Auto-Update: 2024-11-13T07:00:20.168599+00:00

This commit is contained in:
cad-safe-bot 2024-11-13 07:03:20 +00:00
parent 48ac196a3e
commit 6a3faf2253
13 changed files with 936 additions and 32 deletions

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-10575",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-11-13T05:15:11.233",
"lastModified": "2024-11-13T05:15:11.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-862: Missing Authorization vulnerability exists that could cause unauthorized access when enabled on\nthe network and potentially impacting connected devices."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-04/SEVD-2024-317-04.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10800",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T05:15:11.680",
"lastModified": "2024-11-13T05:15:11.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress User Extra Fields plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the ajax_save_fields() function in all versions up to, and including, 16.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to add custom fields that can be updated and then use the check_and_overwrite_wp_or_woocommerce_fields function to update the wp_capabilities field to have administrator privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/user-extra-fields/12949844",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a18fa7e6-813d-4b48-bd4e-5232fb8382d1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11150",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T05:15:12.337",
"lastModified": "2024-11-13T05:15:12.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 16.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/user-extra-fields/12949844",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad39d797-9230-41d9-a335-864845b56aa0?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-21540",
"sourceIdentifier": "report@snyk.io",
"published": "2024-11-13T05:15:12.997",
"lastModified": "2024-11-13T05:15:12.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package source-map-support are vulnerable to Directory Traversal in the retrieveSourceMap function."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/mcoimbra/0f889d69b39c1c09aa6a8c001072402e",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-SOURCEMAPSUPPORT-6112477",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21541",
"sourceIdentifier": "report@snyk.io",
"published": "2024-11-13T05:15:14.680",
"lastModified": "2024-11-13T05:15:14.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-52268",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-13T06:15:14.903",
"lastModified": "2024-11-13T06:15:14.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability exists in VK All in One Expansion Unit versions prior to 9.100.1.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing the web site using the product."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN05136799/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://vektor-inc.co.jp/en/update/regarding-vulnerabilities-in-vk-all-in-one-expansion-unit-version-9-100-0-and-earlier/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-8935",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-11-13T05:15:19.673",
"lastModified": "2024-11-13T05:15:19.673",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-290: Authentication Bypass by Spoofing vulnerability exists that could cause a denial of service and loss\nof confidentiality and integrity of controllers when conducting a Man-In-The-Middle attack between the\ncontroller and the engineering workstation while a valid user is establishing a communication session. This\nvulnerability is inherent to Diffie Hellman algorithm which does not protect against Man-In-The-Middle attacks."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-02/SEVD-2024-317-02.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-8936",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-11-13T05:15:20.540",
"lastModified": "2024-11-13T05:15:20.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-20: Improper Input Validation vulnerability exists that could lead to loss of confidentiality of controller memory\nafter a successful Man-In-The-Middle attack followed by sending a crafted Modbus function call used to tamper\nwith memory."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.3,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-03/SEVD-2024-317-03.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-8937",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-11-13T05:15:22.613",
"lastModified": "2024-11-13T05:15:22.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could\ncause a potential arbitrary code execution after a successful Man-In-The Middle attack followed by sending a\ncrafted Modbus function call to tamper with memory area involved in the authentication process."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.3,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-03/SEVD-2024-317-03.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-8938",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-11-13T05:15:25.727",
"lastModified": "2024-11-13T05:15:25.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could\ncause a potential arbitrary code execution after a successful Man-In-The-Middle attack followed by sending a\ncrafted Modbus function call to tamper with memory area involved in memory size computation."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.2,
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-03/SEVD-2024-317-03.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-9409",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-11-13T05:15:27.610",
"lastModified": "2024-11-13T05:15:27.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-400: An Uncontrolled Resource Consumption vulnerability exists that could cause the device to become\nunresponsive resulting in communication loss when a large amount of IGMP packets is present in the network."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-01/SEVD-2024-317-01.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-13T05:00:21.193253+00:00
2024-11-13T07:00:20.168599+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-13T04:15:05.037000+00:00
2024-11-13T06:15:14.903000+00:00
```
### Last Data Feed Release
@ -33,27 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
269461
269472
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `11`
- [CVE-2024-10174](CVE-2024/CVE-2024-101xx/CVE-2024-10174.json) (`2024-11-13T04:15:03.553`)
- [CVE-2024-10529](CVE-2024/CVE-2024-105xx/CVE-2024-10529.json) (`2024-11-13T03:15:03.700`)
- [CVE-2024-10530](CVE-2024/CVE-2024-105xx/CVE-2024-10530.json) (`2024-11-13T03:15:03.923`)
- [CVE-2024-10531](CVE-2024/CVE-2024-105xx/CVE-2024-10531.json) (`2024-11-13T03:15:04.153`)
- [CVE-2024-10593](CVE-2024/CVE-2024-105xx/CVE-2024-10593.json) (`2024-11-13T03:15:04.370`)
- [CVE-2024-10684](CVE-2024/CVE-2024-106xx/CVE-2024-10684.json) (`2024-11-13T03:15:04.600`)
- [CVE-2024-10794](CVE-2024/CVE-2024-107xx/CVE-2024-10794.json) (`2024-11-13T04:15:03.850`)
- [CVE-2024-10802](CVE-2024/CVE-2024-108xx/CVE-2024-10802.json) (`2024-11-13T04:15:04.087`)
- [CVE-2024-10816](CVE-2024/CVE-2024-108xx/CVE-2024-10816.json) (`2024-11-13T04:15:04.300`)
- [CVE-2024-10820](CVE-2024/CVE-2024-108xx/CVE-2024-10820.json) (`2024-11-13T04:15:04.510`)
- [CVE-2024-10828](CVE-2024/CVE-2024-108xx/CVE-2024-10828.json) (`2024-11-13T04:15:04.727`)
- [CVE-2024-10882](CVE-2024/CVE-2024-108xx/CVE-2024-10882.json) (`2024-11-13T03:15:04.833`)
- [CVE-2024-11143](CVE-2024/CVE-2024-111xx/CVE-2024-11143.json) (`2024-11-13T03:15:05.110`)
- [CVE-2024-8933](CVE-2024/CVE-2024-89xx/CVE-2024-8933.json) (`2024-11-13T04:15:05.037`)
- [CVE-2024-10575](CVE-2024/CVE-2024-105xx/CVE-2024-10575.json) (`2024-11-13T05:15:11.233`)
- [CVE-2024-10800](CVE-2024/CVE-2024-108xx/CVE-2024-10800.json) (`2024-11-13T05:15:11.680`)
- [CVE-2024-11150](CVE-2024/CVE-2024-111xx/CVE-2024-11150.json) (`2024-11-13T05:15:12.337`)
- [CVE-2024-21540](CVE-2024/CVE-2024-215xx/CVE-2024-21540.json) (`2024-11-13T05:15:12.997`)
- [CVE-2024-21541](CVE-2024/CVE-2024-215xx/CVE-2024-21541.json) (`2024-11-13T05:15:14.680`)
- [CVE-2024-52268](CVE-2024/CVE-2024-522xx/CVE-2024-52268.json) (`2024-11-13T06:15:14.903`)
- [CVE-2024-8935](CVE-2024/CVE-2024-89xx/CVE-2024-8935.json) (`2024-11-13T05:15:19.673`)
- [CVE-2024-8936](CVE-2024/CVE-2024-89xx/CVE-2024-8936.json) (`2024-11-13T05:15:20.540`)
- [CVE-2024-8937](CVE-2024/CVE-2024-89xx/CVE-2024-8937.json) (`2024-11-13T05:15:22.613`)
- [CVE-2024-8938](CVE-2024/CVE-2024-89xx/CVE-2024-8938.json) (`2024-11-13T05:15:25.727`)
- [CVE-2024-9409](CVE-2024/CVE-2024-94xx/CVE-2024-9409.json) (`2024-11-13T05:15:27.610`)
### CVEs modified in the last Commit

View File

@ -242520,7 +242520,7 @@ CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc0581197
CVE-2024-10170,0,0,43858dc94e553ea996e2f62171c2a07580bf4384f9d10283ecd355d244289e84,2024-10-21T21:33:49.663000
CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5aea60,2024-10-21T21:33:26.937000
CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000
CVE-2024-10174,1,1,9807bb358c26b24a2ff04acb66625a11807e577d18aaa0a98bbb882bd92a103e,2024-11-13T04:15:03.553000
CVE-2024-10174,0,0,9807bb358c26b24a2ff04acb66625a11807e577d18aaa0a98bbb882bd92a103e,2024-11-13T04:15:03.553000
CVE-2024-10176,0,0,142987a8f419783b163ba6354525e6bb8e3054620537017112986773c0d037e4,2024-10-25T12:56:07.750000
CVE-2024-10179,0,0,b6f906bf2251f6ec1278434f5e59f81c6d3b24bc371546ed64bbf189a1c8b783,2024-11-12T13:55:21.227000
CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000
@ -242752,10 +242752,10 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e15b,2024-11-08T19:01:03.880000
CVE-2024-10529,1,1,84ecb254a24b568669a894e1b78ecb90b47df7a444eae376718ed3efe4d3e42b,2024-11-13T03:15:03.700000
CVE-2024-10529,0,0,84ecb254a24b568669a894e1b78ecb90b47df7a444eae376718ed3efe4d3e42b,2024-11-13T03:15:03.700000
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
CVE-2024-10530,1,1,eb3d6b187200587035bd6161353ae958de61da35350030d7e509e8724dc73140,2024-11-13T03:15:03.923000
CVE-2024-10531,1,1,f769cc79ad6c534282d1821bd61ffa225c3443ea27b258168645c884602bd164,2024-11-13T03:15:04.153000
CVE-2024-10530,0,0,eb3d6b187200587035bd6161353ae958de61da35350030d7e509e8724dc73140,2024-11-13T03:15:03.923000
CVE-2024-10531,0,0,f769cc79ad6c534282d1821bd61ffa225c3443ea27b258168645c884602bd164,2024-11-13T03:15:04.153000
CVE-2024-10535,0,0,14a566633b856f0bcfd07185d246772590c919ba8cb5a244786d38adaffa8830,2024-11-08T21:19:27.540000
CVE-2024-10538,0,0,4ab251483fb21027e3e4f8d5203aec3b7b19274377f176e91d194b41d48f7f4e,2024-11-12T13:55:21.227000
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
@ -242772,13 +242772,14 @@ CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca532512
CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
CVE-2024-10575,1,1,bab416c795a118cffaa71dd0de65e2143a4bd7e5635814805c704b33fe3af1cc,2024-11-13T05:15:11.233000
CVE-2024-10577,0,0,666be720c41d5a9b892f1e5087fcf53fa7b2599f140df5e0e9540e263492fb77,2024-11-13T02:15:13.807000
CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000
CVE-2024-10586,0,0,f1f769b86eb6d000daef591c5f367193d87a3d50622221457cbf9ad14bf94bab,2024-11-12T13:56:54.483000
CVE-2024-10588,0,0,c2bcaed6fe7b435f43e9c22f77453914df70e3466f4c66fa7dbe7829c2fb6e04,2024-11-12T13:56:24.513000
CVE-2024-10589,0,0,a6d8f39b47e9cb3150ad138c8d50791b37f1119d54a24371f819b9a1d868ac19,2024-11-12T13:56:24.513000
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
CVE-2024-10593,1,1,8c8ca3f93fd2e22a86706eef81490a21474414bc7113101b63c11678b8b8e881,2024-11-13T03:15:04.370000
CVE-2024-10593,0,0,8c8ca3f93fd2e22a86706eef81490a21474414bc7113101b63c11678b8b8e881,2024-11-13T03:15:04.370000
CVE-2024-10594,0,0,015abb205f2a621c92b02e8c535085d082f03901ef52c99004ce024df21aac90,2024-11-05T17:05:10.533000
CVE-2024-10595,0,0,d179e6b790ca43e523540de6b39a763d6d0e5ba29d81ee639fa2f43517880b37,2024-11-01T20:57:26.027000
CVE-2024-10596,0,0,e577a1bc49113e32decc51f28cd54bd130c95b97448380193826560332b3fbe2,2024-11-05T16:20:13.623000
@ -242838,7 +242839,7 @@ CVE-2024-10674,0,0,d16f584849190e67ddd9b044fe809cc53716f0604b4d903c0b675313c791d
CVE-2024-10676,0,0,c4d26028c65dae8ee24a6ae71fbafbbbdf2f434e1b4ee4c7591876108357a5b0,2024-11-12T13:56:24.513000
CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000
CVE-2024-10683,0,0,81b5edc9806b9d41a626cf134b47e67b5d64e10aaf06aa6e2f1151e4509d5dd6,2024-11-12T13:56:24.513000
CVE-2024-10684,1,1,9a15fe26470cb3594a779cc7fc949e34c96068bf04ab8f50698274923381c597,2024-11-13T03:15:04.600000
CVE-2024-10684,0,0,9a15fe26470cb3594a779cc7fc949e34c96068bf04ab8f50698274923381c597,2024-11-13T03:15:04.600000
CVE-2024-10685,0,0,735dc2f0f480642d8ccf07f78f6e1a8d59da145d42e7702cb885b90e2b756411,2024-11-12T13:55:21.227000
CVE-2024-10686,0,0,f502f5abde4193c2fae938b3c4e276a47bbba1bd951c43d6c4cd1095cda79281,2024-11-13T02:15:14.243000
CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000
@ -242907,10 +242908,11 @@ CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db5656
CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000
CVE-2024-10790,0,0,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000
CVE-2024-10791,0,0,a1ab37f8c195110cb663fc7e474028527dca661a169201c0160b30306fac4c75,2024-11-06T15:05:38.240000
CVE-2024-10794,1,1,9aedb5d5a837b6a4aae4f6df6c1311122cf364773be589456106d1c965d21ec5,2024-11-13T04:15:03.850000
CVE-2024-10794,0,0,9aedb5d5a837b6a4aae4f6df6c1311122cf364773be589456106d1c965d21ec5,2024-11-13T04:15:03.850000
CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000
CVE-2024-10800,1,1,ce29144f4669e420badca736d06610aca62f1eb2927643cb4380367177ce2f11,2024-11-13T05:15:11.680000
CVE-2024-10801,0,0,3a88e665dce12d6cd350c00c6be6179e940c16e7a45bcfb9cfdce8ce89fd3527,2024-11-12T13:56:24.513000
CVE-2024-10802,1,1,d2c57e0122763ae368273d9d2d5d1af019a62dab8642e4b104a20b3bdfb16c06,2024-11-13T04:15:04.087000
CVE-2024-10802,0,0,d2c57e0122763ae368273d9d2d5d1af019a62dab8642e4b104a20b3bdfb16c06,2024-11-13T04:15:04.087000
CVE-2024-10805,0,0,30683214c49996b99622c593b0d2824b7195979c84652d13638c9eb82a2ea54d,2024-11-07T17:09:07.057000
CVE-2024-10806,0,0,e15ec6423ae1ad698fb4ad5b42c94e3a5d06fef4f5e8a29e70adae83dbef0510,2024-11-06T15:06:48.493000
CVE-2024-10807,0,0,783f0ac6c475ea7fcbd6f31f293edee7b9729e4af159ee9eb5bd3f13eec67953,2024-11-06T15:07:09.930000
@ -242919,13 +242921,13 @@ CVE-2024-10809,0,0,ea652f7f5676144619aa1801e4ca90f6a805fad57a8917b37e98b94898936
CVE-2024-1081,0,0,b9ecb327bf229081db54279065262fbdf204fadb84142fe6a647ad5480db67c8,2024-02-22T19:07:27.197000
CVE-2024-10810,0,0,24dc4cb4af16bbf52a3428afcf948782067630e0ddcd0604e4c08419e6e83436,2024-11-06T15:16:12.497000
CVE-2024-10814,0,0,895125174ba4aa7c23fdeb954976ebdf264a7eadd4d29cafe1df1a629d7d5976,2024-11-12T13:56:24.513000
CVE-2024-10816,1,1,1d00a9e29329198c03e88271ebcd4eebf2b82e4b3056436568377c0ab67311fa,2024-11-13T04:15:04.300000
CVE-2024-10816,0,0,1d00a9e29329198c03e88271ebcd4eebf2b82e4b3056436568377c0ab67311fa,2024-11-13T04:15:04.300000
CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000
CVE-2024-10820,1,1,4621fc270b141dfa183e03c33607634be82169c048d38ee5e65242109f9b1a90,2024-11-13T04:15:04.510000
CVE-2024-10820,0,0,4621fc270b141dfa183e03c33607634be82169c048d38ee5e65242109f9b1a90,2024-11-13T04:15:04.510000
CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000
CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000
CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000
CVE-2024-10828,1,1,1f31b8aebed8f05536c63b9e9d005dbce820954812ca28c5de369c7110757b2b,2024-11-13T04:15:04.727000
CVE-2024-10828,0,0,1f31b8aebed8f05536c63b9e9d005dbce820954812ca28c5de369c7110757b2b,2024-11-13T04:15:04.727000
CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000
CVE-2024-10837,0,0,c80ee8e64cd911e3ab2efc7873524bd8e71ebc0fc7365371148c92b52a8b267a,2024-11-12T13:56:24.513000
CVE-2024-10839,0,0,959999d7d9e7ad6c83b2a659b5f94ea06306dfe2c58a8ebc0b6485e885f4cafa,2024-11-08T19:01:03.880000
@ -242946,7 +242948,7 @@ CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679
CVE-2024-10871,0,0,68bab79b21893b436f4ab4e6d9a6ec3633c42e31b376d40213e506317551e1bb,2024-11-12T13:56:24.513000
CVE-2024-10876,0,0,bbf9ae62b029e2f20c90d639924bd19ca16772574bbaf6f19776b0310de3890f,2024-11-12T13:56:24.513000
CVE-2024-1088,0,0,7487e11aa2518f6cc93d89dd95a39f5c8d6e4a1b2567cf073eed09f7df78257a,2024-03-05T13:41:01.900000
CVE-2024-10882,1,1,7d4405eff6f9dac8cb9f1956b30643c2f7d54860fa2ec6300bbb5c9ec09af24b,2024-11-13T03:15:04.833000
CVE-2024-10882,0,0,7d4405eff6f9dac8cb9f1956b30643c2f7d54860fa2ec6300bbb5c9ec09af24b,2024-11-13T03:15:04.833000
CVE-2024-10887,0,0,3d1b4b6378b89b428ecf12faa130eeb81dcca25e4463c5b93f30a098ddbdea5d,2024-11-13T02:15:15.930000
CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
@ -243074,8 +243076,9 @@ CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f4
CVE-2024-11130,0,0,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000
CVE-2024-11138,0,0,880c841f831a3231f2a2e94e0c11fd28807c2a95758488ce39dcd6a3792cc342,2024-11-12T18:15:17.543000
CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000
CVE-2024-11143,1,1,d9bd3e061a34fe222acf87765c7b6d97ccebfd919c962519007b92b102043708,2024-11-13T03:15:05.110000
CVE-2024-11143,0,0,d9bd3e061a34fe222acf87765c7b6d97ccebfd919c962519007b92b102043708,2024-11-13T03:15:05.110000
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
CVE-2024-11150,1,1,86fc66192a52a6296cf48980b5695c12bef281442ceb3b66b96ac835f3481d04,2024-11-13T05:15:12.337000
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
CVE-2024-11168,0,0,6bafd96897b3226ed611ffe9fe0aef0ffd1fe7c02cbdbf638c6784e11ae3129b,2024-11-12T22:15:14.920000
CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000
@ -245270,6 +245273,8 @@ CVE-2024-21536,0,0,4f914cfe6666bcd465a58ac4926a267d85d3e48bad9af0623e3ff24aeb06f
CVE-2024-21537,0,0,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000
CVE-2024-21538,0,0,e8cdab9c6756d7f91f4358b51c5fdc4acd8293095dfa14f99a5a2ff2dfe3d783,2024-11-08T19:01:03.880000
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
CVE-2024-21540,1,1,219182356a65d692da76b44d9c2798ffe5c079f0c3250336794c060dca71fee4,2024-11-13T05:15:12.997000
CVE-2024-21541,1,1,61a15bed88802b16a92b7ea94e59259121bce0aa3cb1553c16d78c7e135ef97e,2024-11-13T05:15:14.680000
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
CVE-2024-21550,0,0,0a53a3a179cb6ecaf9ed04811bdf34ec295d6a8521b7681bf2ba3945e955d773,2024-08-13T17:33:13.537000
@ -265760,6 +265765,7 @@ CVE-2024-5223,0,0,e1518fa1e9fb0970a33863c1b1a7313f3247c5958916de9a4b07f2b8f6f2eb
CVE-2024-5224,0,0,db9f297ce85558665780a2b5ea4fe3a1e31ac4d111566a8ba052aeb7472c35ff,2024-07-23T21:04:43.353000
CVE-2024-5225,0,0,908db7200208aad82f301f521b9dc90a90551560079e967278f95345fdc58383,2024-09-23T19:46:53.890000
CVE-2024-5226,0,0,343bea1ef6104d1a60d532c3087e707033a7d2cea2eb006f3e8cf7d609df1199,2024-08-08T13:04:18.753000
CVE-2024-52268,1,1,ec43fab8eb3f2f1a39956836a60297ee3f0135117934b32b3e7cbaca36801305,2024-11-13T06:15:14.903000
CVE-2024-5227,0,0,782d407fd59442ae1cd49577c63d7b8236dddc237a48b5fa6a3df2e3ceec540d,2024-05-24T01:15:30.977000
CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad837,2024-05-24T01:15:30.977000
CVE-2024-52286,0,0,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000
@ -268804,8 +268810,12 @@ CVE-2024-8924,0,0,ffd18997b4a1a175cd09c0acb2c855c400aa6ac556f1b8573d109646137225
CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000
CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000
CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000
CVE-2024-8933,1,1,0f3f5faaf1a1237572bf59af775799206ea1034eabf0a17380c7ea20dc120858,2024-11-13T04:15:05.037000
CVE-2024-8933,0,0,0f3f5faaf1a1237572bf59af775799206ea1034eabf0a17380c7ea20dc120858,2024-11-13T04:15:05.037000
CVE-2024-8934,0,0,d034263c2209110f29442857367b8a22ee1ee4bb6c46d99b0b6fa829300a19f1,2024-11-01T12:57:03.417000
CVE-2024-8935,1,1,989a102ac63b7dd956ae5bd8f60bc01dbfb3917abc7cc89c94eace382ce19f62,2024-11-13T05:15:19.673000
CVE-2024-8936,1,1,a877adb12f56d8c973cca80fee93aab18372470e7d99fa1bd2fce16040217074,2024-11-13T05:15:20.540000
CVE-2024-8937,1,1,f07bd459012f08d46033f3f4e9b121d267e2e885896918f2aadebbb1f5df37c4,2024-11-13T05:15:22.613000
CVE-2024-8938,1,1,f90f5eda984c77e4bdcb214a22f977af4945f7d869bd9791ea6c2230c999c64f,2024-11-13T05:15:25.727000
CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000
CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000
CVE-2024-8941,0,0,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000
@ -269113,6 +269123,7 @@ CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b
CVE-2024-9403,0,0,c1afe1062aca6f3e2bbfc345cdb3697cf0c5243163e1e418a6944c658c5bb841,2024-10-04T13:51:25.567000
CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bffee,2024-10-04T13:51:25.567000
CVE-2024-9407,0,0,97b0f3234f51cc30c3a97226cb930f5fbbe39fd25f9f23131a758552af9f8ee9,2024-11-12T18:15:48.057000
CVE-2024-9409,1,1,262b55df5fcee3f46a203622a0db28646842043549000e1fc344797266d75f3c,2024-11-13T05:15:27.610000
CVE-2024-9410,0,0,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000
CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000
CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000

Can't render this file because it is too large.