49dc23cadeda416bba9717617a9eed1ffebc27bb2042d761f8318,2024-01-02T19:53:20.863000 CVE-2023-50178,0,0,c40c2e97ab2d69359ee8f0721fedb9558db9deb2c992769442dc418c37cba827,2024-07-09T18:18:38.713000 -CVE-2023-50179,0,1,d7024dbdef420a4bf550a9373a8d6fb995c92f579a6b24fe5fa75e2141103990,2024-09-09T15:54:14.980000 +CVE-2023-50179,0,0,d7024dbdef420a4bf550a9373a8d6fb995c92f579a6b24fe5fa75e2141103990,2024-09-09T15:54:14.980000 CVE-2023-5018,0,0,cae5f64430f83fdd33bf69324906a6cb5316c44f52a942103dd4a7b86daf8ff3,2024-05-17T02:32:46.463000 CVE-2023-50180,0,0,0e74c4dab87377ea6e7224cae654f4c96addd7d2706381ea322da69706e6caba,2024-05-23T15:55:49.800000 -CVE-2023-50181,0,1,5a84e37d70919957272e5d51f6871b4bd827b2e1fb7c2fc900feed1e76dde981,2024-09-09T15:59:57.527000 +CVE-2023-50181,0,0,5a84e37d70919957272e5d51f6871b4bd827b2e1fb7c2fc900feed1e76dde981,2024-09-09T15:59:57.527000 CVE-2023-50186,0,0,eb5626d3fb1619a798ac8945adada7c6114ee10c766b40e73be4348452ca454c,2024-05-03T12:48:41.067000 CVE-2023-50187,0,0,d757836b2069286c0c133b3329a947df1bcd8e94d1a052ae3d79300c5fc19441,2024-05-03T12:48:41.067000 CVE-2023-50188,0,0,fce1750eed0dbf59574ccb3c81b94063cdbe34b2bc61cb8e594ea188d866c555,2024-05-03T12:48:41.067000 @@ -239629,7 +239629,7 @@ CVE-2023-5565,0,0,9e7b8f54cd6b3190a6c2dac08622e882b08cbd368e6fd157742d6c77ea5aee CVE-2023-5566,0,0,12be08118b98fee554154ac5f8793e6b5b39c31b38e93f8ea1a17cb1449cc8ad,2023-11-07T04:24:08.480000 CVE-2023-5567,0,0,4a809f39fc79aea2b56a0f9381e47c90d1b0a4c5eac453c3a06cd429eeaab3fa,2023-11-14T19:11:40.360000 CVE-2023-5568,0,0,38d553e6bd63422157002920ac635048886ff5ffd8fe73a158c842ea275b4377,2023-11-24T09:15:09.767000 -CVE-2023-5570,0,0,926a322c8b0a8b66350eb8ed02d05212760f38df202a1977a847bbd68d5f784b,2023-11-07T21:34:59.460000 +CVE-2023-5570,0,1,87f206bc52392a520ad049babd3b47e2251ec78d9da7033b6ff5cee06408ea7f,2024-09-09T16:35:01.990000 CVE-2023-5571,0,0,517e76e2863d0b91d16cb5f62e8628dcdcd61d5f895ca680836613c4517f20b9,2023-10-17T16:04:47.640000 CVE-2023-5572,0,0,d3874e77765ea8dd8afcd46f43f04e8854b2bc29554e637a4973cc68fd58bd1c,2023-10-17T16:08:09.450000 CVE-2023-5573,0,0,4fe63b19ad0fa3138adc11217ff249aecc853df2598d2ca13577829e18cb73dd,2023-10-17T16:08:58.677000 @@ -239677,7 +239677,7 @@ CVE-2023-5619,0,0,a19fb0d9c1ec2158ccf365d70c7c69e74f9a9e11e8a35b996d155c23740d5b CVE-2023-5620,0,0,4199d350e2e4c731dd763714d3bb3dd23b36ac346f07188e030f30ff30c41160,2023-12-02T04:36:03.177000 CVE-2023-5621,0,0,c418664501b2f113540a10fbe54573420e49f52f46bc96886f617927fd44a4ff,2023-11-07T04:24:12.930000 CVE-2023-5622,0,0,f19fe82900e70a4450099d29884259279e7aeae442e6aa22b36ae355f702bc7b,2023-11-07T18:04:15.357000 -CVE-2023-5623,0,0,60f1ad58d64cba8a36278b2a247125d7b5bacd0d8e604669415615e47be1fb7a,2023-11-07T13:49:33.017000 +CVE-2023-5623,0,1,2f3b29c1eef030c9ad5a4ede8de04f56f932e285b9b218b7356d7e60e1761594,2024-09-09T16:35:03.113000 CVE-2023-5624,0,0,ba5097aba2a2a247854c1d9b4796e1185da31c5dd8141edfd0344a8f714da575,2023-11-06T18:20:25.737000 CVE-2023-5625,0,0,ac0ecbb6ed7210743894554a366916e8815b219327e42d98b1f6277193a8851d,2024-08-01T13:45:44.543000 CVE-2023-5626,0,0,340b8c1c87a43fe8a63e58d41c520f026228ad8445e5d8be6ece89714d56eba5,2023-10-25T00:11:45.460000 @@ -244034,7 +244034,7 @@ CVE-2024-21520,0,0,a0a1b113a382a8f0d2c8531b6b39066eaa70707f33ee106e6bb420796b3de CVE-2024-21521,0,0,3d24dbb51985d4e34dfc96b8ce06b7a168669f2571a1659e2371fa09c11d0b75,2024-07-11T13:05:54.930000 CVE-2024-21522,0,0,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448bbd,2024-07-11T13:05:54.930000 CVE-2024-21523,0,0,2330ac0e4e609e6cb7b2d157ba739c957bd5fcf4369b9f17b9fa0a4336dfb21a,2024-08-01T13:46:46.460000 -CVE-2024-21524,0,0,30925466b7c2ddad2000160b050b1c4541bdd9760a254b3635b5b7c9807a13b2,2024-07-11T13:05:54.930000 +CVE-2024-21524,0,1,94f71300cc1d59487169e73d8c8122613dc6982f44c5510e0a3db2e12961d2a8,2024-09-09T17:36:33.447000 CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000 @@ -244187,7 +244187,7 @@ CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fc CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000 CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000 CVE-2024-21757,0,0,66e21018e776a45a8ac67481d369c1c7c7a16e8eeafbc02057073be569347dec,2024-08-22T14:34:54.550000 -CVE-2024-21759,0,0,0b3a459fcd9e65a646c7b0d361c2007c663819313bd3704f44988f84e4752b86,2024-07-09T18:18:38.713000 +CVE-2024-21759,0,1,d165ae3a9708367c28525bd41d7fe549357acc1e0023c89ebc6f25ff1ff9fe47,2024-09-09T16:02:11.507000 CVE-2024-2176,0,0,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000 CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000 CVE-2024-21762,0,0,84db6239690371b7c5c10ef720dbcf2d622d5440e87b70d1c21a79a857f8ea72,2024-02-13T18:21:14.607000 @@ -245474,7 +245474,7 @@ CVE-2024-23659,0,0,00fc339e96cf90505d259821db8c42ecca98975cfcf7d7475d9e6c3b75152 CVE-2024-2366,0,0,490db5028d325a3e3270a4bc51ed933daf1eb90560331895c813986c8416aa30,2024-05-16T13:03:05.353000 CVE-2024-23660,0,0,f59390a3bdd92fda69048aa3822f1db7f5498b44103925e2d96259b145eb2ed1,2024-02-15T16:01:29.370000 CVE-2024-23662,0,0,0bd2fe423ff125cd6b426da805efebc9c554fb6e799e24e8d56e6d24f2b3b973,2024-04-10T13:24:22.187000 -CVE-2024-23663,0,0,9391b83e4af7878ac8b95d5c6f0b2b986d0d42f3f96f86431d3de5a58fc2249d,2024-07-09T18:18:38.713000 +CVE-2024-23663,0,1,372849f95ab60375b328b2ae0c61e020002a890602eeef15e2074b076e06680a,2024-09-09T16:05:49.647000 CVE-2024-23664,0,0,d011c75099554e936d176a3c9a5468d2477ab8b77d1d9dbc825df199147abb3b,2024-06-03T14:46:24.250000 CVE-2024-23665,0,0,ccfa4de2b1b28a8c2ff6771f6bb08ec6cd2560932d59d5a7f456cced5fbbb5ed,2024-06-03T14:46:24.250000 CVE-2024-23667,0,0,08d118467751e068d01ea69371b6be0268151b83859ef5f994ee6bdd4d8baae1,2024-06-03T14:46:24.250000 @@ -246971,7 +246971,7 @@ CVE-2024-26004,0,0,339e2df0f2a66d2f51de2b2daab023ea4699cfa93f488c0f3f4f084b719f3 CVE-2024-26005,0,0,d7747b5e2f088b172b1a4b499ddd44f15dbf75c021bae634b0baaa69faaf4efd,2024-03-12T12:40:13.500000 CVE-2024-26007,0,0,55d7b1fce907ea25befd432aea4727d2b4a2ea48da2392fbb80290b5b9503286,2024-05-14T19:17:55.627000 CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef637e8,2024-06-13T18:36:45.417000 -CVE-2024-26015,0,0,b7ece22d92ef7c12f1e905349345059c13c985bf74aad53ed8c42090322cc9ee,2024-07-09T18:18:38.713000 +CVE-2024-26015,0,1,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000 CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000 CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156748,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 @@ -248409,8 +248409,8 @@ CVE-2024-27776,0,0,c1f24ea22b57cf55cbaee5256ab64f8b8e0305819b509c8db14f64fd5ba1e CVE-2024-2778,0,0,e878f2e24cf14ae545b32e39b137fabc7b5a57fc71abbcd24b764cc029a658e7,2024-05-17T02:38:29.967000 CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000 CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000 -CVE-2024-27784,0,0,4285259f77612f91e3ff56e89aad50964b084ec9ce271a7355dbd22b66319895,2024-07-09T18:18:38.713000 -CVE-2024-27785,0,0,e1a85dd3e9c85a3def82e7191a4ff0ecd3f87a5e732c0620db84c4915e55b0f8,2024-07-09T18:18:38.713000 +CVE-2024-27784,0,1,9a431b6f577bcf9e8b5d1ea28d4205b9a51e63d8903285008583e39957f810a6,2024-09-09T16:16:47.253000 +CVE-2024-27785,0,1,5aa2b1c34aa7772827060ffd1a09838ce85384459c438e6ee4f5946ddb57800f,2024-09-09T16:18:45.420000 CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000 CVE-2024-2779,0,0,2aa54c375187eea63fa6c956db70ce31dec68ec2b409a2e5d246e26b34790090,2024-05-17T02:38:30.057000 CVE-2024-27790,0,0,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000 @@ -249328,7 +249328,7 @@ CVE-2024-29106,0,0,38cde57fa08b3bfbd936ed7f30983e2c016824cae4d1dc840ddec9b4b278c CVE-2024-29107,0,0,23005c58ce9ee2df1002def433e2cbd83b2e28f9c719a4edb30307d771834f1f,2024-03-19T16:33:58.680000 CVE-2024-29108,0,0,cdaabe4f2cb16eb242103f0f1468c544b782290af0779b39905eb340a946864b,2024-03-19T16:33:58.680000 CVE-2024-29109,0,0,3b2d209511aa0457f6921ee84bca59e5ee9cf59236c9fd65507b599ea52d49eb,2024-03-19T16:33:58.680000 -CVE-2024-2911,0,0,ce533ee212202ed01ff393a2a3e6314b742c9af3ae67559b02320680a1860f15,2024-06-26T20:15:15.360000 +CVE-2024-2911,0,1,69fb3f57d9488dce7efad5e476c0a9718f5c486cc1255f55d06df83b940f95be,2024-09-09T16:15:02.413000 CVE-2024-29110,0,0,fc265aa4deb4be9588bd77283ee4678d3bcd9ee2a8790d504bccff2ae254e584,2024-03-19T16:33:58.680000 CVE-2024-29111,0,0,01d648d6980d11229d1c2cd345c1d0fc4ef4bfb60c43f80653e2087ace4e5fef,2024-03-19T16:33:58.680000 CVE-2024-29112,0,0,0d0beca65e379f4bb6e4903985e3ae2f48dd68ffe582c66829971c90ab80ad5e,2024-03-19T16:33:58.680000 @@ -249486,7 +249486,7 @@ CVE-2024-29320,0,0,5a88a646bd3508d4821cd8830318eb2b89fbb2c1855b58fd2a38a2afb4c1e CVE-2024-2933,0,0,d37838d7f15a38d4ea11c8a25611399fe1881ebeb49155e9b10719125430e055,2024-06-03T14:46:24.250000 CVE-2024-29338,0,0,e217df75a675560f91a966c0f38d2dc94f5bdcd1b6f253203724d0904bfebb81,2024-08-26T14:35:04.427000 CVE-2024-2934,0,0,45a0042779c7d6f34e6fbc62fd386e8f0722656936a5982b81057995fcd91a4c,2024-05-17T02:38:37.907000 -CVE-2024-2935,0,0,7d689f5767f4ecf1da00999595f1a425d48847fef9234facd7520ada78d3a34d,2024-05-17T02:38:38.003000 +CVE-2024-2935,0,1,34d6864aa9c90788d7b06b2eba324f36e7b4a9a81ef161d4acdecd1aa987310b,2024-09-09T16:15:02.587000 CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c1a,2024-03-29T12:45:02.937000 CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000 CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000 @@ -252341,7 +252341,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000 CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000 -CVE-2024-33509,0,0,942592bdaf69098a0108402855da0a06509d03aff50e0f11403c507193ff0d2c,2024-07-09T18:18:38.713000 +CVE-2024-33509,0,1,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000 CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000 CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 CVE-2024-33512,0,0,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000 @@ -252841,8 +252841,8 @@ CVE-2024-34138,0,0,20dbbb756cb87eb979ce1e52a36c7b626ace9ece92ed88fafef5235352591 CVE-2024-34139,0,0,ecfed81b989642faf7d6f5c1fba486f76641136619e29104c708ded3b536150c,2024-08-02T21:20:57.803000 CVE-2024-3414,0,0,85e73a02de53c5bccb3cd76452d1972fd78b5413987e018bf8d64db8ededd514,2024-05-17T02:39:54.160000 CVE-2024-34140,0,0,1269aab015181060e989f57b7ad7dc54b6e75ed6e5d455f61eea1d3b26960d6d,2024-08-02T21:23:27.143000 -CVE-2024-34141,0,1,41c28cac5d448e311e1245de44feed12c0272ade58e5edbe6626eb5961a57335,2024-09-09T14:01:25.947000 -CVE-2024-34142,0,1,5b7f1690cc8062791103d3bf1711a3c82045801adcb57f67228d8b9152fadb39,2024-09-09T14:01:51.820000 +CVE-2024-34141,0,0,41c28cac5d448e311e1245de44feed12c0272ade58e5edbe6626eb5961a57335,2024-09-09T14:01:25.947000 +CVE-2024-34142,0,0,5b7f1690cc8062791103d3bf1711a3c82045801adcb57f67228d8b9152fadb39,2024-09-09T14:01:51.820000 CVE-2024-34144,0,0,8414704b34c6aee2b8d5e2cc339eba978cf28a03283509f435e5b0757f4efdfc,2024-07-03T01:59:25.760000 CVE-2024-34145,0,0,38c44993a1dc70421d8e9284263c594effe0d087a5df7c7a4b3ac5e8c821ff86,2024-07-03T01:59:26.520000 CVE-2024-34146,0,0,787b7a8aac402effb291b025d8f2aec84609a236cac974fe09cd7845739a936f,2024-07-03T01:59:27.270000 @@ -252852,8 +252852,8 @@ CVE-2024-34149,0,0,bc997c41063649e77025e7b523e84ecd9251e3e152bcf881c50ffb65d2530 CVE-2024-3415,0,0,34ccb97766fc5acac460b5429af5d66fea7f850526947b377f986615d31afcf6,2024-05-17T02:39:54.247000 CVE-2024-34152,0,0,2436c8a621b0d09dd7154ff9aa9ad8e75fea3818a8a19b6b0802746c78436018,2024-05-28T12:39:28.377000 CVE-2024-34155,0,0,64e37c460754676e7cbab8f7ec11f790f32eeb0f21648d98691b68ee9a0deda9,2024-09-09T13:03:38.303000 -CVE-2024-34156,0,1,281374624716fc97e73927b0e17fc3ff10c7c3ce10cee8420a8b05daef295f7d,2024-09-09T15:35:07.573000 -CVE-2024-34158,0,1,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5bda,2024-09-09T14:35:01.170000 +CVE-2024-34156,0,0,281374624716fc97e73927b0e17fc3ff10c7c3ce10cee8420a8b05daef295f7d,2024-09-09T15:35:07.573000 +CVE-2024-34158,0,0,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5bda,2024-09-09T14:35:01.170000 CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000 CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000 CVE-2024-34163,0,0,0359aa2bf9352c87fe65864c9b7813550ee369295a4e0ccc20c368017d1c80c6,2024-08-14T17:49:14.177000 @@ -253236,11 +253236,11 @@ CVE-2024-34685,0,0,7b2238e6c0d6ba01f5b0c43be9387a7356e22cab609b2b92ef07aa910b7a9 CVE-2024-34686,0,0,e9bb1b88f368d1635fab463778c0099fa75235c21c0d77c253e89ea0001f99e2,2024-08-16T17:54:46.250000 CVE-2024-34687,0,0,2d1fb3e427c306d9f3a4e574ef26ad04ac3746abee3e170bed2385765a3ef230,2024-05-14T19:17:55.627000 CVE-2024-34688,0,0,f7195c0aa4b21b145d71d8ca8f2dd3d8f80451302ff7a5fec7e22b7dba8274ce,2024-08-09T19:45:52.623000 -CVE-2024-34689,0,1,f990d838313fa5ecb665b5d1a380a983a39ba5877a89002c8b735a954c3fb119,2024-09-09T15:31:15.670000 +CVE-2024-34689,0,0,f990d838313fa5ecb665b5d1a380a983a39ba5877a89002c8b735a954c3fb119,2024-09-09T15:31:15.670000 CVE-2024-3469,0,0,cb7a58a01dcf9e5cd221e36a17138ff3dd47e8ff2900440904514d412daa843f,2024-06-13T19:36:21.350000 CVE-2024-34690,0,0,4ea79694f7343e6dc1a88ef361ec5aab6397a7fbe3528c348fa1124a1042b2a1,2024-08-09T19:25:15.680000 CVE-2024-34691,0,0,ff3e70160c2e7eaf3e33811c3b548ab97dcede1edc55d0bb050fc2dad140445e,2024-08-16T18:08:48.763000 -CVE-2024-34692,0,1,a1031b201774e9dbcc1b7cfabf635fa7accc688002d1618f5206395a87a71f07,2024-09-09T15:33:55.200000 +CVE-2024-34692,0,0,a1031b201774e9dbcc1b7cfabf635fa7accc688002d1618f5206395a87a71f07,2024-09-09T15:33:55.200000 CVE-2024-34693,0,0,0aaa9ba78d50edebdcd2053a5f69520a0132977a44461876bfc235b9965b7cd7,2024-06-20T12:43:25.663000 CVE-2024-34694,0,0,379682f7a43e392f519649f9bebfbde90c0aee7ee0fd96bf9efedf4736084c4e,2024-06-17T12:42:04.623000 CVE-2024-34695,0,0,36bf138bd01d1a9e805dc782757743f04a6dc6cc49c353e8806ae2bd6354a5a4,2024-05-14T16:12:23.490000 @@ -254931,11 +254931,11 @@ CVE-2024-37167,0,0,8b403a23612bc52b0d647aa1a06bd5528e2a732152e9aa0e5b9c233c3dcf7 CVE-2024-37168,0,0,4b5ee69f1037f34364508ac66ea01fddc39d9641828e345c9db6ff8090485c51,2024-06-11T13:54:12.057000 CVE-2024-37169,0,0,d844eebd15b54c580e056676933f1b1a922628cb13269d7f2fd8205e27ffe212,2024-06-11T13:54:12.057000 CVE-2024-3717,0,0,6a53c3003cbd5c2c12dfecaf8fdee3a15999ce81e96eb3bfe3a5d5735223233b,2024-05-02T18:00:37.360000 -CVE-2024-37171,0,1,e67fb8228f0d7521b64a3e879cec19a1be865b0dffead40cccf4e51e0386777c,2024-09-09T15:36:45.637000 -CVE-2024-37172,0,1,8f138ca449582a67b3b5952f431cf921455929bf791f77b476255297995e895c,2024-09-09T15:41:06.010000 +CVE-2024-37171,0,0,e67fb8228f0d7521b64a3e879cec19a1be865b0dffead40cccf4e51e0386777c,2024-09-09T15:36:45.637000 +CVE-2024-37172,0,0,8f138ca449582a67b3b5952f431cf921455929bf791f77b476255297995e895c,2024-09-09T15:41:06.010000 CVE-2024-37173,0,0,5344666c1e0cddb531af6a9bc57b42f671061bfa956e11656cee997fc61edceb,2024-08-29T19:27:03.960000 CVE-2024-37174,0,0,9ee7b7b93c56662daddb97d3adf9e6471bc95a49234a325b3638d373b2a3c03d,2024-08-29T19:26:37.490000 -CVE-2024-37175,0,1,2e75968b5d051a3722a9a13599775d327d1c94984da4214e0e883674bda95669,2024-09-09T15:48:46.087000 +CVE-2024-37175,0,0,2e75968b5d051a3722a9a13599775d327d1c94984da4214e0e883674bda95669,2024-09-09T15:48:46.087000 CVE-2024-37176,0,0,3275b09004f17b6b89b755a43fa7e2802a78dd80261334da823124655666d26e,2024-08-09T18:42:31.847000 CVE-2024-37177,0,0,5c668d6fc8f89d275dab68dfc9c6e6aa2dda5828c4c067dd13278268042a6c87,2024-06-11T13:54:12.057000 CVE-2024-37178,0,0,ec0623af63b542a59bee4b0b0dc964702dff4ddb4fa5e9957a0a4c2999ed0559,2024-06-11T13:54:12.057000 @@ -255937,8 +255937,8 @@ CVE-2024-38640,0,0,e1c17685524771685f37bb6e25615d0a15108cb7e69838b158e9077bf0a27 CVE-2024-38641,0,0,df92dc238d16f057f03f190a2a0bd50146ddee0163d1cf466c523734cfde7196,2024-09-09T13:03:38.303000 CVE-2024-38642,0,0,3d8e7fc3ed981740e72aa339618d54c8baab28ebc8e7f9af1bb8a029676a3e30,2024-09-09T13:03:38.303000 CVE-2024-3865,0,0,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000 -CVE-2024-38650,0,1,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000 -CVE-2024-38651,0,0,7e5c7bdde4f0e68aae62b3f7e8ff086b824de9feeace0ba5676ac48a23cb51a5,2024-09-09T13:03:38.303000 +CVE-2024-38650,0,0,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000 +CVE-2024-38651,0,1,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000 CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000 CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000 CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000 @@ -256129,7 +256129,7 @@ CVE-2024-38993,0,0,fc2d7e57e39ddfcc6af2dbe204e666e6951361034badd73a54ed967e6430c CVE-2024-38994,0,0,52e74c8e49acf40312bab2cc0a5b12a01f19b079b47741262e8027889427648c,2024-07-03T02:05:31.113000 CVE-2024-38996,0,0,a1527cd446e6396d926036d720f3d18c64e1e77ef3f93ca65d73a82bceb3de02,2024-07-03T02:05:31.903000 CVE-2024-38997,0,0,67cc6ee46b0f88f15a47d916defc512f0d73a6fe097801b2dbae8c76c5acc9e0,2024-07-03T02:05:32.753000 -CVE-2024-38998,0,1,3b0925ddacd365a588c626b1c2ddee59a9c7fce10e672e6d248d6d30d9368792,2024-09-09T14:30:53.297000 +CVE-2024-38998,0,0,3b0925ddacd365a588c626b1c2ddee59a9c7fce10e672e6d248d6d30d9368792,2024-09-09T14:30:53.297000 CVE-2024-38999,0,0,9b50bc5436037bd68caf4dfd664d8e190d38dffb5c1ff1f9ba9cfb924ccd240d,2024-07-09T16:22:46.603000 CVE-2024-3900,0,0,0dae3ee77b7737dd7dc98eac4a82d471604ab0211f1ae6f2407cfeb20b2f5f33,2024-04-17T20:08:21.887000 CVE-2024-39000,0,0,32efdb5372127bd496fcf75bbda16a003e610532bd5eb87d5181962cfafa1b6c,2024-07-03T02:05:34.347000 @@ -256404,7 +256404,7 @@ CVE-2024-39494,0,0,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210 CVE-2024-39495,0,0,882ab91a71cdaa0b14beca48f2b2546ecf350f5bc761609487e97f811c1f052c,2024-08-20T15:35:19.527000 CVE-2024-39496,0,0,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000 CVE-2024-39497,0,0,2d6d1942d32951f62bed9c7f2b517cbb03d4fdefc867fdac7e0afd61c8c01f96,2024-07-12T16:34:58.687000 -CVE-2024-39498,0,0,8499d4fca2fef01d5519bc11ef3f5949181fc3bd80858291ae745fb8f1cf4bc0,2024-07-12T16:34:58.687000 +CVE-2024-39498,0,1,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000 CVE-2024-39499,0,0,8bd78139ee9d6c3d000d5156a9790ce67d1b2af9b3aee62da6523d24ba14e435,2024-07-12T16:34:58.687000 CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9d94,2024-07-12T16:34:58.687000 CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000 @@ -256584,8 +256584,8 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67 CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,8b5ceb8324ff1f59d883393f3c2fa903aaaabc7a64330bd1fe2b73aa3534e83b,2024-09-06T17:35:12.380000 -CVE-2024-39714,0,0,2cc1987cc7b38530ba63f46b78e02ac09f93110d9b20471444f97bf1ebab6092,2024-09-09T13:03:38.303000 -CVE-2024-39715,0,0,4d90b51c3423f76c71ae7b1b6a11258d1ae371404fb88dbbe4edf2e38b141715,2024-09-09T13:03:38.303000 +CVE-2024-39714,0,1,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000 +CVE-2024-39715,0,1,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000 CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000 CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 @@ -256659,17 +256659,17 @@ CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998 CVE-2024-3986,0,0,f831ed7921be7c8dd7c23fd078f7bb708ba961923f567ec2fde6e41a687370b3,2024-07-30T13:32:45.943000 CVE-2024-39863,0,0,c951398f9fd72a9dfacd7010e5dd70d2523f65e226c113ed4d14cefbbdbc7a2c,2024-08-01T13:55:59.780000 CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000 -CVE-2024-39865,0,1,2c7e8bebc57f85d46c59ac0674616508fa14610c3ed1fc7f548593921bc83a1a,2024-09-09T15:12:08.177000 -CVE-2024-39866,0,1,0bddfcc7166db633e0a49dd296f68c67d479c22344839cf47c4ff170603ef05d,2024-09-09T15:18:08.287000 -CVE-2024-39867,0,1,e0b523c69bf41895d3df037f6b822ca9285a09b8d9cfe0acfc9c28f6f1b409a8,2024-09-09T15:19:17.710000 -CVE-2024-39868,0,1,78ccb1e363b02e6a5457d10d342090c91e1ddd9c3baeb364919e295c1513db63,2024-09-09T15:20:25.113000 -CVE-2024-39869,0,1,2a98a7966dea8b84e0420990ca6ca60d60610e5bb2ffa0b0ee856d0ac6bd32db,2024-09-09T15:20:59.443000 +CVE-2024-39865,0,0,2c7e8bebc57f85d46c59ac0674616508fa14610c3ed1fc7f548593921bc83a1a,2024-09-09T15:12:08.177000 +CVE-2024-39866,0,0,0bddfcc7166db633e0a49dd296f68c67d479c22344839cf47c4ff170603ef05d,2024-09-09T15:18:08.287000 +CVE-2024-39867,0,0,e0b523c69bf41895d3df037f6b822ca9285a09b8d9cfe0acfc9c28f6f1b409a8,2024-09-09T15:19:17.710000 +CVE-2024-39868,0,0,78ccb1e363b02e6a5457d10d342090c91e1ddd9c3baeb364919e295c1513db63,2024-09-09T15:20:25.113000 +CVE-2024-39869,0,0,2a98a7966dea8b84e0420990ca6ca60d60610e5bb2ffa0b0ee856d0ac6bd32db,2024-09-09T15:20:59.443000 CVE-2024-3987,0,0,561d9a131ce362c85fc0fb8dcbece381148b635d585315cae7f10b34598b7939,2024-06-07T14:56:05.647000 -CVE-2024-39870,0,1,f4f5a1b62a4e2b774cca66ba202d2df839e4383c1fab2dd1630fb0ec5e81e380,2024-09-09T15:21:43.183000 +CVE-2024-39870,0,0,f4f5a1b62a4e2b774cca66ba202d2df839e4383c1fab2dd1630fb0ec5e81e380,2024-09-09T15:21:43.183000 CVE-2024-39871,0,0,e3e081733d59550559abd98a1a1d3b568ae09bad776342114b1a824ad3292212,2024-09-06T18:32:01.667000 -CVE-2024-39872,0,1,574f41ececf7bb009ac85776aa8f840f96c77ee6418907d60f3992a2c5c0d4e8,2024-09-09T15:24:26.130000 -CVE-2024-39873,0,1,4e99f53e98f7fe49b46305004213cea2cc1b90b84c121b510ca16fb04ab6c4f6,2024-09-09T15:25:21.893000 -CVE-2024-39874,0,1,1b0fc2539c0ac6bc22bd18d777d736e1cbea19ccdbf3d54727dde78f13e6ebf7,2024-09-09T15:25:33.577000 +CVE-2024-39872,0,0,574f41ececf7bb009ac85776aa8f840f96c77ee6418907d60f3992a2c5c0d4e8,2024-09-09T15:24:26.130000 +CVE-2024-39873,0,0,4e99f53e98f7fe49b46305004213cea2cc1b90b84c121b510ca16fb04ab6c4f6,2024-09-09T15:25:21.893000 +CVE-2024-39874,0,0,1b0fc2539c0ac6bc22bd18d777d736e1cbea19ccdbf3d54727dde78f13e6ebf7,2024-09-09T15:25:33.577000 CVE-2024-39875,0,0,b76f0c8a29ed6ff66b830768611b71994a8f96bbc79bbe2616adacce32860808,2024-08-07T19:23:39.247000 CVE-2024-39876,0,0,c10d95a00655ea784974456837401b1167b43b9873d48be8c6f0ce574516dd40,2024-08-07T19:26:42.817000 CVE-2024-39877,0,0,c77d04cd34c34f80c2f57f96e1d07b46b656b0a0c6825dfb1bb5b67677624ace,2024-08-01T13:56:00.307000 @@ -256927,7 +256927,7 @@ CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d31 CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000 CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000 CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 -CVE-2024-40643,1,1,a04c312db9b1f932101b834bf66d135196bcfee6846cd0548b3469f7ce4f4ae6,2024-09-09T15:15:11.597000 +CVE-2024-40643,0,0,a04c312db9b1f932101b834bf66d135196bcfee6846cd0548b3469f7ce4f4ae6,2024-09-09T15:15:11.597000 CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 @@ -256945,14 +256945,14 @@ CVE-2024-40697,0,0,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb6919 CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000 CVE-2024-40704,0,0,3edc9bce3fb2efa51a5394090ae34392088b6a2e45c2b3fd2dca38dfa067bb31,2024-08-15T20:03:13.530000 CVE-2024-40705,0,0,eaf406061f744f9b9d1df77f0e2bd923d25751eaa5d5e839a69fa1e668b20b9c,2024-08-15T19:57:34.780000 -CVE-2024-40709,0,1,b9cade7c7de2b7d37190896234716fcd464e3b6f075536b64a6ecace1ca81e79,2024-09-09T15:35:08.283000 +CVE-2024-40709,0,0,b9cade7c7de2b7d37190896234716fcd464e3b6f075536b64a6ecace1ca81e79,2024-09-09T15:35:08.283000 CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000 -CVE-2024-40710,0,0,8e4daacbd40fd3e015531e2790ded75a312056419a79fa90fc58c6daae8b7018,2024-09-09T13:03:38.303000 -CVE-2024-40711,0,0,e0dd2119a7b899af316c4bfed9f8450c17f1bc5c6e25b53e070b02a4df3c339b,2024-09-09T13:03:38.303000 -CVE-2024-40712,0,0,cb27617c19c458de42a0ecbf854d1ef4747a1c91790e61cb1ee4f15c0f48e20f,2024-09-09T13:03:38.303000 -CVE-2024-40713,0,1,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000 -CVE-2024-40714,0,1,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000 -CVE-2024-40718,0,1,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000 +CVE-2024-40710,0,1,e69c8c2858f2cb1ca9a0784717f7a4a629a4cef8cb6ad2ae23b5e076a46451c8,2024-09-09T17:35:04.207000 +CVE-2024-40711,0,1,361f1b538b9f657bc9f073bf0b7ae2c8e87e59189fa7af212f088252efa9b3ee,2024-09-09T16:35:05.923000 +CVE-2024-40712,0,1,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000 +CVE-2024-40713,0,0,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000 +CVE-2024-40714,0,0,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000 +CVE-2024-40718,0,0,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000 CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000 CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000 CVE-2024-40720,0,0,e3c4e07a5ade01e9d26666cc5005a1336c172439685cd3e2319312a77895564d,2024-08-09T14:36:35.047000 @@ -257131,12 +257131,12 @@ CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000 CVE-2024-40962,0,0,3d1366142cae87f99bee1d01922e9c3346fad92689b81dead457f2b7f460d17c,2024-07-12T16:34:58.687000 CVE-2024-40963,0,0,2a96578cd7c6af1c34baa4ac9a95077df49820df6548101e36fdd738e266e9e1,2024-07-12T16:34:58.687000 -CVE-2024-40964,0,0,8bff4d41a46ac9d6829f19fd33bf0e02f0b0ad8b80ccef4bbeb277fd43635f0c,2024-07-12T16:34:58.687000 -CVE-2024-40965,0,0,352cc308207e32882304c7073c28caa832dc56e8e28009cb7548f4ac2c04adde,2024-07-12T16:34:58.687000 +CVE-2024-40964,0,1,bd4dac04992501f9fd0e201796f1ee0c4d72c42426ef223857d38e1de010ee1d,2024-09-09T17:48:55.847000 +CVE-2024-40965,0,1,92f237bf538901b9ac55ac9b949dff9be047f3e7c43dbb137cb33205a52f1db1,2024-09-09T17:57:18.697000 CVE-2024-40966,0,0,4ce1565a3462904d8a95236c2afe6caa74a4190b9d43f1c02099c2813b4515f5,2024-07-12T16:34:58.687000 -CVE-2024-40967,0,0,78c9dc643b84c87834ced9e7f107ee113d380f1bfd9e6d254ca2d7db3d2f8f8b,2024-07-12T16:34:58.687000 +CVE-2024-40967,0,1,5718545438538db86b5a682b261aed717a2ae65dfaddd38bc85d5d6dfd9462f7,2024-09-09T17:58:49.700000 CVE-2024-40968,0,0,58b9d422fff97fcd02e7db46722391c97023d99d4c5142a1da4df7b00c917750,2024-07-12T16:34:58.687000 -CVE-2024-40969,0,0,1bfcf25708256f5d6b8c0904795150b0cc613140a89c50ec7cf4a3ac71e586a1,2024-07-12T16:34:58.687000 +CVE-2024-40969,0,1,bd76f22baee998edd0eecd2dc4390c859ca101f12b7c1b85df829c6cdeb35103,2024-09-09T17:59:29.787000 CVE-2024-4097,0,0,66ffa92526301cf6212a4835a680920c0ae3100deab31b53b6ec7270ebab3252,2024-05-02T18:00:37.360000 CVE-2024-40970,0,0,d88eb9e98b544c6dabc96abad6de0495364e0a940487d036ee8839c00f74ddcc,2024-07-12T16:34:58.687000 CVE-2024-40971,0,0,3a1ab5847a8c301b704d8bdd427dc329bf7ad68865a6fa0d6bfff5bf33c1b1e6,2024-07-12T16:34:58.687000 @@ -257728,13 +257728,13 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 -CVE-2024-42019,0,0,fc63ec3b5cc837684bb1c5b283ec5c555ca44a9775f1f47d31a6429008fd66aa,2024-09-09T13:03:38.303000 +CVE-2024-42019,0,1,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 CVE-2024-42020,0,0,37c4c1406166ec6fd5ab227fac5e61169cbd195ea42942d8bd175d493c4f9eb1,2024-09-09T13:03:38.303000 -CVE-2024-42021,0,1,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000 -CVE-2024-42022,0,1,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce39756e,2024-09-09T15:35:09.917000 -CVE-2024-42023,0,1,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000 -CVE-2024-42024,0,1,eea273d7d39998984ace805bb73fbe19d77f000a62e0385bbb38378893265667,2024-09-09T14:35:06.053000 +CVE-2024-42021,0,0,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000 +CVE-2024-42022,0,0,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce39756e,2024-09-09T15:35:09.917000 +CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000 +CVE-2024-42024,0,0,eea273d7d39998984ace805bb73fbe19d77f000a62e0385bbb38378893265667,2024-09-09T14:35:06.053000 CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000 CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000 CVE-2024-42030,0,0,59fa56f47f76e92b6c6c6a3fdcb37d68b092a6ac90822c136b288bb49e8250df,2024-08-20T16:55:16.100000 @@ -258859,6 +258859,7 @@ CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c7109 CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000 CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 +CVE-2024-44333,1,1,a217e37b46b027f8dd7a13c3184f55fdcbee3b3214e03688ea541390163afd0a,2024-09-09T17:15:13.120000 CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000 CVE-2024-44340,0,0,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000 CVE-2024-44341,0,0,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000 @@ -258866,7 +258867,7 @@ CVE-2024-44342,0,0,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb7 CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000 CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000 -CVE-2024-44375,1,1,c2ae69cbc723aea7579455f6ebc15cdc81a4940d69f5da87c1c2bddc9c15de6e,2024-09-09T14:15:14.290000 +CVE-2024-44375,0,0,c2ae69cbc723aea7579455f6ebc15cdc81a4940d69f5da87c1c2bddc9c15de6e,2024-09-09T14:15:14.290000 CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000 CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000 CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000 @@ -258925,6 +258926,8 @@ CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037 CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000 CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000 CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000 +CVE-2024-44720,1,1,315d4d2a0bd3c25c50b9c634960d467a7635424632644997a922df1d0e7e35ef,2024-09-09T17:35:06.057000 +CVE-2024-44721,1,1,b7a3f0061045e2f9816c8d1362a21479689750c2938d1c13b4ea274c91b49d8b,2024-09-09T16:15:02.853000 CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000 CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 @@ -258957,8 +258960,8 @@ CVE-2024-44820,0,0,23715176f3bb998fe09881aa49c8309f9c9998e3ed78bd103540e1e827823 CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000 CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000 CVE-2024-44837,0,0,af289e308b7ef679646ea84b321f67c69f09e8e064f0783e312580da955007a4,2024-09-06T16:46:26.830000 -CVE-2024-44838,0,1,bdab5f75d8cb8f6b0603423cee486234c8e916846deeaf4e5d878bd69f318676,2024-09-09T14:35:06.773000 -CVE-2024-44839,0,1,885e68fd6f69d801656f2631b61b0e83db0adf5a0433070a496847aecb0b73e1,2024-09-09T15:35:10.797000 +CVE-2024-44838,0,0,bdab5f75d8cb8f6b0603423cee486234c8e916846deeaf4e5d878bd69f318676,2024-09-09T14:35:06.773000 +CVE-2024-44839,0,0,885e68fd6f69d801656f2631b61b0e83db0adf5a0433070a496847aecb0b73e1,2024-09-09T15:35:10.797000 CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000 CVE-2024-44844,0,0,d7edb2946c54286eb06291f1bb0ae1e0cb5e3a83126388a72075b84fdd746e33,2024-09-09T13:03:38.303000 CVE-2024-44845,0,0,84e2ecc1fd17f5d60179e3847f33ab1653ec969cd3a24d664be1cdba966a3b62,2024-09-09T13:03:38.303000 @@ -259069,14 +259072,14 @@ CVE-2024-45008,0,0,37dc0718d2dd8ba9fb7eca159ff733be9b954368896d4dc7e665604ee4c36 CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b2205353433a,2024-06-04T19:20:39.640000 CVE-2024-4502,0,0,f1f89a01c722d6ef2e85e855b85895e43fc279ff3a13e0257efd22aaa2b4c544,2024-06-04T19:20:39.747000 CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000 -CVE-2024-45034,0,1,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000 +CVE-2024-45034,0,0,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000 CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000 CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000 CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000 CVE-2024-45039,0,0,73f90f9455839525425d48713bfe0ff12a525d69b4089ad55a03f7d130bbe254,2024-09-06T16:46:26.830000 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 CVE-2024-45040,0,0,66fa952a980adfe3c28c0b6707b447d68c76ae01c0168cd5a5130d4c4798d20c,2024-09-06T16:46:26.830000 -CVE-2024-45041,1,1,76e90f035276fcf866db491ee4611b3feb28ed2e3671a49528af002652301a08,2024-09-09T15:15:11.940000 +CVE-2024-45041,0,0,76e90f035276fcf866db491ee4611b3feb28ed2e3671a49528af002652301a08,2024-09-09T15:15:11.940000 CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000 CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000 CVE-2024-45046,0,0,de3e74d0bfabac0255c06ca581d92948e03ddaa7217a0f0cf71d9507430ac3e4,2024-09-04T17:32:51.960000 @@ -259211,6 +259214,7 @@ CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b91 CVE-2024-45400,0,0,af1e2f79a14b2efa09c2579698273d7be8e8e6f2c9b71f5e572cda7963b006a6,2024-09-06T12:08:04.550000 CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd48835a,2024-09-06T12:08:21.290000 CVE-2024-45405,0,0,e0983766e4b3d0668ba058c09b44bc2ee123196af9d88b08813ded0853cf5b2e,2024-09-06T16:46:26.830000 +CVE-2024-45406,1,1,bcbca4ccebf0fc90e19317fc2128c582fbe2f397d8d5fee9fa03c673c61e6676,2024-09-09T17:15:13.180000 CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000 @@ -259290,7 +259294,7 @@ CVE-2024-45751,0,0,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46 CVE-2024-45758,0,0,2ae57583ed5e6b6b71b00c8e123d728a65162c35712be784f078e8924fe4539a,2024-09-06T18:35:13.043000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 -CVE-2024-45771,0,1,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000 +CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000 CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000 CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac1782253,2024-05-14T15:44:07.607000 CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000 @@ -260741,12 +260745,12 @@ CVE-2024-6270,0,0,afb158e2a27846102675d7c9b52684128d3f9cc58ddd69c86dbb7ca5aa6443 CVE-2024-6271,0,0,427d631db618dffd77aaff0c6f93b041e9536bc7bd39022d5cb6f3d2036ef186,2024-08-01T14:00:18.090000 CVE-2024-6272,0,0,f7daf3f4a3aace9a87ac703b7515196ea33a67e89fc732d0dfedb60e5408f0c9,2024-08-01T15:35:19.753000 CVE-2024-6273,0,0,d046e8009aa5553aa5bf1fd3a64a9eb55ab80ff6184fba9c23626c1afd5e8440,2024-09-06T16:54:20.973000 -CVE-2024-6274,0,0,94c6587c1855551141a3e7938b9219cf4669665fd98c0aaa76cdad50f25d0491,2024-06-24T12:57:36.513000 -CVE-2024-6275,0,0,f2d5974530bc456b631957816b5a13c0afcae0737fc51045646d8855f7d13ef3,2024-06-25T16:15:25.923000 -CVE-2024-6276,0,0,953eb5cf72f1a18fd0a7cd9b55bd985bd1378bad5499931c2fa5b21cdcbd168c,2024-06-24T15:15:12.200000 -CVE-2024-6277,0,0,896f8a9030cb3d0e10b19f0d1686f1a0541d7b712108f3958905e9063da1ba76,2024-06-24T15:15:12.297000 -CVE-2024-6278,0,0,32b451e1b397e0b46c6c8a83366e2193de9e2a2b3edaadfee59f60e6342ae183,2024-06-24T14:15:13.293000 -CVE-2024-6279,0,0,34fa8ecf4323d69d73350c0ff99d9253bc189a156b750996ccd29f3da26f84ab,2024-06-26T20:15:17.003000 +CVE-2024-6274,0,1,db8bfacbab3e41e186c76ac517f910a1d0628ea50e93784530b08ac7956bf39d,2024-09-09T16:15:27.780000 +CVE-2024-6275,0,1,7cbccc39bde4a795cde54afdb3fc1b8b532ed328b618c2b10a8f716c6775006e,2024-09-09T17:20:46.777000 +CVE-2024-6276,0,1,a54e62a78dc8ca63b29b87fd05364fc7b8a2f230b48b77f2d716d5640107aff7,2024-09-09T17:20:48.280000 +CVE-2024-6277,0,1,cdc407f78f971611f7a162adf54a64c93a9cb94e3239cd776401700e75ae18bc,2024-09-09T17:20:50.147000 +CVE-2024-6278,0,1,44e714c26cb355fc7151b5bc59b1bd0ad888f3163c616812254e232f41e36230,2024-09-09T17:20:52.050000 +CVE-2024-6279,0,1,13e2bebdf8f75f5bcea80028fb949946ceaffa8ad5d5cab73b12b8ae8b57c011,2024-09-09T17:20:45.137000 CVE-2024-6280,0,0,53e9097fb099dd3ec6185a9b8b59575874e3b050c48e208cc0f20896ca10b944,2024-09-06T16:52:22.133000 CVE-2024-6281,0,0,709a859f49498e3e71bff09d88107556f15663d7c1ae6811fce3a162e288bb4f,2024-07-22T13:00:53.287000 CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000 @@ -261204,7 +261208,7 @@ CVE-2024-6905,0,0,d2866e0a7d3747dac026ea98f4db9a35d905d0462b1cfb352305554736cc69 CVE-2024-6906,0,0,443e7519587f09813d3604bd2f060eb5fd20e9ad214121b65d696b6b4cd41fa5,2024-07-30T16:29:47.097000 CVE-2024-6907,0,0,9c6270ce9f9c570726d59d5bb26a5447e18c4636767aab7051423d31252e8bfe,2024-07-30T16:29:32.840000 CVE-2024-6908,0,0,39238ceecec75ca0113efef9ebf9de02325a2ecd066a43e78f16c4451849b776,2024-07-22T13:00:53.287000 -CVE-2024-6910,0,1,f2ed544b366d5f927a78e194a0d7c1a8783c058f2e24ef5344fdc371d00f4827,2024-09-09T14:35:08.260000 +CVE-2024-6910,0,0,f2ed544b366d5f927a78e194a0d7c1a8783c058f2e24ef5344fdc371d00f4827,2024-09-09T14:35:08.260000 CVE-2024-6911,0,0,d1b9d39eb3bb8ebb3934fda1e3b9f404c596e1cca0d98b484bc5bed837f5d646,2024-07-24T12:55:13.223000 CVE-2024-6912,0,0,3c65faab1f258fca4a54b1dfa1909614385f3b9406f126d28351856c324b7a3b,2024-07-24T12:55:13.223000 CVE-2024-6913,0,0,a1e0a3537af4550f8eea980e4a1a05a6857aad018f9d3be30c6504fe1f19569f,2024-07-24T12:55:13.223000 @@ -261293,7 +261297,7 @@ CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400 CVE-2024-7012,0,0,f0e0d2f8670ad7a792afb91a6b1a381690a310d17396ef501ada2605889c18fa,2024-09-05T21:39:20.950000 CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 -CVE-2024-7015,1,1,a37549cf37e709a8db2d5e78b8cfa589e277c584ce2636170c10712178ad247b,2024-09-09T14:15:14.430000 +CVE-2024-7015,0,0,a37549cf37e709a8db2d5e78b8cfa589e277c584ce2636170c10712178ad247b,2024-09-09T14:15:14.430000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 CVE-2024-7029,0,0,771467b06f5734847da574d5da21068e3e7ec9c8571a268614524f88178f1827,2024-08-30T21:15:14.420000 CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000 @@ -261728,7 +261732,7 @@ CVE-2024-7640,0,0,a904ac98281d1ae12fa6cf830538035c8287c0eff0403b9351fbe43bd7af15 CVE-2024-7641,0,0,31531d7ba6c4790873e3e2cbb5e0f029b43c16ba80a6eb72b0be87c407522388,2024-08-15T18:17:06.590000 CVE-2024-7642,0,0,7529ae7f3e258c0bacf9321b53a5a8cb22d41a7a410253e46b217922db56c34d,2024-08-15T18:17:34.597000 CVE-2024-7643,0,0,561f361e340de6652f3552e8a31740bd4d6ceba659a82983fde2458aeab94c1a,2024-08-15T18:18:22.827000 -CVE-2024-7644,0,1,e63d0a9dda91ba6db40f6f1d421591ac281d9566d29d32a71e7615a7e1c58496,2024-09-09T15:15:12.197000 +CVE-2024-7644,0,0,e63d0a9dda91ba6db40f6f1d421591ac281d9566d29d32a71e7615a7e1c58496,2024-09-09T15:15:12.197000 CVE-2024-7645,0,0,96cf494c675c38f631be8ab24881ec75b542e3b7a70aa5d3b002279709a08889,2024-08-19T17:48:06.303000 CVE-2024-7646,0,0,0e47e4757200b360ac0ac2cd875beb2809de05dd15d4a2274662b759af795194,2024-08-19T13:00:23.117000 CVE-2024-7647,0,0,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1e6,2024-08-21T12:30:33.697000 @@ -261761,9 +261765,9 @@ CVE-2024-7683,0,0,0e60e4af191d77a965d4296d84a49c07e8af0f778b10dae064ea9d4491f47a CVE-2024-7684,0,0,d5d03d6072e24fe97ebcaeddd6f0cfafbf610fe9d74f716df9c156507bb7719f,2024-08-20T13:53:24.447000 CVE-2024-7685,0,0,ef97cee3c3f9504d8f3d2a571167ba3304a1e5ad3165b46e778fa46938b19988,2024-08-20T13:53:51.947000 CVE-2024-7686,0,0,f064743866c554c4f2e90ed0b10058d3ac9c7fa057a74b3ddc10388a40d22334,2024-08-20T14:03:12.533000 -CVE-2024-7687,0,1,ff01fbd87f46ca31e8f3d10833f95f2a29331d146df59252c62ef841397872f4,2024-09-09T14:35:09.030000 -CVE-2024-7688,0,1,3e3048b4d79bdc6082a04ce55b0c1ccdfd0443d9392853878d08b0a9441df216,2024-09-09T14:35:09.803000 -CVE-2024-7689,0,1,7656509204534709decd1cab2d065f8ad876c473db0288eeff091af7c4fac844,2024-09-09T14:35:10.587000 +CVE-2024-7687,0,0,ff01fbd87f46ca31e8f3d10833f95f2a29331d146df59252c62ef841397872f4,2024-09-09T14:35:09.030000 +CVE-2024-7688,0,0,3e3048b4d79bdc6082a04ce55b0c1ccdfd0443d9392853878d08b0a9441df216,2024-09-09T14:35:09.803000 +CVE-2024-7689,0,0,7656509204534709decd1cab2d065f8ad876c473db0288eeff091af7c4fac844,2024-09-09T14:35:10.587000 CVE-2024-7690,0,0,d641c397b389582990875041f83e3f7cf4b821780cef851109280aeeabb26909,2024-09-03T14:35:08.507000 CVE-2024-7691,0,0,be3e7969d66daef31c8f4d2ca08f6fc545d3ce4a9f5e0f354c807322de787fd3,2024-09-03T16:35:11.383000 CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b483,2024-09-03T16:35:12.363000 @@ -261891,7 +261895,7 @@ CVE-2024-7913,0,0,3ca4516cfde0ec40156a2de25faf85d000b43871724e778a5c8d5e9733f228 CVE-2024-7914,0,0,360cef7c15cef40e34b5743ca5d838d36fa6ba30c6337dbb0cc4fd0cdd37714c,2024-08-19T16:12:51.837000 CVE-2024-7916,0,0,2890180016b54dc9da9d7caa383969ad75f3180954e602dd9178d25d09afddce,2024-08-20T19:38:11.163000 CVE-2024-7917,0,0,1232374447889b44f95a3651db2b7e919b58eb5c9a0d77c398ae62eee2338564,2024-08-21T12:30:34.283000 -CVE-2024-7918,0,1,b27817e14af75484fa42e05d953de78e8f6ce99b51521eb7ec7ca526a426118b,2024-09-09T14:35:10.777000 +CVE-2024-7918,0,0,b27817e14af75484fa42e05d953de78e8f6ce99b51521eb7ec7ca526a426118b,2024-09-09T14:35:10.777000 CVE-2024-7919,0,0,1863f3ded361827cbb07eac1eea3f3ab9748bf8576157da3db06c534b87a214c,2024-08-21T12:30:01.187000 CVE-2024-7920,0,0,03604c94082c1da3fc5c107dc3e686ed281b4a09d67a2a74662346c68cad27ae,2024-08-21T12:31:20.663000 CVE-2024-7921,0,0,0f227aa56af57464e66f96a1f8f7af9df81009de406656147353a8e23b801955,2024-08-21T12:34:04.490000 @@ -261963,7 +261967,7 @@ CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fc CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 CVE-2024-8041,0,0,6cc075dd4dd503d7a64ec1eb36d717de84b169042dbabd262ae9b25dfe6faf7c,2024-08-23T16:18:28.547000 -CVE-2024-8042,1,1,fff5d3a74bcd7a118083cddbd0cfac12e08a7843571e00308c3cc8aa8f2b757f,2024-09-09T15:15:12.340000 +CVE-2024-8042,0,0,fff5d3a74bcd7a118083cddbd0cfac12e08a7843571e00308c3cc8aa8f2b757f,2024-09-09T15:15:12.340000 CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 @@ -262125,8 +262129,8 @@ CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927b CVE-2024-8368,0,0,e041f44a528823075791907fb829fe4e23ee08e4bad517d1712c799858033925,2024-09-03T12:59:02.453000 CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a09,2024-09-03T14:15:17.787000 CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000 -CVE-2024-8372,1,1,2792f9d8fc26192f2671e203534099dfcbde4d0179752e976e32f88cec413d35,2024-09-09T15:15:12.560000 -CVE-2024-8373,1,1,1722d285f33756679044e475509012f93960f00a816512e5e1c7ffc95f14c6c1,2024-09-09T15:15:12.887000 +CVE-2024-8372,0,0,2792f9d8fc26192f2671e203534099dfcbde4d0179752e976e32f88cec413d35,2024-09-09T15:15:12.560000 +CVE-2024-8373,0,1,ca541a80f0aad718210fd95191cc74ae91005590cfc887f71e4ebdc821b651ae,2024-09-09T16:15:02.927000 CVE-2024-8374,0,0,9f8f53baf1bfbc489185aa032a32ccc1ef270e4caf925e0db81beb808ee10da0,2024-09-03T12:59:02.453000 CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000 CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000 @@ -262174,7 +262178,7 @@ CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918c CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000 CVE-2024-8509,0,0,607386a7561a0cf76a75ba79c4a5e02f31641d78da4de1b4e77855ea4dab4759,2024-09-06T16:46:26.830000 -CVE-2024-8517,0,0,dd54451250ef733f34d101e59543ab502b0f838be96aeb1d29d2d441533a5eed,2024-09-06T16:46:26.830000 +CVE-2024-8517,0,1,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000 CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000 CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000 CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000 @@ -262210,3 +262214,5 @@ CVE-2024-8584,0,0,7c7ad2063aa233a836e9a59682cb05dfcb95a707aa850cd9ec5b817e03f5e1 CVE-2024-8585,0,0,9988d1ca177f24ec925e5066ed58d9d8a162814f82b8247fbc323ff8f14711cf,2024-09-09T13:03:38.303000 CVE-2024-8586,0,0,d2fff35b7bace3dc5314f28642480fa5fad7af57500e2b190be70f1f2b91fb56,2024-09-09T13:03:38.303000 CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000 +CVE-2024-8604,1,1,f8b7b7c3ac8ec659db72b62715d729cc6c8fc244da32bec2a2343fe3141c4500,2024-09-09T16:15:03.203000 +CVE-2024-8605,1,1,9804f309cecb16f6ee9b2ecaaae8931160ed1bde4e8a34dda2a863907695a175,2024-09-09T16:15:03.570000